AskEssays.com - Discover essay samples

Internet 2

4.9 of 5.0 (16 reviews)

Contains
607 words
Category
Science

Internet 2 page 1
Internet 2 page 2
Internet 2 page 3
The above thumbnails are of reduced quality. To view the work in full quality, click download.

Internet 2


There has been a great deal of excitement in the media over the significant commercial potential of the internet. Many commercial enterprises are viewing the internet as a significant element of their business operations. They see it as a means of advertising, selling and supporting their product globally.However, there are certain critical area such as security that if not adequately addressed could cause the usefulness of the internet to erode rapidly. Brian Hurley & Peter Birkwood in Doing Business on the Internet said that there are three main areas of security relevant to the internet business:Fradulent use of credit card information related to on-line financial transactions, General site and security and Information security. Some companies claimed that they offer their customers a secure gateway that cannot be access by hackers.



The purpose of this paper is to discuss the issue of secure payment. In so doing, I will explore how secure is secure.



Commerce on the internet consists mainly of passing credit card numbers and expiry date information electronically between the merchant and the customers. When commerce is conducted over the internet, a network is open to milions of potentially prying eyes. Moreover, there is no one to verify the validity of the credit card. To ensure that the person using the card is actually the card holder. The buyer might have exceeded the limit or can be using a stolen card. Likewise, the buyer has no assurance that the vendor on the other end is who he/she claim to be. Richard E. Smith in Internet cryptography says that data travels from one computer to another leaving the safety of its protected surroundings.



Once the data is out of the sender's hand it can fall into the hands of people with bad intention. they could modify the data for their amusement or for their own benefit. To protect the data moving across the network, encryption has been introduced. The crypto device has several essential elements that determine how it works.



First the crypto algorithm, which specifies the mathematical transformation that is performed on data to encrypt or decrypt. the crypto algorithm is a procedure that takes the plain text data and transform it into ciphertext in a reversible way. William R. Cheswick & Steven M. Bellovin in Firewalls and Internet Security assert that encryption is often touted as the ultimate weapon in the computer war but it is not. They claim that encryption is a valuable tool, but like everything else it is a tool towards an ultiminate goal. They continue to assert that if encryption is used improperly, it can hurt the real goal of the organization. pg14.



According to an article published in the General Media and Daily Newsfeeds hackers are geting better at breaking computer codes. The article states that a computer hacker was found guilty on five counts for hacking systems to gather credit card information which he intended to sell on the black market.when the computer hacker was arrested, he had in his possession an encrypted cd-rom containing roughly one hundred thousand credit card numbers stolen from companies doing business over the internet.



Another article published in the same magazine claims that a computer hacker broke into a San Diego Internet provider's computer and stole one hundred credit card numbers. According to the article, the hacker used a "packet sniffer" program to gather the information from a dozen companies selling products over the internet.



A survey conducted by ...

You are currently seeing 50% of this paper.

You're seeing 607 words of 1214.

Keywords: internet 2.0, internet 2.0 conference, internet 25, internet 25 att, internet 200, internet 2.4 vs 5, internet 200 mbps, internet 2000

Similar essays


Oil Spills

: It will happen again Imagine that you are a just a small, ordinary seabird. It is March 24, 1987 and far away from you is an enormous tanker called the Exxon Valdez, coming at an astonishing speed. You do not worry, for these huge ships come along very occasionally in the Alaskan waters. The next thing you know when you turn around i...

8 reviews
Download
I

.t. doctors database analysis There are some parts of a Doctor?s Surgery that could benefit from computerisation. As time goes on technology will aid most types of work, for instance office work (Department of Trade and ndustry, for example). Technology could be used in a Doctor?s surgery to computerise the patients? files, to print out prescrip...

49 reviews
Download
Freedom of bytes

Freedom of Bytes In today?s era there exists a medium, which like never before is becoming a medium of communication and interaction between humans, namely the World Wide Web. This old but yet new medium is expanding and changing rapidly, thus making it close to impossible to control. The World Wide Web is offering more to society no...

111 reviews
Download
Bipolar disorder 4

Bipolar Disorder: Its Causes and Effects At least 2 million Americans suffer from bipolar disorder, more commonly known as manic-depression. This illness usually begins in adolescence or early adulthood and continues throughout life. Although it may come into affect at any time, most individuals with the disorder experience their first mood...

147 reviews
Download
Cheetah

The I'm going to talk to you about the , Where it lives, how it hunts, how the grass helps the cheetah, mating, and what you can do to help the endangered species. The (Acinonyx Jubatus) is the fastest land mammal on earth, capable of speeds of 60-70 miles per hour. s live 12 years (17 in captivity) and mature at 20-23 months of a...

12 reviews
Download
Atsisiųsti šį darbą