Warning: Use of undefined constant referer - assumed 'referer' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 102

Warning: Use of undefined constant host - assumed 'host' (this will throw an Error in a future version of PHP) in /usr/home/essaywo/public_html/essays on line 105

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 106

Warning: Cannot modify header information - headers already sent by (output started at /usr/home/essaywo/public_html/essays:102) in /usr/home/essaywo/public_html/essays on line 109
Internet 2 - Online Essay

Internet 2


There has been a great deal of excitement in the media over the significant commercial potential of the internet. Many commercial enterprises are viewing the internet as a significant element of their business operations. They see it as a means of advertising, selling and supporting their product globally.However, there are certain critical area such as security that if not adequately addressed could cause the usefulness of the internet to erode rapidly. Brian Hurley & Peter Birkwood in Doing Business on the Internet said that there are three main areas of security relevant to the internet business:Fradulent use of credit card information related to on-line financial transactions, General ...

Want to read the rest of this paper?
Join Essayworld today to view this entire essay
and over 50,000 other term papers

potentially prying eyes. Moreover, there is no one to verify the validity of the credit card. To ensure that the person using the card is actually the card holder. The buyer might have exceeded the limit or can be using a stolen card. Likewise, the buyer has no assurance that the vendor on the other end is who he/she claim to be. Richard E. Smith in Internet cryptography says that data travels from one computer to another leaving the safety of its protected surroundings.
Once the data is out of the sender's hand it can fall into the hands of people with bad intention. they could modify the data for their amusement or for their own benefit. To protect the data moving across the network, encryption has been introduced. The crypto device has several essential elements that determine how it works.
First the crypto algorithm, which specifies the mathematical transformation that is performed on data to encrypt or decrypt. the crypto algorithm is a procedure that takes the plain text data ...

Get instant access to over 50,000 essays.
Write better papers. Get better grades.


Already a member? Login


CITE THIS PAGE:

Internet 2. (2006, October 15). Retrieved December 23, 2024, from http://www.essayworld.com/essays/Internet-2/53985
"Internet 2." Essayworld.com. Essayworld.com, 15 Oct. 2006. Web. 23 Dec. 2024. <http://www.essayworld.com/essays/Internet-2/53985>
"Internet 2." Essayworld.com. October 15, 2006. Accessed December 23, 2024. http://www.essayworld.com/essays/Internet-2/53985.
"Internet 2." Essayworld.com. October 15, 2006. Accessed December 23, 2024. http://www.essayworld.com/essays/Internet-2/53985.
JOIN NOW
Join today and get instant access to this and 50,000+ other essays


PAPER DETAILS
Added: 10/15/2006 07:22:16 PM
Category: Science & Nature
Type: Free Paper
Words: 1191
Pages: 5

Save | Report

SHARE THIS PAPER

SAVED ESSAYS
Save and find your favorite essays easier

SIMILAR ESSAYS
» Investigative Report Of Interne...
» The Travel Industry And The Int...
» Innovation And Regulation Of Th...
» Obsessive Compulsive Disorder
» ISDN Vs. Cable Modems
» Government Censorship Would Dam...
» Internet Security
» The Internet, Pornography, And ...
» Internet Censorship
» Linux 2
Copyright | Cancel | Contact Us

Copyright © 2024 Essayworld. All rights reserved