Hi Hemang sir. Ur all cisa related videos are v helpful. I read CRM and watched ur cisa videos and recently passed cisa exam in just one month. Thanks a lot.
thank you sir for your nice explanation. In CRM, the Digital Signature has extended to anther part known as "Digital Envelope' and another added part is :Quantum Cryptograph", should you explain it at least on briefing way, thank you
Hi, thank you for your videos. So much clearer than CISA's book! In the last question of this video, you say that the correct answer is C, but that says that the hash value was created from the entire message content. Is that still the correct answer? Thank you
Hi Ram, let me try this way: I want to give you a message ' I love you' . So along with message , I will also send hash of the message i.e. some alphanumberical value. Now from me you will get two things (1) I love you (2) abc123abc123 Now, to ensure that someone has not changed the message in between (man in the middle attack), you create hash of the mesaage. If you get value as abc123abc123, you can rejoice as I actually sent the same message and it's not been tampered with. But if you get some other value, that means I don't love you and someone else has played with your emotions. 😊
How would the integrity be maintained if the decryption is happening through A's public key.. Decryption should happen with private key of B coz the msg hash has to be encrypted with B's public key
Dear Amey, you need to understand what is the objective of encryption. Please note digital signature is always done by sender' s private key. If objective is confidentiality then receiver's public should be used for encryption.
Hi Hemang sir. Ur all cisa related videos are v helpful. I read CRM and watched ur cisa videos and recently passed cisa exam in just one month. Thanks a lot.
Congratulations Manoj on your CISA success
Sir u are the main actor of CISA exam preparation , salute sir keep on doing the good job.. tell me more about the changes in the 2019 curriculum.
Thanks dear. We are working on new updates
@@HemangDoshi Do we know what exactly are the changes in 2020 or do we stick to your videos itself ?
@@amanmahajan123 there are no changes in 2020. CRM 2019 is the latest one
Very good video Hemang Doshi sir.... Thanks very for ur kind support to us. Its really very nice explanation.
Very much appreciated. This helped me!
very simply explained. very nince
thank you sir for your nice explanation. In CRM, the Digital Signature has extended to anther part known as "Digital Envelope' and another added part is :Quantum Cryptograph", should you explain it at least on briefing way, thank you
Excellent explanation!
Thanks Marius. You can access complete cisa lectures at www.udemy.com/course/certified-in-information-system-audit/?referralCode=54D937D43960E2956A8C
Thank you sir
E-book version with QAE on digital signature as per CISA exam pattern is as follow:
www.smashwords.com/books/view/648923
I scored 107 mock 2 and 104 Mock 1 do i need to study more or are there other mock i can do comparisons before final exams
Hi, thank you for your videos. So much clearer than CISA's book! In the last question of this video, you say that the correct answer is C, but that says that the hash value was created from the entire message content. Is that still the correct answer? Thank you
Hi. Yes correct answer is c
Around 3:20, you say "receiver will hash 8AM and hen match ". If receiver already knows the message text then why do he need to do anything??
Hi Ram, let me try this way:
I want to give you a message ' I love you' . So along with message , I will also send hash of the message i.e. some alphanumberical value.
Now from me you will get two things (1) I love you (2) abc123abc123
Now, to ensure that someone has not changed the message in between (man in the middle attack), you create hash of the mesaage.
If you get value as abc123abc123, you can rejoice as I actually sent the same message and it's not been tampered with.
But if you get some other value, that means I don't love you and someone else has played with your emotions. 😊
hahahaha... awesome.. so basically hash ensures integrity and not confidentiality
How would the integrity be maintained if the decryption is happening through A's public key..
Decryption should happen with private key of B coz the msg hash has to be encrypted with B's public key
Dear Amey, you need to understand what is the objective of encryption. Please note digital signature is always done by sender' s private key.
If objective is confidentiality then receiver's public should be used for encryption.
ua-cam.com/video/mCM6dyQ_KmQ/v-deo.html&feature=shares
Please check above video to understand this.