Internet and E-Business Security

Internet and E-Business Security

Violeta Tomaševic (Mihajlo Pupin Institute, Serbia), Goran Pantelic (Network Security Technologies – NetSeT, Serbia) and Slobodan Bojanic (Universidad Politécnica de Madrid, Spain)
DOI: 10.4018/978-1-60566-014-1.ch105
OnDemand PDF Download:
$30.00
List Price: $37.50

Abstract

Originally developed for research and education purposes as Arpanet in 1970s, the Internet has become a worldwide network that offers numerous services to the immense community of users. An everyday progress of the network technology brings also new security risks regarding a lot of sensitive data transferred over the network, especially in banking, commercial, and medical applications. Therefore the Internet security could be in general defined as a set of measures that should prevent vulnerabilities and misuse of data transmitted and used through the network.
Chapter Preview
Top

Security Policy, Technologies, And Methods

Organizations that plan to own or use available Internet services have to consider all potential threats, decide which defense measures to undertake and implement them in an effective way. Analysis of system and risk factors (Oteteye, 2003; Schechter, 2005) results in a security policy that represents a proposal of measures regarding system administration, authorization and access control, network protocols, and cryptographic methods.

In the environments like wireless network, ubiquitous computing, and Web services, the security should be analyzed in the same way, having in mind their characteristics.

Key Terms in this Chapter

Authentication: Procedure that verifies the digital identity of participants in communication. It guaranties that the users are exactly who they say they are.

SOAP: Service oriented architecture protocol is a XML-based protocol for the exchange of information in a decentralized, distributed environment.

Smart Card: Plastic pocket-sized card with built-in memory and microprocessor chip that can perform different security operations.

Cryptographic Protocol: Distributed procedure defined as a sequence of steps that precisely specify the actions required of two or more entities to achieve a safe communication channel.

SSO: Single sign-on is a special type of authentication that enables a user to authenticate once and allows access to the multiple systems.

Ubiquitous Computing: A computing environment that includes the different types of computers and mobile devices whose functions are integrated into everyday life.

WEP: Wired equivalent privacy is a set of security services used to protect 802.11 wireless networks from unauthorized access. Its security features are improved by Wi-Fi protected access (WPA).

Digital Certificate: Digital identity of user, which represents a relation between the user’s public key and the user’s personal data. The certificate authority signs and issues the digital certificates.

Digital Signing: Procedure that creates a digital signature of data. The digital signature is used to prove data integrity, nonrepudiation, and users authentication.

PKI: Public key infrastructure is a technology that realizes an environment for efficient applying of public key concept. It enables a generation of key pairs and digital certificates of users, as well as their application in the system.

Complete Chapter List

Search this Book:
Reset