StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Secure Procedures for Certificate Delivery - Essay Example

Cite this document
Summary
This paper 'Secure Procedures for Certificate Delivery' tells us that with the imagination of the human mind, racing at the speed of light it is quite evident how it affects for technology. Because of the fast-paced human thought process, new technologies emerge every day. Technologies in the socio-sphere of life bring along its issues. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.5% of users find it useful
Secure Procedures for Certificate Delivery
Read Text Preview

Extract of sample "Secure Procedures for Certificate Delivery"

Nevertheless, along with it has come the intriguing question of “how safe is it to share?” (Martinelli, 2006)

The advent of the Internet has provided some breakthroughs. Social networking and virtual worlds are gaining in popularity and are opening new avenues for businesses. VoIP and video conferences eliminate the limitations businesses encounter due to geographical boundaries largely. These provide opportunities for various business houses to advertise, share information with their collaborators, receive feedback on their products, equipping them with the cutting-edge technologies needed to grow. Thus, to be successful in this highly competitive global business environment, enterprises increasingly adopt flexible, distributed working practices.

The outcomes from virtual collaborations form the fundamental contributions to corporate information and knowledge assets. These assets are used for later analysis of data to assist in decision-making, designing action plans for the management. They also provide critical information regarding corporate strategies, operating principles, client information, personnel records, and so on. It is thus of much importance that these information assets be protected.

As better ways to collaborate keep coming up, the risks involved in it also increase manifold. Increased reports of cybercrimes are quite disturbing to the new-age collaborator fraternity. According to the Georgia Tech Information Security Center (GTISC) annual report, five major threats have emerged as major concerns. Malware, Botnets, cyber warfare, threats to VoIP and mobile devices, and the "evolving cybercrime economy".

Malware development proficiency is rapidly growing, perfectly suited to exploit the weaknesses of poorly configured sites, in particular social networking websites. Reports indicate an increase up to 10 times of malware object detection in 2008.

A Botnet infection may occur even through genuine Web sites. With subtle delivery techniques, users do not have to do much, except load a Web page, triggering a Botnet infection. Around 10 million bot computers are used to spread spam and malware over the net every day.

A major issue of concern is Cyberwarriors equipped with computer technology use their power to decline, curb or confuse their enemies’ military, economic and infrastructure assets.

VoIP traffic, like e-mails, is being targeted for various scams, frauds, and thefts. Mobile devices draw cybercriminals as they are easy targets and are used frequently for transacting business and providing access to sensitive data.

Cybercriminals have become increasingly specialized, controlled, and profit-driven costing businesses a fortune.

These concerning issues have forced agencies to spend a good amount to ensure information security. Researchers believe in a three-pronged approach to meet these threats. Technology, Regulation, and Education might be the answer to them. (Martinelli, 2006) 

Technical security measures fall into three primary categories: Network Security, Host-Application Security, and Subscriber Access Security. Message encryption, Firewalls, Prevention of Denial of Service (DoS) attacks, Spam prevention, Access Control, Server Security are examples of various technical policies in place to counter threats. DomainKeys Identified Mail (DKIM) and Sender Policy Framework (SPF) to sign e-mails, along with user education, are technologies that can nearly eliminate phasing as a problem.

Placing government regulation is one of the avenues being implored. Something similar to auto insurance, which is mandatory for auto owners to buy government could also require the software users to procure and update necessary security applications.

Information security is everyone’s responsibility. Thus, users must be educated. Personal information such as social security numbers, bank accounts, and passwords must never be shared on social networking sites. Privacy options must be scrutinized. User discretion is needed on the very ground level and sensitive information must not be disclosed.

We stand at a very early stage watching information security evolve. A socio-political outlook on managing information security is likely to present new insanities to various concerns. The need of the hour is a reasoned approach to information security that will bring out what role organizations and governments play, and what responsibilities they have as "good internet citizens". (Martinelli, 2006)

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“CIS Essay Example | Topics and Well Written Essays - 750 words”, n.d.)
CIS Essay Example | Topics and Well Written Essays - 750 words. Retrieved from https://studentshare.org/miscellaneous/1518145-cis
(CIS Essay Example | Topics and Well Written Essays - 750 Words)
CIS Essay Example | Topics and Well Written Essays - 750 Words. https://studentshare.org/miscellaneous/1518145-cis.
“CIS Essay Example | Topics and Well Written Essays - 750 Words”, n.d. https://studentshare.org/miscellaneous/1518145-cis.
  • Cited: 0 times

CHECK THESE SAMPLES OF Secure Procedures for Certificate Delivery

Network Security Research

Consequently, it is designed to support its own operations for retransmission of authentication request and order delivery.... The first stage involves an SSL certificate that activates encryption of confidential data that is transmitted during online transactions.... The second stage involves an allocated view for each SSL certificate along with unique credentials that identifies the certificate owner.... Lastly, the third step includes a certificate authority that authenticates the identification of the certificate owner prior to the issuance (Secure sockets layer (SSL): How it works - SSL Encryption/https from VeriSign, inc....
3 Pages (750 words) Coursework

Computing and Web Technologies

delivery details will be asked during checkout.... This paper ''Computing and Web Technologies'' tells us that the author would like to thank the adviser and the management of East Eat Chinese Takeaway Restaurant for rendering their time, support, for guiding the author throughout the development of the project....
28 Pages (7000 words) Coursework

Law of Electronic Commerce and the Internet

Every citizen in Australia is subjected to legal systems.... They are state and federal systems.... In general the state courts have magistrates court, county court and Supreme Court.... The Federal courts system contains of Federal court, family court and High court.... ... ... ... The high court is the highest court to appeal for any person or organization....
10 Pages (2500 words) Essay

HSM Performance Optimization by Using a Key Pool Solution

The signing service does not keep track of users and user keys, but simply generates a new signing key and signed certificate for each signature.... ) It provides proof of signing time as the certificate is generated at the singing time.... )The signature is always associated with a certificate that has sufficient remaining validity time for the intended use of the signed document.... )The certificate content can be adapted to the intended use of the signature such as whether the certified should contain a private or professional identity....
21 Pages (5250 words) Research Paper

HSM Performance Optimization

The present essay entitled "HSM Performance Optimization" dwells on the key pool solution for of Hardware Security Module (HSM) devices that serve to increase the performance by decreasing the response time when processing signing requests in a Digital Signature Service.... .... ... ... Today's electronic identification system does not meet the current requirements for e-IDs, hence it needs to be upgraded – especially in terms of advanced embedded security controls....
30 Pages (7500 words) Essay

Principles of Computer Security

It binds public keys with specified user identities by using the certificate authority (Bosworth and Kabay, p.... rust and certificate Verification is used to verify the authenticity of digital certificates that are offered by a party.... Crypto API is used to verify if a party that offers a certificate is really the owner and if the certificate is authentic or forged.... Cryptography is the process used in computer engineering used for providing secure communication to avoid interception of the message by unauthorized parties....
6 Pages (1500 words) Coursework

International Workshop on Security Protocols

They ensure the secure delivery of data between two parties when used with communication protocols.... The certificate also contains the subject which is the identity of the website owner.... ne must make a certificate signing request on their server to be able to get a certificate.... This request creates a private key and a data file that one sends to the SSL certificate giver.... The certificate authority then uses the data file to make a public key to match the private key without having to compromise the key itself....
8 Pages (2000 words) Report

The Implication of EU Energy Performance of Building Directive

This article discusses the anticipated efficiency and effectiveness of the application of the energy certificate on the existing building stock in the UK.... Incentives need to be introduced to support taking up the improvements recommended by the energy certificate.... Effective results can probably be expected from introducing regulations combined with energy certificate standards, but it requires a rather drastic approach and needs time to receive sufficient commitment....
69 Pages (17250 words) Report
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us