Question

In: Operations Management

) Undertake research; find out what options are available to digitally sign master files before storage....

) Undertake research; find out what options are available to digitally sign master files before storage. Write a 1 to 2 page report in which you set out your findings including the benefits of digital signatures and the procedures which can be used to create them

Solutions

Expert Solution

Digital Signatures are available as the online equivalent to adding a notarized signature via a trusted third party, known as a Certificate Authority (CA), which serves as the notary in terms of verifying one’s identity.

Certificate Authorities bind the identity to a PKI-based Digital Certificate, allowing one to apply Digital Signatures to documents/ cloud-based signing platforms

There are 3 types of Digital Signature Certificates used- Class-1, Class-2 and Class-3.
Each has its own level of security and is meant for a particular category of professional and or sector of industry.

Class 1 certificates issued to individuals/private subscribers

Class 2 Certificates issued to both business personnel and private individuals use

Class 3 Certificates issued to individuals as well as organizations

Components of a Digital Signature Certificate

  • public key: is part of the verification system.
  • name and e-mail address: required for contact information purposes and to enable the viewer to identify the details.
  • Expiration date of the public key: sets a shelf life and to ensure that in the event of prolonged abuse of a signature eventually the signature is reset.
  • Name of the company: the company that the signature belongs too.
  • Serial number of the Digital ID: a unique number bundled to the signature for tracking ad extra identification reasons.

·         Digital signature of the CA (Certification Authority): signature that is issued by the authority that issues the certificates.

Benefits:

  • Authentication of document and coming from a verified source
  • The point that document has not been tampered as the signature would be displayed as invalid if any changes were made
  • Verification of one’s identity by a trusted organization (the CA)
  • can directly use Digital Signature Certificate to digitally sign your emails and send

enables the receiver for authentication of sender’s identity


Related Solutions

Research and find out what type of locations/places have an AED Available. Are there any places...
Research and find out what type of locations/places have an AED Available. Are there any places that having an AED is mandatory? Can you get an AED for your home? How much does an AED cost? Does an AED require maintenance? Do you think it is a good idea to have an AED in your home? Be thorough in your research. Make sure to include references.
Write a Research on what is: 1) what is Storage? - What are types of storage?...
Write a Research on what is: 1) what is Storage? - What are types of storage? - What is storage channel? - what is storage block? -(Differences between IDE, SCSI, and other storage channels)? 2) Differences between file systems are (FAT, NTFS, CIFS, SAMBA and others), what is file systems and it's role? what is the meaning of FAT, NTFS,CIFS,SAMBA and others including the differences ? And what is: Windows: NTFS, ReFs MacOS: HFS+, APFS Other: FAT, exFAT
For storage options a, b, and c, what volume of storage tank for hydrogen would be...
For storage options a, b, and c, what volume of storage tank for hydrogen would be needed for a hydrogen fuel cell car to have the same delivered transport energy (that is, total vehicle-km of travel) as a conventional car with a full 50 litre petrol tank (note that the actual volume of the tank is more than 50 litre). a- If the hydrogen is stored as compressed gas at a pressure of 350 bar (1 bar = 101 kPa)...
What I want to do is to digitally sign a document. I am new to cryptography and was wondering what issues to take into account.
What I want to do is to digitally sign a document. I am new to cryptography and was wondering what issues to take into account. The only criteria is that a textual document signed should produce a code that is different if lines in the same document are shifted. I heard that MD5 is broken and that one should avoid SHA1 (because of NSA etc).
Research and write a report summarizing the different options available for authorization or authentication in Spark,...
Research and write a report summarizing the different options available for authorization or authentication in Spark, that is, how is data protected from inadvertent and/or unauthorized access. Your report should be no less than 1.000 words, not including references and citations.
You have 1000 volunteers to find out if taking Zinc supplements at the first sign of...
You have 1000 volunteers to find out if taking Zinc supplements at the first sign of a cold really shortens the duration and lessens the symptoms. Describe how you would design an observational study to determine this. Now describe how you would design an experiment to determine this.
Research Managing Files via the Command Line Interface (CLI) commands, flags, and options that allow you...
Research Managing Files via the Command Line Interface (CLI) commands, flags, and options that allow you to: copy, delete, rename, and move files on Windows and Linux.
Select your favorite crop plant or model plant and find out what methods are available for...
Select your favorite crop plant or model plant and find out what methods are available for its transformation, and in what year those methods were first published. How is the DNA introduced – by Agrobacterium, gene gun or other method? How are the transformed cells and plants selected, and how are transgenic plants regenerated?
Undertake research to find how security culture is developed and maintained in non-IT-based environments. How can...
Undertake research to find how security culture is developed and maintained in non-IT-based environments. How can lessons from these implementations be used for developing and sustaining IS security culture?
3. Do some Internet research to find out what it means for a company to create...
3. Do some Internet research to find out what it means for a company to create a “poison pill”? Why might a company do that? Some economists think poison pills should be illegal. What is their rationale?
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT