Biometrics on the Internet: Security Applications and Services

2002 ◽  
pp. 131-167
Author(s):  
Lee Luan Ling ◽  
Miguel Gustavo Lizárraga
Author(s):  
Troy J. Strader ◽  
Daniel M. Norris ◽  
Philip A. Houle ◽  
Charles B. Shrader

This chapter examines an entrepreneurial effort to provide products in the Internet security marketplace. The specific focus is on a company named Palisade Systems, which is now faced with questions regarding their future business direction in this field (Mahanti et al., 2004). Current questions include how to take advantage of recent legislation regarding privacy and computer security, and the general increase in awareness of the need for security in the Internet and in related networks. In this chapter we discuss the Internet security marketplace, recent legislation and the creation of new opportunities for marketing Internet security products, and how Palisade’s products may match these opportunities.


2021 ◽  
pp. 259-286
Author(s):  
Laszlo Solymar

Chapter 16 discusses the history of the computer. Important events include IBM bringing out the personal computer, and Xerox PARC inventing the graphical user interface. Paul Allen and Bill Gates left Harvard in 1975 to set up a computer laboratory. A year later Steve Jobs and Steve Wozniak set up Apple, followed soon by Dan Bricklin inventing the electronic spreadsheet. At the start of the 1980s Gates leased the MS-DOS operating system to IBM. Prior to all this, in 1969 the Advanced Research Product Agency set up ARPANET, the predecessor of the Internet. Other topics covered in this chapter include the birth of electronic mail, uses and abuses of the Internet, security and coding, and the Minitel in France. The last part of the chapter looks at the Soviet Union and the InterNyet.


Author(s):  
Keng Siau ◽  
Kent Whitacre

The Internet is one of the miracles happening in this century. Starting from a project known to a few hundred people, the Internet is now a global network and the hottest hype in the world. Its growth, however, has been slowed by the concern over Internet security. Internet security has been blamed as the stumbling block preventing the widespread acceptance of electronic business. Is Internet security really a problem? If so, what are the technologies available to alleviate this problem? How should management evaluate the existing technologies? This chapter looks at the issues surrounding e-business security. The chapter first discusses Internet security and then proposes a framework to help management evaluate existing security technologies.


2000 ◽  
Vol 2000 (4) ◽  
pp. 11-14
Author(s):  
Gerald Kovacich

2015 ◽  
Vol 45 (1) ◽  
pp. 68
Author(s):  
Denys V. Stolbov

The article presents requierents to software for teaching adolescents the Internet security. The requierements were systematized and described in three groups. The first group includes requierements to content of the software, which were made according to fundamental didactic principlles: accessibility, correctness, visualization, problem, logicality description of learning materials. The second group consists of requierements to interface of the software: authenticity, accuracy, dynamism, simplicity and detailing. An interactive requierement and an assistance system in the software were analyzed. A group of requirements to functionality and use conditions of the software was defined.


Author(s):  
Ghaith Alomari, Anas Aljarah

The businesses generate an “intranet” to hang about connected to the internet but secured from possible threats. Data integrity is quite a issue in security and  to preserve that integrity we tends to develop as to provides the better encryption processes for security. In this work  we will make a  encryption harder with enhanced public key encryption protocol for the  security and we will talk about the applications for proposed work. We will enhance the hardness in security by humanizing the Diffie-Hellman encryption algorithm by making changes or adding some more security codes in up to date algorithm. Network security has become more important to not public computer users, organizations,  and the military.With the start of the internet, security became a major disquiet and the history of security allows a better understanding of the emergence of security technology. The  internet structure itself allowed for many security threats  to  occur.When the architecture of the internet is modified it can decrease the possible attacks that can be sent across the network. Knowing the attack methods, allows  for  the suitable security to  appear. By means of the firewalls and encryption   mechanisms  many businesses protected themselves from the internet.The firms crank out an “internet" to hold around connected into this world wide web but procured from potential dangers. Data ethics is a significant dilemma in protection and also to conserve integrity we all are inclined to grow concerning furnishes exactly the encryption procedures such as the security. Inside this job we'll earn a encryption tougher using improved general security protocol to your own stability and we're going to discuss the software for projected work. We'll improve the hardness of stability by humanizing that the Diffie Hellman encryption algorithm by generating alterations or including a few far more stability codes up to date algorithm. Network safety has gotten more very important to perhaps not people users, associations, and also the army. With all the beginning of internet, stability turned into a significant vexation along with the foundation of safety makes it possible for a superior comprehension of the development of technology. Even the online arrangement itself enabled for most security dangers that occurs. After the structure of this world wide web is altered it could diminish the probable strikes which may be transmitted from the other side of the community. Recognizing the assault procedures, permits the acceptable stability to arise. With this firewalls and security mechanics many companies shielded themselves out of the world wide web.


Author(s):  
SACHIN UMRAO ◽  
MANDEEP KAUR ◽  
GOVIND KUMAR GUPTA

In this modern world, all of the persons are using the facility of internet. SECURITY is one of the major issue of the internet. Everyday highly skilled hackers breach the security and take the advantage of vulnerabilities to access the confidential data. To overcome this problem one solution was suggested named Vulnerability Assessment and Penetration Testing (VAPT). Vulnerability Assessment is the art of finding an open door. Penetration Testing involves a series of activities undertaken to identify and exploit security vulnerabilities. Penetration testing is widely used to help ensure the security of the network. Traditional penetration testing were manually performed by tester according to scheme, the process is usually complex resulting in that it is labor-intensive and requires tester to be familiar with all kind of tools. So it is very desirable to use a unified method to describe the scheme which can be identified by computer, then the computer can be used to substitute for tester to perform penetration testing. This paper gives the overview of VAPT and describes the process & methodology of Vulnerability Assessment and Penetration Testing.


2017 ◽  
Vol 7 (4) ◽  
pp. 59-78
Author(s):  
N.V. Bogdanovich ◽  
A.V. Budykin

The article adduces a research of psychological characteristics of information security of adolescents with deviant and normative behavior. 46 people from two Moscow schools were examined with a complex of four methods, one of which was the “Information Security Questionnaire" - is used for the first time. In addition, two experimental subgroups viewed videos about Internet security rules and then it was assessed how much it had influenced the responses of adolescents to spam mailing. A conclusion based on the obtained results was made, that adolescents with deviant behavior are less likely (in comparison with adolescents with normative behavior) to be exposed to negative information because of their personal characteristics and distrust of others. However, for the same reason, they are less susceptible to persuasive educational impact, including those related to information security on the Internet. Thus, it is teenagers with normative behavior who are the ones who need information security education, and the effectiveness of such education should be tested with various psychological methods.


Sign in / Sign up

Export Citation Format

Share Document