Thursday, May 9, 2019
Anonymity and Networks Essay Example | Topics and Well Written Essays - 2250 words
Anonymity and Ne tworks - Essay eccentricthough anonymity is a desirable bail feature, it has certain disadvantages. Anonymity can be achieved done various security protocols like Single Socket Layer (SSL) protocol, Secure Hyper Text Transfer Protocol (SHTTP) and carry-over Layer Security (TLS) protocol among others. Security protocols accept the establishment of secure channels across two communicating parties that are linked through an insecure network. Though the various protocols have many similarities, individually of the security protocols has inherent strengths, weaknesses and vulnerabilities. While encryption offers some anonymity, there are certain limitations. The major challenge is the possibility of eavesdropping by local ISP or a local system administrator. The internet security protocols allow transfer of some networking information like the occupation flow route and the source-destination pair which is revealed through traffic analysis. Traffic analysis allows transmission of times data packets. The challenges associated with internet security protocols can be cover by utilizing authentication and key agreement (AKA) protocols which provide a random-shared key that can be utilise to uphold confidentiality and anonymity and have less vulnerabilities. ... .13 contribution VI Proposed solutions to the challenges of internet security protocols14 culture..15 Works Cited16 Introduction In the wake of increasing dominance of internet as the preferable mode of communication, there has been a lot of interest on the use of anonymity as a means of ensuring user privacy and security. The unprotected nature of internet networks makes them vulnerable for eavesdropping by unauthorized persons. Though anonymity can exist without the internet, the increase in internet usage has made it easier for distribution of nameless messages. The free information flow facilitated by increased internet communication poses potential security risks to individuals, businesses and organisation departments as well as the entire nation. As a result, various software and hardware security features have been suggested to address the issue of anonymity. This paper examines the issue of anonymity during internet use with focus on why, how, what and when anonymity should be exercised. The paper critically examines different security protocols involved in anonymity on the internet with regard to the hardware and software components involved. Additionally, the potential problems arising from anonymity and the possible solutions shall also be addressed. Section I Anonymity in the context of internet communication what does it imply? One of the major concerns in internet use is the extent to which their privacy shall be
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.