In this paper we attempt to explain and establish certain frameworks that can be assessed for implementing security
systems against cyber-threats and cyber-criminals. We give a brief overview of electronic signature generation procedures which
include its validation and efficiency for promoting cyber security for confidential documents and information stored in the cloud.
We strictly avoid the mathematical modelling of the electronic signature generation process as it is beyond the scope of this
paper, instead we take a theoretical approach to explain the procedures.