Cryptography And The Issue Of Internet Security

937 words - 4 pages

High level encryption or cryptography is used in a number of applications ranging from those which impact national security to those which are more mundane. Essentially, cryptography is the methodology of encoding information so that one’s privacy is ensured. This is particularly important when it comes to transactions which occur over the Internet. The risk of individuals gaining access to personal information or information which is critical to a country or a nation over the Internet is a very real one. The practice of cryptography lessens the likelihood of this happening.

Part A -- Identification and Description of the Issue
A greater and greater percentage of the world population is gaining access to the Internet and incorporating that access into their daily lives. More and more business transactions and personal transactions are occurring on the Internet. There is no questioning the fact that both the growth of the Internet and the number of sensitive transactions which occur on it are exponential.
In order to ensure the safety of Internet transactions, whether public or private, methodologies must be identified to safely and effectively encrypt information. Two methodologies are particularly associated with the issue of Internet security and deserve both an explanation and a contrast. These two methods are TCP/IP and cryptography. While the TCP/IP protocol was an initial first attempt at data security and integrity, it is insufficient. TCP/IP was not really designed as a security provision and is insufficient to meet the criteria which are necessary to ensure safe transactions (Computer Reseller News PG).

Part B ---Understanding of Information Technology Background of Issue
Examples of the criteria which must be met to ensure the protection of information which is transmitted over the Internet include:

1. The authentication of users.
2. The economical provision of single-user login services.
3. The provision of one security scheme which works both from within the user’s firewall and from outside that firewall.
4. The protection of the privacy and integrity of both real-time and store-and-forward applications such as e-mail.
                     (Computer Reseller News PG).

Part C -- Analysis of Impact of Issue
The impacts of insecure data transmission over the Internet are massive in their potential impacts. Our world is making a very fast transition from one of television and radio to one of the information age. We transmit and receive a massive amount of information through the Internet which by its very nature is insecure and wild and free.
Some information we transmit and receive through the Internet is trivial, other is critical from either a personal, business or national perspective. Without some form of encryption this information could not only fall into the wrong hands but it could also be read and...

Find Another Essay On Cryptography and the Issue of Internet Security

The History of Cryptography and How it is Used Today

1438 words - 6 pages : cryptography must remain a highly studied field in order to keep up with the ever changing cyber security landscape of vulnerabilities and threats. Works Cited Arrous, M. (2014, April 9). Change your passwords: A massive bug has put your details at risk. Time. Retrieved from Borisov, N., Brewer, E. & Goldberg, I. (2004). Off-the-Record Communication, or Why Not Use PGP. Workshop

On the development of Quantum Computers and Cryptography

1526 words - 7 pages On the Development of Quantum Computers and Cryptography In 2010, the United States government, after accessing encrypted files by means of physical intervention, exposed ten Russian sleeper agents; in 2013, the United States government, without any means of physical intervention, surreptitiously collected and promptly decrypted many previously encrypted (Wood). Within this decade, concerns regarding the dubious security of

Security And Privacy On The Internet

1470 words - 6 pages Many users are subject of Security and Privacy on the Internet issue. The term "information" now is more used when defining a special product or article of trade which could be bought, sold, exchanged, etc. Often the price of information is higher many times than the cost of the very computers and technologies where it is functioning. Naturally it raises the need of protecting information from unauthorized access, theft, destruction, and

Internet Security and Confidentiality

2102 words - 8 pages Table of contents: Aims: 2 Methodology: 3 Findings 4 Internet Security and Confidentiality: 4 User authentication: 4 Anti-virus protection: 4 Encryption: 5 Fire walls: 5 The range of service offered by ISPs: 6 The cost of the different packages: 6 Functionality: 6 Capacity: 6 Internet Connection and Access Methods: 7 Three broadband packages: 9 Vodafone simply broadband: 10 Unlimited 70Mb & Talk (Anytime) 10 Recommendation

Internet Privacy and Security

1113 words - 5 pages of our technology. Internet privacy and security may be different but share a responsibility, but it is up to us to take personal responsibility to protect ourselves on the internet. We should pick unique, carful passwords, and never share this sensitive information, and encrypt our data when online. When it comes to social media, I found this information that explains it well. (Endangering their right to privacy 2010) states “Communications and

Viruses and Internet Security

2763 words - 11 pages system securities and remain anonymous to the public and authorities. The whole issue of viruses will never be eliminated. It can only be controlled! The pros of taking a Big Brother approach towards the control of virus transfers include: ·Reducing IT security spending. .Saving money when avoiding harmful and financially burdening virus attacks ·Saving money when employees are working rather than surfing the Internet ·Improving

The threat of internet security and its effects on electronic commerce

2078 words - 8 pages The threat of Internet security is an issue of growing concern. In the last decade, the number of people using computers on a regular basis has exploded. For quite some time now, computers and the Internet have been a source of entertainment and education, and not until recently have become a means of doing business. At the same time the Internet has also been a fertile ground for fraud. The absence of global regulation, a general lack of

Impact of the Internet on Information Technology Security

1185 words - 5 pages practiced, reduces the likelihood of this occurring.Cryptography, or encryption, is used at a high level in numerous applications including those affecting national security. It can be defined as the conversion of data into a scrambled code that can be deciphered and sent across a public or private network (Barcodesinc). Cryptography ensures privacy of information, and the processing of transactions over the Internet makes this especially

Protection of Information: One of the Internet Security topics

1656 words - 7 pages security level of information systems.In the current situation, data processing has moved the problems of information security forward to the rank of most important problems of national economy. Solving the problem of poor information security presupposes a complex of measures. First of all, such actions of government as development of classification system, documentation of information and protection methods, data access regulations and punishing

Influence and affect the Internet places on IT Security

784 words - 3 pages Influence and affect the Internet places on IT Security Organizations in today's high technological atmospheres, are becoming ever more reliant on their information systems. The threats are steadily increasing toward information systems from criminals and terrorists. Information is an area that many organizations will identify in their operation as needing protection as part of their system of internal control.The news is filled with articles

Is the environment an international security issue?

2480 words - 10 pages Conference on Environment was held in Stockholm in 1972. Numerous conferences were held since then and the idea of linking environment and both national and international security began to emerge. Environment was referred to as a security issue by several scholars but, as it was argued such literature could only be equated to environmental protection and not much more (Levy, 1995).Almost everybody understood that the protection of environment is a major

Similar Essays

Cryptography And Network Security Essay

1476 words - 6 pages prime factors. The information in the public key includes n and a derivative of one of the factors of n. The prime factors of n cannot be determined from this information which proves the RSA algorithm to be secure. • Elliptic Curve Cryptography (ECC) – ECC is based upon elliptic curves. It can offer levels of security with smaller keys when compared to RSA and other PKC methods. ECC was designed for devices that have a smaller amount of memory

Cryptography And Basic Security Goals Essay

950 words - 4 pages of them. Cryptography is the basic encryption method used in implementing security. The word cryptography comes from the Greek word "Kryptos", that means hidden, and "Graphikos" which means writing. Cryptography or communication by using secret code was used by the Egyptians some 4000 years ago. However, the science of cryptography was initiated by Arabs since 600s. Cryptography becomes vital in the twentieth century where it played a crucial role

Internet And Internet Security Essay

1127 words - 5 pages has to regulate the flow of information on the Internet because some of the commercial blocking tools used to filter this information is not enough. Cybercops really worry that 'outlaws' are now able to use powerful cryptography to send and receive uncrackable secret communications and are also aided by anonymous 're-mailers'. By using featureslike these it is impossible to use blocking devices to stop children from accessing this information

What Are The Security Problems And Solutions Of The Internet?

1356 words - 5 pages education, publication and article postings allow us learn more than what we get from text book, and a lot more. As Internet plays more important role in our daily life comparing to its initiation, some keen groups are ringing our bell, hackers, and theft of data, crackers. These people are all associated with a term ¡§security¡¨. It is not difficult for general publics to point out two of the security issues, security of online transaction and