Close Menu
    Facebook X (Twitter) Instagram
    Trending
    • 5 Active Malware Campaigns in Early 2025: What You Need to Know
    • 10 Critical Network Pentest Findings IT Teams Overlook
    • Report Phishing Instantly with PhishAlarm
    • Password Reuse Epidemic: Nearly Half of User Logins Compromised
    • Women in Cybersecurity: Interest, Exposure, or Just Stereotypes??
    • Stay Ahead of Scammers in 2025
    • Cybersecurity Alert: Risks of Abandoned Websites
    • DHS Unveils Playbook for the Deployment of Artificial Intelligence for the Public Sector
    Fordham University Information Security and Assurance
    • Information Security and Assurance Homepage
    • Privacy Blog
    • About
    Fordham University Information Security and Assurance
    You are at:Home»Cyber Security Awareness Month Tip»Digital Signatures: Why They are Important
    Cyber Security Awareness Month Tip

    Digital Signatures: Why They are Important

    By Gerald Johnson Jr.October 20, 20222 Mins Read
    Share
    Facebook Twitter LinkedIn Pinterest Copy Link

    The use of digital signatures is a way to make communications online more transparent and secure. A digital signature is a unique virtual algorithm that is specifically linked to a certain person. This algorithm, allows a person to have a unique digital signature that verifies it is them. This digital signature is used to let others you are communicating with know that messages, documents, or emails sent by you have not been tampered with upon signing. Also, it lets the recipient know that the message is coming from you specifically.

    An important aspect of digital signatures is the fact that the user creating it obtains what is known as a public key and a private key. The private key is the digital signature that is specifically linked to the user and only they have access to it. The public key is the digital signature that is publicly available to anyone who wants to encrypt a message for the private key owner to specifically open.

    An example would be if you want to send a message to a friend. You will encrypt the message with the public key of your friend’s digital signature. This will cause the message to become encrypted and only allow the private key holder to access that message. Since your friend is the holder of the private key, they will be able to decrypt the message and read its contents. If your friend wants to securely send you a message they will conduct the exact opposite but with your public key. You would then decrypt the message with your private key. If you want to send a certified document to a user, you would private key sign the document to let the recipient know that it is from you. Then you would follow the former steps to securely send the message.

    Source: https://www.cisa.gov/uscert/ncas/tips/ST04-018

    Share this:

    • Click to share on X (Opens in new window) X
    • Click to share on Facebook (Opens in new window) Facebook
    • Click to share on LinkedIn (Opens in new window) LinkedIn

    Like this:

    Like Loading...
    Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Network Security News and Events Privacy
    Previous ArticleHow to Dispose of Your Electronic Devices
    Next Article University Authorized Phishing Campaign

    Related Posts

    5 Active Malware Campaigns in Early 2025: What You Need to Know

    10 Critical Network Pentest Findings IT Teams Overlook

    Report Phishing Instantly with PhishAlarm

    Follow Us on Twitter!
    Follow @FordhamSecureIT
    My Tweets
    Archives
    Categories
    • AI (1)
    • Alerts (384)
    • CISO (19)
    • Cyber Security Awareness Month Tip (150)
    • Data Privacy Week (2)
    • Executive Director (1)
    • Exploits and Vulnerabilities (35)
    • General Information (34)
    • Identity and Access Management (12)
    • Identity Theft (26)
    • Jason Benedict (19)
    • Legitimate Email (14)
    • Malicious Email (24)
    • Mobile (25)
    • Network Security (2)
    • News and Events (143)
    • Newsletter (13)
    • Password (17)
    • Phishing (333)
    • Phishing Email (340)
    • Privacy (10)
    • Ransomware (9)
    • Scam (104)
    • Security Awareness (262)
    • Security Guides (34)
    • Social Engineering (12)
    • SPAM (40)
    • Suspicious (6)
    • Telework (2)
    • Teleworking (3)
    • Trojan (7)
    • Uncategorized (9)
    • Virtual Meeting (4)
    • Virus (28)
    • Viruses (8)
    • World Backup Day (1)
    • Zoom (6)
    Tag Cloud
    Alerts Artificial Intelligence Backups cell phones CISO Cybersecurity Awareness Month Tip Cybersecurity Month Data Privacy Device email Exploits and Vulnerabilities fordham fraud Identity and Access Management Identity Theft Information Security Guides Jason Benedict Legitimate Email malicious email Mobile Multi-Factor Authentication networks Network Security News and Events Newsletter online safety Online Shopping Password Phishing Phishing Email Privacy ransomware scam scams Security Awareness social engineering Social Media spam trojan Virus Viruses Wireless wire transfer scam World Backup Day zoom
    About
    About

    Founded in 1841, Fordham is the Jesuit University of New York, offering exceptional education distinguished by the Jesuit tradition to more than 15,100 students in its four undergraduate colleges and its six graduate and professional schools.

    Copyright © Fordham University
    Facebook X (Twitter) Instagram YouTube LinkedIn
    © 2025 ThemeSphere. Designed by ThemeSphere.

    Type above and press Enter to search. Press Esc to cancel.

    %d