Tuesday, June 18, 2019
Anonymity and Networks Essay Example | Topics and Well Written Essays - 2250 words
Anonymity and Networks - Essay Examplethough anonymity is a desirable protective cover feature, it has certain disadvantages. Anonymity can be achieved with various security protocols like Single Socket Layer (SSL) protocol, Secure Hyper Text Transfer Protocol (SHTTP) and Transport Layer Security (TLS) protocol among others. Security protocols chuck up the sponge the establishment of secure channels across two communicating parties that are linked through an insecure network. Though the various protocols have many similarities, from each one of the security protocols has inherent strengths, weaknesses and vulnerabilities. While encryption offers some anonymity, there are certain limitations. The major challenge is the possibility of eavesdropping by local ISP or a local system administrator. The internet security protocols allow transfer of some networking information like the dealing flow route and the source-destination pair which is revealed through traffic analysis. Traffic analysis allows transmission of times data packets. The challenges associated with internet security protocols can be overcome by utilizing authentication and key agreement (AKA) protocols which tolerate a random-shared key that can be used to uphold confidentiality and anonymity and have less vulnerabilities. ... .13 role VI Proposed solutions to the challenges of internet security protocols14 finish..15 Works Cited16 Introduction In the wake of increasing dominance of internet as the preferred mode of communication, there has been a lot of pastime on the use of anonymity as a means of ensuring user privacy and security. The unprotected nature of internet networks makes them vulnerable for eavesdropping by unauthorized persons. Though anonymity can exist without the internet, the increase in internet usage has made it easier for distribution of anonymous messages. The free information flow facilitated by change magnitude internet communication poses potential security risks to individuals, businesses and government departments as well as the entire nation. As a result, various software and hardware security features have been suggested to address the issue of anonymity. This paper examines the issue of anonymity during internet use with focus on why, how, what and when anonymity should be exercised. The paper critically examines contrastive security protocols involved in anonymity on the internet with regard to the hardware and software components involved. Additionally, the potential problems arising from anonymity and the possible solutions shall also be addressed. Section I Anonymity in the context of internet communication what does it imply? One of the major concerns in internet use is the extent to which their privacy shall be
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.