Wednesday, June 5, 2019

E Commerce And The Importance Of Encryption Computer Science Essay

E Commerce And The Importance Of Encryption Computer Science EssayWeb-commerce has grown into one of the fastest-growing electron orbit of industry in the past two years. Billions of dollars have passed hands in the process and each entrepreneur wants a slice of the dough. To make this possible, info encoding plays a very central role in ensuring clients that paying for anything online is secure.E-commerce relies on encryption to secure data transmission by controlling data ingress and protect information on the internet and in the end improve consumer confidence. Encryption is the encryption of data using an algorithm such that it is incomprehensible to anyone in the event that the data transmission is intercepted, unless the key is known to enable file decryption. By implementing encryption, integrity is maintained while digital authentication is enforced, thus, wholeowing both customers and sellers to say the identity of the other party, a concept fundamental to secure onlin e credit card transactions. The reliability of an e-commerce website may be negatively impacted if theft of customer information occurs, especially risky since 90% of all online payments argon dealt by credit cards.4. Important of EncryptionCryptography is a method of mathematically encoding used to transform centres in to an unreadable format in an effort to maintain confidentiality of data. Cryptography comprises a family of technologies that include the followingEncryption transforms data into rough unreadable form to ensure privacy.Decryption is reverse of encryption it transforms encrypted data back into original, intelligible form.Authentication identifies an entity such as an individual, a machine on the profits or an organization.Digital signatures blind a document to the possessor of a particular key and are the digital equivalent of paper signatures. hint verification is the inverse of a digital signature it verifies that a particular signature is valid.ApplicationIn o rder to enable secure online transaction, data encryption plays four important functionsDigital authentication which allows both the customers and the merchant to be sure that they are dealing with whom, the other party claims to be. These is absolutely necessary forrader sending credit card details to the seller and also allow sellers to verify that the customer is the real owner of the credit card being used. legality ensures that the messages received re not changed during transmission by any third party.Non-repudiation prevents customers or merchants denying they ever received or sent a particular message or order.In the event that information is intercepted, encryption ensures privacy that prevents third parties from reading and or using the information to their own advantage.Two methods of encryption network traffic on the web are SSL and S-HTTP. Secure Socket Layer (SSL) and its successor Transport Layer aegis (TLS) enable client and server computers to manage encryption an d decryption activities as they communicate with each other during a secure web session. Secure Hypertext Transfer Protocol (S-HTTP) is another protocol used for encrypting data flowing over the internet, but it is limited to individual messages, whereas SSL and TLS are designed to establish a secure connection between two computers.The capability to start secure sessions is built into network client browser software and servers, and occurs automatically with little user intervention. The client and the server negotiate what key and what level of security to use. Once a secure session is established between the client and the server, all messages in that session are encrypted.There are two utility(a) methods of encryption symmetric key encryption and public key encryption. In symmetric key encryption, the sender and the receiver establish a secure Internet session by creating a single encryption key and sending it to the receiver so both the sender and receiver share the same key . The distinctiveness of the encryption key is measured by its nit length. Today a typical key will be 128 bits long (a string of 128 binary digits).The problem with all symmetric encryption schemes is that the key itself must be shared somehow among the senders and receivers, which exposes the key to outsiders who might just be able to intercept and decrypt the key, A more secure form of encryption called public key encryption uses two keys one shared (or public) and one totally private, as shown in Figure. The keys are mathematically related so that data encrypted with one key can be decrypted using only the other key. To send and receive messages, communicators first become separate pairs of private and public keys. The public key is kept in a directory and the private key must be kept secret. The sender encrypts a message with the recipients public key. On receiving the message the recipient uses his or her private key to decrypt it.Digital signatures and digital certificates further patron with authentication.Benefits/AdvantagesMost corporations implement multiple forms of security by using hardware solutions such as routers and firewalls. These devices protect essential data by keeping outdoor(a) threats out of the network. Unfortunately, burglars will employ numerous attacks, specifically targeted at your information. When attackers find a way to enter your first line of defense, data encryption locomote up and helps to ensure that your secrets cant be viewed.Encryption has changed significantly over the years, going from a military solution to widespread public use. Whether its hardware or software-based, this method is fast, easy to use and most important, secure. Here some of the key benefits this solution offersPower The best in data encryption is based on global standards, able to mitigate potential corruption without flaw. Many solutions are large enough to ensure that an entire organization is in full complaisance with security policies. Da ta encryption allows a corporation to achieve military-level security with easy and affordable solutions.Flexibility Data encryption can protect your responsive information whether its stored on a desktop or laptop computer, a PDA, removable storage media, an email server or even the corporate network. This allows you to firmly access important data from the office, on the road or at home. If the device is lost or stolen, the information will be protected by the data encryption mechanism.Transparency It wouldnt be a good idea to employ any security measure that negatively impacts your business. An efficient data encryption solution enables your business to flow at a normal pace, silently securing crucial data in the background. Some of the best options are those running in effect without the user even being aware.There are many benefits of data encryption as this solution provides solid protection in the event of a security breach. Not only does it offer peace of mind, it also fre es up resources normally used by your perimeter defenses. Every security measure you couch in place is important yet inefficient if confidential data itself is not protected.LimitationsEncryption is often oversold as the solution to all security problems or to threats that it does not address. Unfortunately, encryption offers no such protection. Encryption does nothing to protect against many common methods of attack including those that exploit bad default settings or vulnerabilities in network protocols or software even encryption software. In general, methods other than encryption are needed to keep out intruders. Secure Computing Corporations horned rattlesnake system defuses the forty-two bombs (security vulnerabilities) in Cheswick and Bellovins book, Firewalls and Network Security (Addison Wesley, 1994), without making use of any encryption.Conclusion

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.