What Are the Security Problems and Solutions of the Internet?

Topics: Cryptography, Pretty Good Privacy, Public-key cryptography Pages: 5 (1475 words) Published: March 28, 2002
Internet has vital impact in our life nowadays as it becomes more and more popular. It allows us to have wider range of communication and interaction, to exchange and share experiences, thoughts, information, and to make business online. Without doubt, internet make our life more easier, internet banking system allow us to manage our bank accounts, paying bills without queuing, online shops allow us to make purchase without going out, online education, publication and article postings allow us learn more than what we get from text book, and a lot more.

As Internet plays more important role in our daily life comparing to its initiation, some keen groups are ringing our bell, hackers, and theft of data, crackers. These people are all associated with a term ¡§security¡¨. It is not difficult for general publics to point out two of the security issues, security of online transaction and security of message transmission respectively. In fact, system hacking is more fatal.

Most of experienced online people understand that their data transmitted through Internet is in risk of being stolen or peek during transmission. A message or in general called ¡§data¡¨ transmitting from one end to another, it passes number of nodes. It is far too easy for skilled people to grab those data during its transmission. It is not a serious issue for those who only do general chatting online. For those who doing business (e.g. online shopping) or sending very private materials (e.g. personal information), security becomes a big issue. For this reason, encryption is widely used for protecting the confidentiality of data being transmitted.

Basically, online transaction security, email security, network security are major considerations.

Online Transaction Security
There are a lot of online shopping and online casinos operations running worldwide. The most serious problem for these operations is to protect their transaction data, such as client¡¦s personal information and credit card information. Transaction data transmits from client site to server side. During the transmission, data theft will take this golden opportunity to peek or to duplicate data. If those data had been abused in certain ways, not just the clients suffering from financial lose, but the operator will also suffer from reputation lose. When clients have no confident to shop from the site, the operator will suffer from lost far beyond just reputation. For this reason, kinds data security methods had been developed.

One of the most commonly used one called Secure Socket Layer protocol (SSL) ¡§The Secure Sockets Layer protocol (SSL) is a protocol layer which may be placed between a reliable connection-oriented network layer protocol (e.g. TCP/IP) and the application protocol layer (e.g. HTTP). SSL provides for secure communication between client and server by allowing mutual authentication, the use of digital signatures for integrity, and encryption for privacy.¡¨ (1) Another latest security system is Security Electronic Transactions (SET) ¡§Security Electronic Transactions (SET) is a system for making payments securely over the Internet. It was developed by credit-card issuers and some major software and computer companies in the US. It uses encryption to make the transactions secure, and digital signatures to identify both merchants and buyers.¡¨(2)

Email Security
Business making use of email facilities to deliver their business correspondences is a common practice nowadays because email allow them to send text messages, attachment, photographs, images, and drawings better than traditional fax machines. Emails were sent via number of servers operating by companies, individuals, universities and government. Servers can be equipped with mail scanning to scan certain keywords such as ¡§credit card number¡¨.

Encryption before sending is a good way to protect your email. Symmetric key cryptography and Public Key cryptography are...

Bibliography: (1) http://www.ultranet.com/~fhirsch/Papers/wwwj/article.html
(2) http://ecommercecentre.online.wa.gov.au/tools/internet/security.stm#2
(3) http://www.pgpi.org/doc/pgpintro/#p9
(4) http://www.pgpi.org/doc/pgpintro/#p9
(5) http://www.cnn.com/TECH/specials/hackers/primer/
(6) http://www.greatcircle.com/gca/tutorial/bif.html#firewall
(7) http://pubweb.nfr.net/~mjr/pubs/fwfaq/#SECTION00031000000000000000
(8) http://www.cnn.com/TECH/specials/hackers/primer/
Continue Reading

Please join StudyMode to read the full document

You May Also Find These Documents Helpful

  • Internet Security
  • Internet Security Essay
  • Essay on Problems and Solutions of Internet
  • Problems and Solutions Over Internet Security: The Raldally Corporation Essay
  • Internet Security Essay
  • Internet Security Essay
  • Internet Security Essay
  • Essay on Problems and Solutions Internet Addiction.

Become a StudyMode Member

Sign Up - It's Free