Tuesday, March 26, 2019

What are the security problems and solutions of the Internet? Essay exa

mesh topology has vital meet in our life nowadays as it becomes more and more popular. It stick outs us to have wider range of communication and interaction, to exchange and shargon experiences, thoughts, information, and to acquire byplay online. Without doubt, internet make our life more easier, internet banking system allow us to manage our bank accounts, paying bills without queuing, online shops allow us to make purchase without going out, online education, publication and article postings allow us scam more than what we get from text book, and a lot more.As Internet plays more important role in our daily life comparability to its initiation, some keen groups ar ringing our bell, hackers, and theft of entropy, crackers. These people are all associated with a term aegis. It is not difficult for oecumenic publics to point out two of the hostage issues, security of online transaction and security of message transmission respectively. In fact, system hacking is more fat al. Most of experience online people understand that their selective information transmitted through Internet is in risk of being stolen or peek during transmission. A message or in popular called data transmitting from one end to another, it passes topic of nodes. It is far too easy for skilled people to grab those data during its transmission. It is not a honorable issue for those who only do general chatting online. For those who doing business (e.g. online shopping) or sending very private materials (e.g. personal information), security becomes a big issue. For this reason, encryption is widely used for protecting the privyity of data being transmitted.INTERNET BUSINESS FOR SECURITYBasically, online transaction security, email security, net security are major considerations. Online Transaction SecurityThere are a lot of online shopping and online casinos operations running worldwide. The most serious problem for these operations is to protect their transaction data, such as clients personal information and credit card information. Transaction data transmits from client site to server side. During the transmission, data theft will keep back this golden opportunity to peek or to duplicate data. If those data had been step in certain ways, not just the clients suffering from financial lose, moreover the operator will also suffer from reputation lose. When clients have no confident to shop from the... ...s to computer room are one of the cost-effective ways to eliminate network data being stolen and abused. Companies and organizations with highly confidential information will have sets of security policy with consideration of sympathetic factor to protect their network. One thing we shall always keep in mind that no one connected to a computer network is really safe from hackers(8) Any of the security device or computer software can only minimize the possibility of data being hacked, stolen and abused. Bibliography(1)http//www.ultranet.com/fhirs ch/written document/wwwj/article.html(2)http//ecommercecentre.online.wa.gov.au/tools/internet/security.stm2(3)http//www.pgpi.org/doc/pgpintro/p9(4)http//www.pgpi.org/doc/pgpintro/p9(5)http//www.cnn.com/TECH/specials/hackers/primer/(6)http//www.greatcircle.com/ground-controlled approach/tutorial/bif.htmlfirewall(7)http//pubweb.nfr.net/mjr/pubs/fwfaq/SECTION00031000000000000000(8)http//www.cnn.com/TECH/specials/hackers/primer/

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.