Service Attacks & Prevention

Read Complete Research Material

SERVICE ATTACKS & PREVENTION

Denial of Service Attacks and Prevention

Denial of Service Attacks and Prevention

Introduction

The technical features of an internet have given more importance to the protection of data on the web. Moreover, the novice user has little control over the programs that work on the computer. Many programs are running on the PC, without the person's knowledge, right from the point when he/she starts machine and anyone can have direct access to through the network to the computer, without leaving a trace. In the recent years, the marketing firms have made use of this feature on the Internet because of the technical characteristic of invisibility and lack of transparencies. This allows them to go for profiling of every user on the internet, in real time and even across the borders. The most fundamental concept for the protection of personal data is Cryptography. Cryptographic software and hardware are widely available to perform encryption.

Issues with CryptographyUser Trust

Frauds and unethical practices in the world had forced the information technology innovators for the development of improved communication strategies. For example, the stolen and forging of credit cards is very common. Therefore, the consumers of electronic commerce losses their value due to such perceived risks. It is vital for the cryptographic policy makers to ensure the security mechanisms at all levels. Ultimately, the electronic transactions will carry less risk. There are three challenges, which should be considered such as developing and implementing the technology, gaining the community support through efficient use of such technology and overcoming the failures of the technology (Lance, 1995). 

User Choice

It would be very beneficial for the users if they had ample choices to select cryptographic methods for the protection of their computer systems and data. Since user choose various types of cryptographic methods to fulfill system security requirements therefore, both software and hardware solutions should be integrated into related products, which must offer a certain level of strength and confidentiality for data integrity. Some governments have implemented regulations for the minimum level of protection for certain types of data (Grant, 1997). 

Market-Driven Development

A research shows that the private sector is the sole manufacturer of information infrastructure therefore; the experts believe that industry must develop the encryption software's as per the needs of market consumers. It is the responsibility of governments to ensure full security and protection of public data. Furthermore, if the government takes strong and aggressive measures to impose restrictions on the use of cryptography, then the use of cryptography techniques will not be encouraged by users of information and communication systems. It will ultimately affect the entire information technology industry that incorporates cryptographic techniques (Denning, 1982).

Lawful Access

The lawful use of encryption techniques is the widely debated aspect of cryptography and governmental policies. It is also perceived as a conflict between confidentiality and public safety.

For example, law enforcement agencies in various countries had a freedom to access the stored data or interrupt communications under certain circumstances. The authorized access by such agencies can easily be reduced or curtailed by using the encryption techniques. It is very important for all of the parties ...
Related Ads