Features of Internet Security and Advantages
In this article we discuss about Features of Internet Security and Advantages . Every Internet User should know about the Internet Security Tools and Important information. So that he can secure his privacy and connection on Internet.
Read More-
Connectionless and Connection Oriented Protocol
INTERACTIVITY TOOLS FOR WEBSITES | INTERNET
Services on the Internet
What is Firewall ? Types of Firewall and Benefits
Introduction of ICT |Information and Communication Technology|
Authentication is validity in your credentials like user name? User ID and Password to verify your identity. The system determines whether you are what you say you are using your credentials. In public and private network the system authenticates the user identity via login passwords. Authentication is usually done by user name and password and sometime conjunctions with factor of authentication which refers to the various ways to authenticated.
On the other hand after your identity is successfully authenticated by the system, authorization ultimately gives you to full permission to access the resources such as information,files, databases, funds,location almost anythings. A simple terms authorization determines your ability to access the system.
Authorization is the process to determine whether the authenticated has access to the particular resources.
Read More-
Connectionless and Connection Oriented Protocol
INTERACTIVITY TOOLS FOR WEBSITES | INTERNET
Services on the Internet
What is Firewall ? Types of Firewall and Benefits
Introduction of ICT |Information and Communication Technology|
Read More-
Connectionless and Connection Oriented Protocol
INTERACTIVITY TOOLS FOR WEBSITES | INTERNET
Services on the Internet
What is Firewall ? Types of Firewall and Benefits
Introduction of ICT |Information and Communication Technology|
If you like above information about Features of Internet Security and Advantages please share this post and comment in the comment section. If your read more we provide you some links below it....
Read More-
Connectionless and Connection Oriented Protocol
INTERACTIVITY TOOLS FOR WEBSITES | INTERNET
Services on the Internet
What is Firewall ? Types of Firewall and Benefits
Introduction of ICT |Information and Communication Technology|
![]() |
| Features of Internet Security and Advantages |
Read More-
Connectionless and Connection Oriented Protocol
INTERACTIVITY TOOLS FOR WEBSITES | INTERNET
Services on the Internet
What is Firewall ? Types of Firewall and Benefits
Introduction of ICT |Information and Communication Technology|
Authentication
Authentication is validity in your credentials like user name? User ID and Password to verify your identity. The system determines whether you are what you say you are using your credentials. In public and private network the system authenticates the user identity via login passwords. Authentication is usually done by user name and password and sometime conjunctions with factor of authentication which refers to the various ways to authenticated.
Authorization
On the other hand after your identity is successfully authenticated by the system, authorization ultimately gives you to full permission to access the resources such as information,files, databases, funds,location almost anythings. A simple terms authorization determines your ability to access the system.
Authorization is the process to determine whether the authenticated has access to the particular resources.
Read More-
Connectionless and Connection Oriented Protocol
INTERACTIVITY TOOLS FOR WEBSITES | INTERNET
Services on the Internet
What is Firewall ? Types of Firewall and Benefits
Introduction of ICT |Information and Communication Technology|
Difference Between Authentication and Authorization
Authentication
- Authentication confirm your identity to grant access to the system.
- It is the process of validating users credentials to gain user access.
- Authentication usually requires username and password.
- Authentication is the first stop of authorization.
Authorization
- Authorization determines whether you are authorize to access the resource.
- It is the process of verifying whether access is allowed or not.
- Authorization depending on the security level.
- Authorization is done after successfully authentication.
Cryptography
Cryptography involves creating written or generated course that allow information to be kept secret. Cryptography converts data into a format that is unreadable for an un authorize users. It is allow transmitted information without unauthorize details entries decoding it back into a readable format. Thus compromising the data.
Information security uses cryptography on several levels. The information can not be read without key to decrypt it above the transport layer. Which is a network connection component above the program layer.
It is allow asymmetric cryptography mechanism in which a web browser creates a public key and private key.
Objectives of SSL
Data Integrating
Data is protected from tempering.
Data Privacy
Data Privacy is ensured through a series of protocol such as SSL record protocol , SSL handshake protocol , SSL alert protocol.
Client Server Authentication
SSL Protocol use standard cryptography technique to authenticate the client and server.
Read More-
Connectionless and Connection Oriented Protocol
INTERACTIVITY TOOLS FOR WEBSITES | INTERNET
Services on the Internet
What is Firewall ? Types of Firewall and Benefits
Introduction of ICT |Information and Communication Technology|
File Organs Organization
File organization ensured that records are available for processing. It is use to determine and efficient file organization for each base relation.
There are three type of file organization -
- Sequential File access organization
- Direct access file organization
- Index sequential access file organization
Index Access File Organization
- It's combination of both sequence and direct access file organisation.
- In this record store randomly on a direct access device such as magnetic disk by a primary key.
- This file have multiple keys. These keys can be alpha-numeric in which the records are in order called primary key.
- The data can be access either sequentially or randomly using the Index. The Index is store in a file and read into memory when the file is open.
Advantage
- In this sequential or random file access is possible.
- It access the record very fast. If the index table is properly organised.
- The records can be inserted in the middle of the file.
- A provide quick access for sequential and direct processing.
- It reduce the degree of sequential search.
Public Key Cryptography
In this two keys are used. This types of encryption also called Asymmetric Cryptosystem.
One key is public key that anyone can access and the other key is the private key and only the owner can access it. The sender encrypt the information using a public key. The receiver decrypt the message using the private key.
A private key is known only owner.
A public key is distributed to any user who request it because private and public keys are related to mathematically. Someone could take another person public key and perform complex mathematical calculation on it and extract the corresponding private key.
Read More-
Connectionless and Connection Oriented Protocol
INTERACTIVITY TOOLS FOR WEBSITES | INTERNET
Services on the Internet
What is Firewall ? Types of Firewall and Benefits
Introduction of ICT |Information and Communication Technology|
Private Key
A private key is known only owner.
Public Key
A public key is distributed to any user who request it because private and public keys are related to mathematically. Someone could take another person public key and perform complex mathematical calculation on it and extract the corresponding private key.
Read More-
Connectionless and Connection Oriented Protocol
INTERACTIVITY TOOLS FOR WEBSITES | INTERNET
Services on the Internet
What is Firewall ? Types of Firewall and Benefits
Introduction of ICT |Information and Communication Technology|
Revision Tool
Traffic Shaping (Packet)
Traffic shaping also known as Packet Shaping. It is a management technique that delay certain types of packet to optimize overall network performance. It is a type of network bandwidth management for the manipulation and prioritization of the network traffic to reduce the impact of heavy uses cases from effecting other users.
Traffic shaping identifies and classifies traffic streams priority. High priority traffic is forwarded immediately and low priority traffic is rate limited using various method.
The benefits of traffic shaping include converting network technologies into a common network architecture and guarantying performance requirement for critical application.
SSL (Secure Sockets Layer)
SSL is standard protocol used for the secure transmission of document overall network.
In SSL, the word socket refers to the mechanism of transferring data between a client and server over a network.
When using SSL for secure internet transactions a web sever need and SSL certificate to establish a secure SSL connection. SSL connection segments.
FODI (Fiber Distributed Data Interface)
FODI is a set of ANSI (American National standard Institute) and ISO standards for data transmission and fiber optic line in a LAN that can extend in range up to to 200 km.
FODI protocol based on the token ring protocol, FODI is frequently use on the backbone for a WAN.
FODI Network contain to token rings, one for possible backup in case the primary ring fail. The primary ring offers up to 100 Mbps capacity. If the secondary ring is not needed for backup it can also carry data standing capacity to 200 Mbps.
Message Switching
Messaging is one of the initial mode of switching which help a lot in the proliferation of the electrical communication. It is interesting to know the electrical common in the form of telegraph arrive earlier than the telephone.
Let us define message switching with the help of this example-
User send telegraph off come to a telegraph office with his message and hand it over the computer operator. Here sequence of events occurs-
- This message is shorted on the basis of the receiver address and bundled with other message moving in the same direction.
- The operator in this case does not bother if the entire path is available or not. He just forward this message to the next node in the path.
- The operator at the next node receive all these messages stores, sort and forward them.
Circuit Switching
Circuit switching is a connection oriented network switching technique. Here dedicated root is establish between the source and destination and the entire message is transfer through it.
Read More-
Connectionless and Connection Oriented Protocol
INTERACTIVITY TOOLS FOR WEBSITES | INTERNET
Services on the Internet
What is Firewall ? Types of Firewall and Benefits
Introduction of ICT |Information and Communication Technology|
Connectionless and Connection Oriented Protocol
INTERACTIVITY TOOLS FOR WEBSITES | INTERNET
Services on the Internet
What is Firewall ? Types of Firewall and Benefits
Introduction of ICT |Information and Communication Technology|
Faces of Circuit Switch Connection
Circuit Establishment
In this face a dedicated circuit service establish from the source to the destination through a number of intermediate switching centers. The sender and receiver transmit communication signals to the request and acknowledge establishment of circuit
Data Transfer
Once the circuit has been establish data and voice are transfer the source to the destination.
Circuit Disconnection
When data transfer is complete the connection has been removed.
Read More-
Connectionless and Connection Oriented Protocol
INTERACTIVITY TOOLS FOR WEBSITES | INTERNET
Services on the Internet
What is Firewall ? Types of Firewall and Benefits
Introduction of ICT |Information and Communication Technology|


<< Home