.

Monday, March 25, 2019

Encryption - How Sensitive Information Is Protected on the Internet :: Exploratory Essays Research Papers

Encryption - How Sensitive Information Is Protected on the InternetHave you ever visited a web site and seen something that you cute to purchase? Were you apprehensive about making that purchase, because you were unsure of who would see your own(prenominal) information? Well, for an e-business to be successful, the leaders of that business must take picky protective cover measures to protect their customers sensitive information. The most safe method to protect sensitive information that is transmitted via the web, is encoding. Encryption is the label and scrambling of put acrosss to prevent any unauthorized access to data that is being transmitted. Applying a secret numerical code called an encryption key encrypts a marrow. This allows the message to be sent as a scrambled set of characters. If the message is to be unscrambled, it must be decrypted with a matching key. These keys consist of groups of letters, numbers, and symbols. If a website is secured by encrypt ion, you will see a small lock on the lower right hand side of your screen on the view bar. There are two basic standards of encryption. They are, full Sockets Layer (SSL) and Secure Hypertext Transport Protocol (S-HTTP). Both of these allow the client and the server computers to get it on encryption and decryption as they communicate with each opposite during a secure Internet session.Public key is a widely apply type of encryption. However, there are several different types. This type of encryption uses two different keys. One key is private while the other key is public. First, a private and public key must be created. The private key, of course, is kept secret. The public key is kept in a directory. The sender sends a message with the pass catchers public key, and the receiver uses the private key to decrypt it.Another type of internet security device is called a digital spot. This is a digital code addicted to a message that is electronically transmitted and u sed to identify the origins and content of that message. The digital signature is then used by the receiver to aver that the message was not tampered with after being sent. A digital signature is similar to a real signature, in that it is a way to be sure that the person sending the message is indeed that person.

No comments:

Post a Comment