AskEssays.com - Discover essay samples

Internet 2

4.9 of 5.0 (16 reviews)

Contains
607 words
Category
Science

Internet 2 page 1
Internet 2 page 2
Internet 2 page 3
The above thumbnails are of reduced quality. To view the work in full quality, click download.

Internet 2


There has been a great deal of excitement in the media over the significant commercial potential of the internet. Many commercial enterprises are viewing the internet as a significant element of their business operations. They see it as a means of advertising, selling and supporting their product globally.However, there are certain critical area such as security that if not adequately addressed could cause the usefulness of the internet to erode rapidly. Brian Hurley & Peter Birkwood in Doing Business on the Internet said that there are three main areas of security relevant to the internet business:Fradulent use of credit card information related to on-line financial transactions, General site and security and Information security. Some companies claimed that they offer their customers a secure gateway that cannot be access by hackers.



The purpose of this paper is to discuss the issue of secure payment. In so doing, I will explore how secure is secure.



Commerce on the internet consists mainly of passing credit card numbers and expiry date information electronically between the merchant and the customers. When commerce is conducted over the internet, a network is open to milions of potentially prying eyes. Moreover, there is no one to verify the validity of the credit card. To ensure that the person using the card is actually the card holder. The buyer might have exceeded the limit or can be using a stolen card. Likewise, the buyer has no assurance that the vendor on the other end is who he/she claim to be. Richard E. Smith in Internet cryptography says that data travels from one computer to another leaving the safety of its protected surroundings.



Once the data is out of the sender's hand it can fall into the hands of people with bad intention. they could modify the data for their amusement or for their own benefit. To protect the data moving across the network, encryption has been introduced. The crypto device has several essential elements that determine how it works.



First the crypto algorithm, which specifies the mathematical transformation that is performed on data to encrypt or decrypt. the crypto algorithm is a procedure that takes the plain text data and transform it into ciphertext in a reversible way. William R. Cheswick & Steven M. Bellovin in Firewalls and Internet Security assert that encryption is often touted as the ultimate weapon in the computer war but it is not. They claim that encryption is a valuable tool, but like everything else it is a tool towards an ultiminate goal. They continue to assert that if encryption is used improperly, it can hurt the real goal of the organization. pg14.



According to an article published in the General Media and Daily Newsfeeds hackers are geting better at breaking computer codes. The article states that a computer hacker was found guilty on five counts for hacking systems to gather credit card information which he intended to sell on the black market.when the computer hacker was arrested, he had in his possession an encrypted cd-rom containing roughly one hundred thousand credit card numbers stolen from companies doing business over the internet.



Another article published in the same magazine claims that a computer hacker broke into a San Diego Internet provider's computer and stole one hundred credit card numbers. According to the article, the hacker used a "packet sniffer" program to gather the information from a dozen companies selling products over the internet.



A survey conducted by ...

You are currently seeing 50% of this paper.

You're seeing 607 words of 1214.

Keywords: internet 2.0, internet 2.0 conference, internet 25, internet 25 att, internet 200, internet 2.4 vs 5, internet 200 mbps, internet 2000

Similar essays


Acid rain 10

Acid rain is exactly what it suggests- rain that is acidic. The definition of "acid rain" is rain with a pH of below 5.6. Rain becomes acidic because of gases that dissolve in the rain. Approximately 70% of acid rain is a result of dissolved sulfur dioxide (SO2) which forms Sulfuric Acid. The remaining 30% or so comes from various Nitrogen...

136 reviews
Download
Bubonic plague 2

The Bubonic Plague, or Black Death, had many negative as well as positive effects on medieval Europe. While being one of the worst and deadliest diseases in the history of the world,it indirectly helped Europe break grounds for some of the basic necessities forlife today. The Black Death erupted in the Gobi Desert in the late 1320s, but one...

179 reviews
Download
Internet 2

There has been a great deal of excitement in the media over the significant commercial potential of the internet. Many commercial enterprises are viewing the internet as a significant element of their business operations. They see it as a means of advertising, selling and supporting their product globally.However, there are certain critical are...

16 reviews
Download
The Arctic Circle

Ditions enclose roughly the same territory, which is somewhat larger than the region bounded by the Arctic Circle, and will be used as the basis for this article.The largest Arctic tundra areas are in Canada, Russia, Greenland (Kalatdlit-Nunat), Scandinavia, Iceland and Alaska.Climate and Land Formation Tundra climate is characteri...

108 reviews
Download
Computers

DEVELOPMENT OF COMPUTERS OVER THE DECADES What is a computer? A Computer is an electronic device that can receive a set of instructions, or program, and then carry out this program by performing calculations on numerical data or by compiling and correlating other forms of information. Thesis Statement:- The modern world of high tech...

58 reviews
Download
Atsisiųsti šį darbą