SSL (Secure Sockets Layer) the most widely used and most powerful measure in security technology for creating an encrypted link between the Web Server web browsers. If the link is encrypted, they use https protocol. Secure receptacle Layer (SSL) and Transport Layer Security (TLS) is the protocol above TCP, which can protect user’s confidentiality when they sending data from a customer side to a web server; this is an important protocol due to the extension of Internet. In fact, it is a long way to make the SSL/TLS protocol fully. However there are still flaw and problems during the development of SSL/TLS, and we cannot deny that there maybe some other potential security hole in the latest version. sequential attack is fatal for both the user and the company in using these protocols to establish a safe channel to transfer information. This article will introduce three typical attacks: Cipher suite Continue reading
Information Systems Management
Bitcoin – Meaning, Transactions, Mining and Network Security
Bitcoin is a decentralized virtual cryptocurrency, launched in 2009 by an unidentified person known as Satoshi Nakamoto. It does not rely on any central services for managing the creation or flow of money. It relies on cryptographic algorithms in order to prevent abuse of the system. It is abbreviated as BTC and is powered by a peer-to-peer network in the public domain both in terms of issuing and valuation. Until Bitcoin €™s invention, online transactions always required a trusted third-party intermediary. For example, if a person A wanted to send $10 to B over the Internet, he would have had to depend on a third-party service like Paypal. Intermediaries like Paypal keep a ledger of balance of account holders. When A sends $10 to B, Paypal deducts this amount from A €™s account and credits it to B €™s account. The digital money could be spent more than once without Continue reading
Why is Big Data so Important in Today’s World?
In the ever-changing, globalized economy, companies have started depending on assessments advanced by their internal processes, business operations, and customers to explore new opportunities for advancement and growth. Such insights present a massive intricate set of data that are produced then managed, analyzed, as well as manipulated by experts. The collation of such a large amount of data is collectively referred to as big data. The numerous peta and terabytes are presently considered as the big data benchmark. The main characteristics which describe big data include; volume which refers to the amount of produced and stored data that determines the potential and the value of the insight and if it can truly be assumed as big data or not. Secondly, the variety referring to the nature and type of the data to assist the data analyst to successfully use the subsequent insights; Velocity refers to the speed that determines how Continue reading
Common Access Card (CAC) Deployment
The Common Access Card or CAC is a smart card designed to be used as an ID card that enables physical access to buildings and controlled space like server rooms and for access to computer systems and networks. Department of Defense (DoD) deployed this system to meet its high security requirements for authentication of personnel entering in the Department’s buildings, controlled areas and computer networks. Common Access Card is a smart card that has public key infrastructure (PKI) features to provide secure system functionalities such as authentication, data integrity, confidentiality and non-repudiation. CAC stores the private key of the client certificates, used with PKI cryptography program, in the card and it is hard to extract this key from the card. Common Access Card relies on public key systems and certificates which are way more secure than the current common username and password based identity management systems. An important consideration with Continue reading
Comparison Between Proprietary Software and Open Source Software
Proprietary software can be defined as closed software that is distributed under a license agreement that limits any modifications to the software. Its just opposite to the concept of Open source software. Open source software can be defined as software that is distributed freely under a license agreement with no limitations on changes made to the source code. Many proprietary corporations make software freely available to users. For example, Adobe provides users with the Adobe Acrobat Reader. The Adobe Acrobat Reader is an application that users to view documents that have been saved in the portable document format (PDF). The PDF format is developed by Adobe and has become a standard in saving files as electronic documents. ‘Standardization’ and ‘compatibility’ are the two main drivers for the success of proprietary software. Any user that opens a PDF formatted document with Adobe Acrobat Reader is confident that the document will be Continue reading
Importance of Computer in the Modern Society
Computers are now a fact of life. Computers have created a very effective information system to help streamline the management of an organization. This makes it a much needed tool for every business, banking, government, entertainment, daily life, industry, education, and administration. It can be said of all large organizations, whether the department government or private, use a computer for a variety of their daily business and it is the fastest growing industries in the world today. Each organization usually has one or more large computer systems and a number of microcomputer. The system is a great computer for data processing tasks, while many small microcomputer to use as word processing. Computers have become part of our lives is essential. In general, the use of computers can be divided into several groups. It is known that the rapid growth of computer usage time. In all areas have been using computers Continue reading