Web Security

Read Complete Research Material

WEB SECURITY

Web Security

Web Security

Introduction

Web culture has challenged the traditional customs and expectations, such as confidentiality, as well. Just as she holds the copyrights, the Internet and Internet-connected computers efficiently create and distribute personal information about their users. Analog formats for the connection of the past, such as printing on paper, of course, made the information difficult to copy, transmit and store. Social expectations of privacy Evolved In accordance with this. Data collection and copies made over the Internet threatens the privacy expectations of the older generation while leading the younger generation to take expectations, which are more liberal on personal information and privacy (Hollinger, 2005). Another problem is that the Internet represents both iindividuals and institutions is data security.

Discussion

The rapid emergence of online business, communication and information exchange, more than ten years or so has caused the rapid adoption of technical infrastructures, such as computers, routers and software that are relatively unsafe with regard to the purposes for which they are translated. They are more vulnerable to attacks from both outsiders and insiders, than the actual infrastructure, such as buildings, pipes, safes, cabinets and enclosures, which provide tangible property. The methods used to secure things in the material world came slowly, and society had hundreds of years of experience in the provision of physical infrastructure. Only after several decades of work have gone to ensure "intellectual infrastructure" of the Internet, high technology and computers (Hafner, 2006).

To combat the problems, Web security, many solutions have been developed. Individual PCs connected to the Internet, for example, often have anti-virus software. But these only as effective as the latest date, and many companies like Symantec, the company producing the software Norton AntiVirus, will allow customers to automatically update virus protection weekly to reflect the new, permanent proliferation of viruses.

At the corporate level, firewalls long first line of defense against intruders. A firewall is a major barrier between the two networks, a secure corporate intranet and unsecured Internet, for example. Firewalls examine incoming and outgoing data packets in accordance with established criteria, or to block them or transfer them to life. Firewalls were once considered sufficient protection against network intrusions and hackers have learned to work around them, making more complex answers, but among them are the virtual private network (VPN), which allows encrypted, secure communications pass through the public Internet. (Hollinger, 2005)

Even more complicated is the system known as Public Key ...
Related Ads