Friday, March 29, 2019
The Role Of Internet And Web Service
The Role Of  net And Web ServiceThe roll of internet The internet is a  universal proposition technology platform that allows any computer to communicate with any  separate computer in the world. Further much,  iodin of the  improvements of the internet is that nobody really owns it. It is a  orbicular collection of networks,  twain big and small. These networks connect together in many different  modalitys to form the single entity that we k at present as the internet.2) The internet has revolutionized communication and thereby its contribution to  schooling sharing. With access to a computer and an appropriate connection, anyone  raft interact with others worldwide however the  weathervane is designed to  switch over un structured information while people  derriere read  tissue pages and understand their meaning, computers can non.3) If corporations want to conduct business  everywhere the  sack up, humans have to be involved unless there is a  guidance for computers to communicate    on their own.Web  attends-Web  returnss  stand for a complementary and dominant role in building global IS for todays dynamic business world. Web  run  be self-contained, modular  industrys that can be described, published, located and  produced over a network.Web  serve  practice functions ranging from simple requests to complicated business processes. Once a web service is developed, other applications and other web  go can discover and invoke the deployed service  through with(predicate) universal description, discovery and integration. The idea of web service is to leverage the advantages of the web as a platform to apply it to the application  go. We use them, not just to the static information. function refer to components and the services offered that can be  employ to build larger application services.Benefits of web services for developing IS of global natures are as followsWeb services  to a faultls are available for most computer systems, including mainframes and package   d applications. This means that not  that the  exist applications can be retained, but  alike the existing knowledge of staff can be applied and extended  exploitation web services for business integration.Web services are  convertible and can handle changes ore readily than other integration solutions, because they use structured text as their message format.IT managers now have the ability to exchange  data between most applications, on most computers in a consistent and standard way tools and further standards are therefore  emerging to build composite applications that can model and manage business processes  some these business- direct components.If  prerequisite, an alternative application can be used to provide web services without  changing the overall effect of the system.Q-2.How do distributed information systems  service of process the global enterprises?Ans) Distributed information systems help the global enterprises as follows-Success in the digital economy led by the r   ise of e-business. Business  mop up and pressures are on the rise like never before.Business now has no geographical boundaries. With the rise of  supple commerce fuelled by mobile technologies. We are now witnessing the era of anywhere anytime computing. Naturally, information that has been one of the  full of life  bodied resources assumes a higher dimension when it comes to data and information  protection. at that place is an important point to be noted-while the industrial age witnessed great developments in terms of engineering, a significant dimension. Producers and consumers of goods all remained disparate and un affiliated. They operated is islands of geographical pockets without  intimate how the others were transacting their business.Q-3 briefly describe about the information level  terrors versus  net level threats?Ans) information level threats versus network level threats-Information level threatsNetwork level threatsInformation level threats are threats that involve t   he dissemination of information in such(prenominal) a way that organizations, their operations and their operations and their reputations  may be affected.1. Network level threats face any application that is connected to an IP network such as the Internet or includes campus and corporate networks. Servers and clients for Email and web applications have faced these threats for ten  days or more, and the range of threats and the technologies used to exploit them is well understood.Information level threats also make heavy use of network but at the  chief(a) level is the content of a message and not its form. Sending  income tax return inquires to service accounts to eat up resources would qualify as an information  found attack as it is the content of the messages that would provide a basis for the attack.The  pattern of information  ground accusation. Such attacks can cause considerable  rail at to the good im destiny of the organization against which they may be launched, and custo   mer loyalty is too good to lose.2. network based threats are hacking of computer systems and launching of  res  human racea attacks as well as spreading malicious code such as viruses. Other  earnest issues involved when data are  transfer over networks are confidentiality,  certificate, integrity and non-repudiation.A DOS attack that is based on flooding accounts with large quantities of e-mail is a network-based attack as it is the size and the quantity of the e-mail that matters and not the content of the e-mail.Part BQ-4 how the  security department challenges presented by mobile devices and information systems access in  radio computing environments?Ans) Mobile computing with real world significance has been expanding since the  demonstration of laptop computers into everyday use. During the last few years new classes of  little wireless portable devices have come to the market place.The possible and  seeming shift from wire-line terminals to relatively cheap, wireless, small,    portable devices in huge numbers poses as such new challenges to the security in the network  radix. This holds not only for the air-interface, but also for the wire-line backbone network. It is foreseeable that, e.g. roaming between different types of networks becomes necessary and possible. Evidently, secure roaming between the networks is an issue, because otherwise a hostile terminal could take-over a session during hand-over from a network to another.2) The scope of the security issues related with the terminals will be enhanced as compared to the current voice terminals on one hand and the fixed terminals on the other hand. This is because the internet-enabled terminals will be used as PTDs. to conduct diverse mobile electronic commerce  proceedings and possibly also transactions towards the authorities. They are also natural part of information systems of corporations.Thus, such a terminal becomes a much more attractive object for ordinary thieve s or  true fir other people w   anting to misuse the cyber-identity of the owner, than the current voice terminals. The information stored into such a device or the access to the corporate networks through stolen device may also be interesting for criminal elements, enemies, or for hard commercial competitors.3) Location -based services are emerging as a brand-new service typical of the globally roaming PTDs. The possibility to  atomic number 82 the  psyches location at any time is evidently a threat to privacy. The location-based services also entail many security aspects for instance, if a robber could track a persons position unnoticed, he/she would know when the owner is  farther enough so that the home could be robbed. And vice verso, if a person can show her trace on earth she can  contend against claims raised against her in criminal cases.Q-5 what is the role of Information Security Scenario in the  pecuniary sector?Ans) Parma Systems, Inc.allows financial organizations to protect their data communications    against both internal and external security risks.The last twelve to fifteen years have seen a fundamental transformation occur in the financial services sector  mergers and acquisitions, regulatory changes, the globalized economy, new  makements for anytime, anywhere access and the changing role of the technology have reshaped the industry and significantly altered the way financial organizations must manage their businesses. In response to these challenges, financial services organizations have implemented a number of new corporate strategies,  hostile management and access capabilities, and extended networking infrastructure. However, the infrastructure that supports these new processes is often managed by a myriad of legacy and inherently complex set of networking and security systems. This creates significant complexities with regards to network connectivity and security management.Additional information security challenges  pinch from a series of legislative and regulatory in   itiatives  including the Sarbanes-Oxley Act (SOX), Graham-Leach-Bliley Financial Services Modernization Act (GLBA), and the European Data Privacy Directive (EDPP). These laws require enhanced security and privacy, and raise the legal and financial stakes for enterprises that  extend to meet their standards. More legislation that further controls the protection of privacy data is also on the way.Parma Systems, Inc.technologies are designed to help your organization to  efficaciously manage security risks, and comply with external and internal security policies. The Parma  carrefour suite allows for your organization to customize and develop a robust, secure, and scalable  yield that can  grapple the most stringent secure connectivity requirements  now and in the future.Q-6 explain the significance of authentication security service?Ans) There are two components of security in mobile computing security of devices and security in networks. A secure network access involves the mutual au   thentication between the device and the base stations or web servers. This is to  witness that only authenticated devices can be connected to the network for obtaining the  put across services. No malicious node can impersonate the service provider to trick the device into doing something it does not mean to. Thus, the networks also play a crucial role in the security of mobile devices. Some  high-flown kinds of attacks to which mobile devices are subjected to be push attacks, pull attacks and crash attacks.Authentications services security is important given the typical attacks on mobile devices though wireless networks denial of services attacks, traffic analysis, eavesdropping, man-in-the-middle attacks and session hijacking.Cryptographic security for mobile devices-Cryptographically generated addresses. CGA are internet protocol version 6 addresses where up to 64 address bits are generated by hashing the address owners public key. The address owner uses the corresponding private    key to assert address ownership and to sign messages sent form the address without a public-key infrastructure of other security infrastructure.For exp, the cryptographic provider manager in  thenar OS5 is a system-wider suite of cryptographic services for securing data and resources on a palm-powered device. The CPM extends encryption services to any application written to take advantage of these capabilities, allowing the encryption of only selected data or of all data and resources on the device.  
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment