¶ … Security
Cryptography
In order to maintain information secrecy one would use cryptography. This is intentionally making information unintelligible. This method is mainly employed during the transmission of information. Cryptography ensures that only the intended person would be able to decipher the information (Whitman & Mattord, 2011, p. 339). The process of deciphering encrypted text is referred to as cryptanalysis. Cryptology is the mathematics branch covering cryptography and cryptanalysis. Cryptology has been in use since 1900 B.C. In Egyptian hieroglyphs. A Mesopotamian cryptography was discovered in 1500 B.C. that surpassed that of the Egyptians. The book of Jeremiah was written using alphabet substitution called ATBASH. Cryptography was employed during the First World War to decipher radio communication. Prisoners have also used cryptography to decipher their messages in order to protect their privacy. A key in cryptography is a parameter or piece of information that would determine the functional output for a cryptographic cipher or algorithm. Without a key, no useful result would be obtained from the algorithm. A key is vital for encrypted text in order for the receiver to decrypt the message. The three basic cryptography operations are substitution, transposition, and XOR (Whitman & Mattord, 2011, p. 342). Substitution involves substituting one value for another. Transposition is a way of rearranging the values in a block to generate cipher text. This cane b performed at bit or byte level. Exclusive OR (XOR) is a Boolean algebra function that compares two bits if they are identical they result to a binary zero, if not the same they result to a binary one. Hash function is another encryption technique integrated in cryptology. A hash function is a mathematical algorithm that will generate a summary of the message in order to confirm its identity and affirm that no changes have occurred to the content (Whitman & Mattord, 2011, p. 350). Hash functions do not create cipher text, but they confirm the identity and integrity of the message necessary for e-commerce.
The keys used for decryption and encryption are the differentiating factors between asymmetric and symmetric encryption. Symmetric encryption systems use one key for encrypting and decrypting a message (Whitman & Mattord, 2011, p. 354). Asymmetric encryption makes use of two different keys. The two keys are related and if one is used to encrypt only the other can decrypt the messages. To ensure that the recipient receives the secret key for decrypting the sent message in symmetric encryption, the sender must send the secret key using a different band or channel. Sending the secret key using another channel ensures that the key is not intercepted with the message. Public key encryption is also called asymmetric encryption. The person sending the message uses the receiver's non-secret public key to encrypt the message. The receiver will then use their private key to decrypt the message. The main advantage is that the non-secret public key cannot be used to decrypt the sent message. The six components for PKI are certificate authority, revocation, registration authority, certificate publishing methods, certificate management system, and PKI aware applications. The digital signature verifies the authenticity of a message. A digital signature is an encrypted messages hash, which the recipient can check to establish if the message has been tampered with by comparing the hash value to that of the decrypted certificate. Digital certificates bind public keys to entities (Whitman & Mattord, 2011, p. 365). If there were no certificates, it would be easy to forge the signature because the recipient would have no way of confirming the public key. Holding a single conversation would require the two parties to make use of four keys in asymmetric encryption, while in symmetric encryption the two parties must both have the secret key. Another drawback is that if the key falls in the wrong hands the messages could be decrypted by other parties. Using Diffie-Hellman key exchange, two parties can carry out efficient, secure communications. Steganography is the process of hiding information to protect its confidentiality during transit. It is not a cryptography form. The hidden information is embedded within other information in a harmless manner. Steganography is used when there is no possibility of encrypting the information.
The security protocols mostly used in web-based electronic commerce are Secure Electronic Transactions, Secure Sockets Layer, and Secure Hypertext Transfer Protocol. The protocols used to protect e-mail are Privacy Enhanced Mail, secure Multipurpose Internet Mail Extensions, and Pretty Good Privacy. The two modes of IPsec are tunnel and transport. Dictionary attacks and timing attacks make use of pre-identified terms to attack cryptosystems. Brute force attack is the...
First, as Personal Trainer expands globally, the system will be available through web browsers anywhere in the world. Second, the ease of completing system upgrades across all users at the same time needs to be taken into consideration, and the use of the Web-based system architecture hosted on a Software-as-a-Service (SaaS) platform is critical. Third, by taking this approach Susan can b e assured there will be higher levels
The company's consistent top line revenue growth also illustrates it has been successful in transforming its supplier network into one that operates more on knowledge, less on purely price or product decisions. As a result the company is capable of competing more at the process level and less at the purely price-driven one (Reese, 2007). In terms of the company's factors for success, the greater opportunities is to move into
The truth of the matter is the biometric templates for identity enrolment that are stored on a server are not in the real since images rather they are mathematical representations of the data points that the biometric algorithm is able to extract from the scanned fingerprint, finger vein, palm vein or iris. The identifying template is a binary file that has a series of zeros and ones. The algorithm then
Healthcare Information Systems Faculty of Information Technology at the Queensland University Australia, have written this article to point out the need to change the method of access control in the current health care environment. They have introduced this method keeping in the mind the latest information technology system structures, legal and regulatory requirements and the demands of security operation in the Health Information Systems. The authors have proposed "Open and Trusted
Business Information Systems What is a Business Information System? A program involving a business information system would prepare the person who is studying the intricacies of the process to be able to oversee the efficient and proper manner in which to use computer hardware and software systems. The individual who has completed the training process in a business information system would be able to work as a computer programmer, or a
Strategic Information Systems'? A strategic information system is a system that enables an organisation to alter the structure of its business strategy so that it can achieve a competitive advantage over others. This system also helps organisations in fastening the time it takes to react and adapt to several environmental changes that take place and makes the overall business structure more efficient. Within a strategic information system there exists a
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now