This website uses cookies to ensure you have the best experience. Learn more

Cryptography And The Issue Of Internet Security

937 words - 4 pages

High level encryption or cryptography is used in a number of applications ranging from those which impact national security to those which are more mundane. Essentially, cryptography is the methodology of encoding information so that one’s privacy is ensured. This is particularly important when it comes to transactions which occur over the Internet. The risk of individuals gaining access to personal information or information which is critical to a country or a nation over the Internet is a very real one. The practice of cryptography lessens the likelihood of this happening.

Part A -- Identification and Description of the Issue
A greater and greater percentage of the world population is gaining access to the Internet and incorporating that access into their daily lives. More and more business transactions and personal transactions are occurring on the Internet. There is no questioning the fact that both the growth of the Internet and the number of sensitive transactions which occur on it are exponential.
In order to ensure the safety of Internet transactions, whether public or private, methodologies must be identified to safely and effectively encrypt information. Two methodologies are particularly associated with the issue of Internet security and deserve both an explanation and a contrast. These two methods are TCP/IP and cryptography. While the TCP/IP protocol was an initial first attempt at data security and integrity, it is insufficient. TCP/IP was not really designed as a security provision and is insufficient to meet the criteria which are necessary to ensure safe transactions (Computer Reseller News PG).

Part B ---Understanding of Information Technology Background of Issue
Examples of the criteria which must be met to ensure the protection of information which is transmitted over the Internet include:

1. The authentication of users.
2. The economical provision of single-user login services.
3. The provision of one security scheme which works both from within the user’s firewall and from outside that firewall.
4. The protection of the privacy and integrity of both real-time and store-and-forward applications such as e-mail.
                     (Computer Reseller News PG).

Part C -- Analysis of Impact of Issue
The impacts of insecure data transmission over the Internet are massive in their potential impacts. Our world is making a very fast transition from one of television and radio to one of the information age. We transmit and receive a massive amount of information through the Internet which by its very nature is insecure and wild and free.
Some information we transmit and receive through the Internet is trivial, other is critical from either a personal, business or national perspective. Without some form of encryption this information could not only fall into the wrong hands but it could also be read and...

Find Another Essay On Cryptography and the Issue of Internet Security

What are the security problems and solutions of the Internet?

1356 words - 5 pages education, publication and article postings allow us learn more than what we get from text book, and a lot more. As Internet plays more important role in our daily life comparing to its initiation, some keen groups are ringing our bell, hackers, and theft of data, crackers. These people are all associated with a term ¡§security¡¨. It is not difficult for general publics to point out two of the security issues, security of online transaction and

Internet and Internet Security Essay

1127 words - 5 pages has to regulate the flow of information on the Internet because some of the commercial blocking tools used to filter this information is not enough. Cybercops really worry that 'outlaws' are now able to use powerful cryptography to send and receive uncrackable secret communications and are also aided by anonymous 're-mailers'. By using featureslike these it is impossible to use blocking devices to stop children from accessing this information

The History of Cryptography and How it is Used Today

1438 words - 6 pages : cryptography must remain a highly studied field in order to keep up with the ever changing cyber security landscape of vulnerabilities and threats. Works Cited Arrous, M. (2014, April 9). Change your passwords: A massive bug has put your details at risk. Time. Retrieved from http://time.com/55037/heartbleed-internet-security-encryption-risk/. Borisov, N., Brewer, E. & Goldberg, I. (2004). Off-the-Record Communication, or Why Not Use PGP. Workshop

On the development of Quantum Computers and Cryptography

1526 words - 7 pages On the Development of Quantum Computers and Cryptography In 2010, the United States government, after accessing encrypted files by means of physical intervention, exposed ten Russian sleeper agents; in 2013, the United States government, without any means of physical intervention, surreptitiously collected and promptly decrypted many previously encrypted (Wood). Within this decade, concerns regarding the dubious security of

Lack of Internet Security and Privacy

1035 words - 4 pages Internet privacy and security has become the concern of many individuals throughout recent years. There are a very limited amount of laws that have been enacted to combat computer or cyber related crimes. This has become an issue because as the internet grows increasingly popular so does the criminal and immoral behavior that abounds on it. With these crimes gaining in impact, effectiveness, and frequency, there needs to be more repercussions

Security And Privacy On The Internet

1470 words - 6 pages Many users are subject of Security and Privacy on the Internet issue. The term "information" now is more used when defining a special product or article of trade which could be bought, sold, exchanged, etc. Often the price of information is higher many times than the cost of the very computers and technologies where it is functioning. Naturally it raises the need of protecting information from unauthorized access, theft, destruction, and

Internet Security and Confidentiality

2102 words - 8 pages Table of contents: Aims: 2 Methodology: 3 Findings 4 Internet Security and Confidentiality: 4 User authentication: 4 Anti-virus protection: 4 Encryption: 5 Fire walls: 5 The range of service offered by ISPs: 6 The cost of the different packages: 6 Functionality: 6 Capacity: 6 Internet Connection and Access Methods: 7 Three broadband packages: 9 Vodafone simply broadband: 10 Unlimited 70Mb & Talk (Anytime) 10 Recommendation

Internet Privacy and Security

1113 words - 5 pages of our technology. Internet privacy and security may be different but share a responsibility, but it is up to us to take personal responsibility to protect ourselves on the internet. We should pick unique, carful passwords, and never share this sensitive information, and encrypt our data when online. When it comes to social media, I found this information that explains it well. (Endangering their right to privacy 2010) states “Communications and

Viruses and Internet Security

2763 words - 11 pages system securities and remain anonymous to the public and authorities. The whole issue of viruses will never be eliminated. It can only be controlled! The pros of taking a Big Brother approach towards the control of virus transfers include: ·Reducing IT security spending. .Saving money when avoiding harmful and financially burdening virus attacks ·Saving money when employees are working rather than surfing the Internet ·Improving

The threat of internet security and its effects on electronic commerce

2078 words - 8 pages The threat of Internet security is an issue of growing concern. In the last decade, the number of people using computers on a regular basis has exploded. For quite some time now, computers and the Internet have been a source of entertainment and education, and not until recently have become a means of doing business. At the same time the Internet has also been a fertile ground for fraud. The absence of global regulation, a general lack of

Impact of the Internet on Information Technology Security

1185 words - 5 pages practiced, reduces the likelihood of this occurring.Cryptography, or encryption, is used at a high level in numerous applications including those affecting national security. It can be defined as the conversion of data into a scrambled code that can be deciphered and sent across a public or private network (Barcodesinc). Cryptography ensures privacy of information, and the processing of transactions over the Internet makes this especially

Similar Essays

Cryptography And Network Security Essay

1476 words - 6 pages prime factors. The information in the public key includes n and a derivative of one of the factors of n. The prime factors of n cannot be determined from this information which proves the RSA algorithm to be secure. • Elliptic Curve Cryptography (ECC) – ECC is based upon elliptic curves. It can offer levels of security with smaller keys when compared to RSA and other PKC methods. ECC was designed for devices that have a smaller amount of memory

Cryptography And Basic Security Goals Essay

950 words - 4 pages of them. Cryptography is the basic encryption method used in implementing security. The word cryptography comes from the Greek word "Kryptos", that means hidden, and "Graphikos" which means writing. Cryptography or communication by using secret code was used by the Egyptians some 4000 years ago. However, the science of cryptography was initiated by Arabs since 600s. Cryptography becomes vital in the twentieth century where it played a crucial role

The History And Applications Of Cryptography

1612 words - 7 pages Cryptography is the study of secure or secret communications. Cryptography has been around for thousands of years. Cryptography has been around for thousands of years. Cryptography deals with authentication, confidentiality, and integrity of data. There are many different implementations of cryptography in information systems. This paper will cover hashing, encryption, digital signatures, and digital certificates. Cryptography dates back

The History Of Cryptography Essay

2055 words - 9 pages study on this issue and surmised there was no scenario where they could defeat the United States and did not want to jeopardize the peace that had been gained between North and South America. Ultimately, news of this telegram reached the U.S. and helped fuel support for the U.S. declaring war on the German Empire. (“Zimmerman Telegram”, 2014) World War II brought the next wave of cryptography breakthroughs with the introduction of the Enigma and