Thursday, October 17, 2019
Security through authentication and Encryption Essay
Security through authentication and Encryption - Essay Example Security issues are the ones that Government take pride for determining technical standards within the domain of the private sector. Since technology is on its way to implement some technical standards to secure communication mode, first of all it mandates standards to mandate Internet commerce and communication. Among the most significant issue concerning technical standards is the usage of security and authentication. Authentication is not only required in communications between organizations and clients but is also a considerable issue in making electronic payments over the Internet. Depending on the direction and interactivity, authentication requires some previously stored data while communicating online. Authentication while encrypting the data allows any organization to get security over the network, thereby utilizing its resources without any hassle or threat of being attacked by the hacker. Encryption not only provides confidentiality to an organization when most often used with ââ¬Ëhttpsââ¬â¢ protocol, but by authenticating the data it provides non-repudiation that travels over a network or stored on a system. Except for the fact that authentication gets costly to organization and there is a risk of passwords vulnerability, there are no other limitations for authenticating your network. Since passwords are vulnerable to brute-force attacks or forgetfulness they are also subjected to a threat of weak password authentication. For example if a manager sends an application inclusive of passwords in plain text while not encrypted, to the authenticating server, any network sniffer can figure out the password, whether it is 250 or 2 characters long. A physical form of authentication is deployed in large organizations, government and military agencies that measures physical attributes, called ââ¬Ëbiometricsââ¬â¢. Since it is economically not
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.