Wednesday, November 27, 2019

Securing Client/Server Transactions Essays -

Securing Client/Server Transactions Securing Client/Server Transactions Securing Client/Server Transactions The three basic ways that security is implemented in the area of client/server transaction. The first area is firewalls. The basic idea of a firewall to monitor traffic from a trusted network ( a companys internal network) to an untrusted network (such as the Internet). Firewalls fall into two categories, proxies and packet-filtering firewalls. Packet-filtering determines whether a packet is allowed or disallowed depending on the source of the packet and the contents of it. Packet-filtering also looks at the source and destination ports, and to determine if a packet is part of an ongoing conversation. An application-level firewall, better known as a proxy acts as an intermediary between the client and the server. The client application connects to the proxy. The proxy opens a connection to the server and passes information back and forth between the server and the client (refer to Figure 1.). Figure 1. Both firewalls have their advantages and disadvantages. In most cases both categories will be implemented on the same firewall. A packet-filtering firewall tends to be less secure than a proxy based firewall, since complete knowledge of the protocol is used by the application. However packet filtering can allow a concept known as masquerading. Masquerading is when the firewall takes the outgoing source address on the packets and converts the address so the receiver thinks they are talking to the firewall. The receivers packets will have its address on it coming back so the firewall can determine which sender gets the packet. The advantage of masquerading is that a companys internal network can be hidden behind the firewall. Another security implementation is encryption. Encryption is the process of modifying information so that it can not be read by anyone except the intended recipient. This is done by applying mathematical algorithms that require a key to unlock, or decrypt, the original data. Algorithms that use the same key to encrypt and decrypt data are known as symmetric encryption algorithms. Algorithms that use different keys to encrypt and decrypt data are known as asymmetric or public-key encryption algorithms. Encrypted data comes in two forms 40-bit and 128-bit. 40-bit encryption uses a 40 bits of space to encrypt data and 128 bits of space for the 128-bit form. The process of verifying the senders identity is known as authentication. Authentication can be performed with a user name and password, or with a piece of information known as a digital certificate. A digital certificate contains encryption parameters, which can be used to uniquely identify a user or a host system. Verifying that an external party has not modified data is known as integrity checking. Integrity checking is done by applying a mathematical algorithm, known as a hash, to data before its sent and computing the same hash when the data is received. If the two hashes map to the same result, then the data hasnt been modified. How do these areas affect client/server transaction? Client/server transaction deals with the everyday transactions that people engage in on the Internet. With each transaction, personal information is sent from client to vendor. The information has a tendency to be sensitive in nature and not something shared with anyone except the vendor. Such information may include social security numbers, credit card numbers, and possibly information for monthly bills (account numbers and balances specifically). Businesses have to save-guard their customers in order for their customers to feel secure in buying products and services from them. Businesses understand this importance. Some businesses and development groups have evolved from the need to make business transactions more secure on the Internet. In doing so, business presence has grown exponentially over the last decade. Commercials on TV tell business owners if they arent on the web, they wont survive. Programmers face difficult and exciting challenges in the areas of security for client/server transaction. One of the most popular languages used on the Internet is Java. Java runs on many different platforms, which makes it very versatile in Internet applications. JavaSoftTM has introduced the Java Commerce Client (JCC) framework. The JCC provides a secure, robust, and reliable platform that enables software vendors to write electronic commerce applications. With a framework, you focus on the application-specific

Saturday, November 23, 2019

Essay on The Use of TelecommunicationEssay Writing Service

Essay on The Use of TelecommunicationEssay Writing Service Essay on The Use of Telecommunication Essay on The Use of TelecommunicationThe term telecommunications means long distance connection (Floyd,  2012). This is a form of transmitting and receiving all sorts of information (sound, images, text) over long distances via cable, magnetic, wireless, optical and other electromagnetic systems. Telecommunication systems have been developed and spread in the 20th century (Want,  2006).RFID (radio frequency identification) is a way to automatically identify objects, which by means of radio signals read or writes the data stored in the RFID tags (transponders). RFID systems according to distance are divided into near, medium and long-range identification. RFID technology is used in many spheres of human activity: education, medicine, industry, agriculture, as well as in systems: baggage handling, localization of objects in real time, access control and other (Wamba, 2012). This prevalence of this type of technology has caused serious controversy around it. Sometimes its criticism reached boycotting products. For example, many argue that the RFID system violate privacy. They argue that the buyer may not even know of RFID-tags or can not get rid of them, and secondly, the data from the tags can be read without your knowledge, in the third, when paying for goods by credit card it is likely the binding of ID tag with the buyer. Many argue that such a tagging system creates problems with rights for privacy and for most applications it is not necessary. The public is concerned that the presence of such tags for the purchased product, which the buyer may not even be aware of, may cause a number of negative phenomena. For example, goods with RFID-tags can be used to spy on the person. RFID systems represent a danger if obtained information about a person is stored in the database set of independent materials. In the future, obtained information can be used for bad purposes. For example, a burglar, using a handheld reader, can evaluate the material condition of a p otential victim passing by (Periaswamy,  2011). All this is due to the possibility of reading the information over short distances. Security experts are opposed to the use of RFID systems for authentication people, explaining that by high-risk of identity theft.

Thursday, November 21, 2019

Pharmacology case studies Study Example | Topics and Well Written Essays - 1000 words

Pharmacology studies - Case Study Example It busulfan falls in the categories of immunosuppressive Agents, Antineoplastic Agents, Alkylating agents and Myeloablative Agents. It works by interupting replication of DNA and transcription of RNA ultimately causing disruption in the nucleic acid functions. In the end it induces irreversible apoptosis and therefore disrupts the spread of cancerous cells. Busulfan is used therapeutically in synergy with cyclophosphamide to produce a conditioning course of therapy before progenitor cell transplant protocols in Chronic Myelogenous Leukaemia. The drug is also used widely in the used as part of the pre-transplant preparations for those patients requiring bone marrow transplants for advanced Myeloid LeuKaemia as well as other conditions that are non-malignant. This is therefore a very important chemotherapeutic agent in the management of Myeloid Leukaemia and other non-malignant cancers due its apoptosis causing effects on target cancerous cells. The drug is in three forms i.e. 2mg tablets; 25 mg capsules a liquid injection. Delivery of the drug is therefore possible through the oral and intravenous routes. When used in the treatment of Chronic Myeloid leukaemia, the drug should be given as follows; the patient should first be pre-medicated with anti-convulsion drugs followed by an initial busulfan dose of 60 mcg/kg/day or 1.8 mg/m ²; 4-8 mg PO qDay. Maintenance doses should be given subsequently at 1-4 mg/day to 2 mg/week PO. The patient is closely monitored and once the white blood cell count is 50,000/mcl the initial dosage should be resumed. When given in combination with cyclophosphamide, an intravenous dose of 0.8 mg/kg at intervals of 6 hours for four days until WBC count reaches 15,000/mm3. When preparing an intravenous injection dose the preferred diluents are NS or and D5W. It should be prepared with diluents volume being 10 times that of busulfan until the desirable concentration of >0.5 mg/ml is attained. The preparation is then prepared through