Wednesday, June 12, 2019

Internet Security Research Paper Example | Topics and Well Written Essays - 1750 words

Internet Security - Research Paper Examplethe computers cosmos used to access the internet, or the user. The subjects pertaining to the security against these threats atomic number 18 internet safety and internet security. There is a slight inequality in internet security and internet safety, with the most basic one being that the former focuses to a greater extent on the direct safety of a computer network from threats that can flack through the internet, such as viruses or data corruption, while internet safety relates more to the security and safety of the user, such as identity fraud, coin scams, false information etc. Although both forms of security threats can are important to visit and counter, this paper will concentrate mostly on the more technical aspect of internet security, and will focus on the various threats that are encountered and the preventative measures interpreted against them. As mentioned, internet security is the necessary measures taken and rules laid out which make the use of the internet more secure for a user in terms of the safety of their computer from various threats. To understand where these threats rise from it is first important to understand the basic working of the internet. ... IP transfers the required bits of data, firs within each individual network, and so between secondary directs of networks, startle from the most basic level, and then progressing regionally and then globally, thus allowing the information to reach from one point to another. TCP checks these bits of data, ensuring they are correctly being transferred and pass corrective feedback measures when they arent (Reed, 2004). Data threats enter this system of information management when at any of these many levels data is encrypted and corrupted. To prevent this, a number of measures are taken, which include SSL (Secure Sockets Layer), TLS (Transport Layer Security) and IPsec, with the most effective one being the IPsec protocol, which in turn furt her uses the AH (Authentication Header) and ESP (Encapsulating Security Payload) protocols as the mechanism for its protection. AP authenticates the data and then sends it further on, and ESP provides confidentiality. All three protocols basically revolve around the same principal of securing communication by authenticating the sender at each level where these protocols are implemented, and by encrypting the data so that in case of unwanted interception, it is not altered. Internet security threats are also widely transferred through e-mail messages. Again, understanding how email messages work greatly explains the reason for this. Email messages can also be considered bits of data that are transferred through the many networks of internet, with the main difference being that users can easily edit and change this data at the various levels it is transmitted to. How email messages basically work is that first a user composes a message. This message is converted into a certain standar d form and is transferred to the mail

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.