HOME

TheInfoList



OR:

Digital security refers to various ways of protecting a computer's internet account and files from intrusion by an outside user or a hacker.


Computers and the Internet

Internet security involves the protection of a computer's internet account and files from intrusion by an outside user. Internet users today are familiar with companies like
Symantec Symantec may refer to: *An American consumer software company now known as Gen Digital Inc. *A brand of enterprise security software purchased by Broadcom Inc. Broadcom Inc. is an American designer, developer, manufacturer and global supplier ...
(
Norton Anti-Virus Norton AntiVirus is an anti-computer virus, virus or anti-malware software product founded by Peter Norton, developed and distributed by Gen Digital since 1990 as part of its Norton (Symantec), Norton family of computer security products. It use ...
) and McAfee that provide them with internet security products to guard against computer viruses, as well as to provide secure firewalls and protection against
spyware Spyware (a portmanteau for spying software) is software with malicious behaviour that aims to gather information about a person or organization and send it to another entity in a way that harms the user—for example, by violating their privac ...
. Organizations like the Center for Internet Security (CIS) provide enterprises with resources for measuring information security status and making rational
security" \n\n\nsecurity.txt is a proposed standard for websites' security information that is meant to allow security researchers to easily report security vulnerabilities. The standard prescribes a text file called \"security.txt\" in the well known locat ...
investment decisions. An example of secure smart card technology usage is the Microsoft .NET card framework. This is a software framework that is available with several Microsoft Windows operating systems. It includes a library of coded solutions to prevent common programming problems and a virtual machine that manages the execution of programs written specifically for the framework.


Telecommunications

Perhaps the most widely known digitally secure telecommunication device is the SIM (Subscriber Identity Module) card, a device that is embedded in most of the world’s cellular devices before any service can be obtained. The SIM card is just the beginning of this digitally secure environment. The Smart Card Web Servers draft standard (SCWS) defines the interfaces to an HTTP server in a smart card. Tests are being conducted to secure OTA ("over-the-air") payment and credit card information from and to a mobile phone. Combination SIM/DVD devices are being developed through Smart Video Card technology which embeds a DVD-compliant optical disc into the card body of a regular SIM card. Other telecommunication developments involving digital security include
mobile signature A mobile signature is a digital signature generated either on a mobile phone or on a SIM card on a mobile phone. Origins of the term mSign The term first appeared in articles introducing mSign (short for Mobile Electronic Signature Consortium). ...
s, which use the embedded SIM card to generate a legally binding electronic signature.


Financial transactions and retail

The
UCLA The University of California, Los Angeles (UCLA) is a public university, public Land-grant university, land-grant research university in Los Angeles, California. UCLA's academic roots were established in 1881 as a Normal school, teachers colle ...
Internet Report: Surveying the Digital Future (2000) found that the privacy of personal data created barriers to online sales and that more than nine out of 10 internet users (were) somewhat or very concerned about
credit card A credit card is a payment card issued to users (cardholders) to enable the cardholder to pay a merchant for goods and services based on the cardholder's accrued debt (i.e., promise to the card issuer to pay them for the amounts plus the o ...
security. The most common web technologies for improving security between browsers and websites are named SSL (Secure Sockets Layer), and its successor TLS ( Transport Layer Security), identity management and
authentication Authentication (from ''authentikos'', "real, genuine", from αὐθέντης ''authentes'', "author") is the act of proving an assertion, such as the identity of a computer system user. In contrast with identification, the act of indicat ...
services, and
domain name A domain name is a string that identifies a realm of administrative autonomy, authority or control within the Internet. Domain names are often used to identify services provided through the Internet, such as websites, email services and more. ...
services allow companies and consumers to engage in secure communications and commerce. Several versions of SSL and TLS are commonly used today in applications such as web browsing, e-mail, internet faxing,
instant messaging Instant messaging (IM) technology is a type of online chat allowing real-time text transmission over the Internet or another computer network. Messages are typically transmitted between two or more parties, when each user inputs text and trigge ...
, and
VoIP Voice over Internet Protocol (VoIP), also called IP telephony, is a method and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. The terms Interne ...
(voice-over-IP). There are various interoperable implementations of these technologies, including at least one implementation that is
open source Open source is source code that is made freely available for possible modification and redistribution. Products include permission to use the source code, design documents, or content of the product. The open-source model is a decentralized sof ...
. Open source allows anyone to view the application's
source code In computing, source code, or simply code, is any collection of code, with or without comment (computer programming), comments, written using a human-readable programming language, usually as plain text. The source code of a Computer program, p ...
, and look for and report vulnerabilities. The credit card companies Visa and MasterCard cooperated to develop the secure EMV chip which is embedded in credit cards. Further developments include the Chip Authentication Program where banks give customers hand-held card readers to perform online secure transactions. Other developments in this arena include the development of technology such as Instant Issuance which has enabled shopping
mall kiosk A retail kiosk (also referred to as a mall kiosk or retail merchandising unit, RMU) is a store operated out of a merchant-supplied kiosk of varying size and shapes, which is typically enclosed with the operator located in the center and customer ...
s acting on behalf of banks to issue on-the-spot credit cards to interested customers.


Travel and transportation

Many modern passports are now
biometric passport A biometric passport (also known as an e-passport or a digital passport) is a traditional passport that has an embedded electronic microprocessor chip which contains biometric information that can be used to authenticate the identity of the p ...
s, containing an embedded microchip that stores a digitized photograph and personal information such as name, gender, and date of birth. In addition, more countries are introducing facial recognition technology to reduce identity-related fraud. The introduction of the ePassport has assisted border officials in verifying the identity of the passport holder, thus allowing for quick passenger processing. Plans are under way in the US, the UK, and Australia to introduce SmartGate kiosks with both retina and
fingerprint recognition A fingerprint is an impression left by the friction ridges of a human finger. The recovery of partial fingerprints from a crime scene is an important method of forensic science. Moisture and grease on a finger result in fingerprints on surfac ...
technology. Additionally, e-Drivers’ licenses are being developed using the same technology. For example, Mexico’s licensing authority (ICV) has used a smart card platform to issue the first e-Drivers’ licenses to the city of
Monterrey Monterrey ( , ) is the capital and largest city of the northeastern state of Nuevo León, Mexico, and the third largest city in Mexico behind Guadalajara and Mexico City. Located at the foothills of the Sierra Madre Oriental, the city is ancho ...
, in the state of
Nuevo León Nuevo León () is a state in the northeast region of Mexico. The state was named after the New Kingdom of León, an administrative territory from the Viceroyalty of New Spain, itself was named after the historic Spanish Kingdom of León. With ...
. The airline industry is moving from the use of traditional paper tickets towards the use of electronic tickets (e-tickets). These have been made possible by advances in online credit card transactions in partnership with the airlines. Long-distance bus companies are also switching over to e-ticketing transactions today. Shipping companies have adopted
RFID Radio-frequency identification (RFID) uses electromagnetic fields to automatically identify and track tags attached to objects. An RFID system consists of a tiny radio transponder, a radio receiver and transmitter. When triggered by an electroma ...
(Radio Frequency Identification) technology as an efficient, digitally secure, tracking device. Unlike a
barcode A barcode or bar code is a method of representing data in a visual, Machine-readable data, machine-readable form. Initially, barcodes represented data by varying the widths, spacings and sizes of parallel lines. These barcodes, now commonly refe ...
, RFID can be read up to 20 feet away. RFID is used by FedEx and UPS.


Health care

Today many health-care providers and health insurance companies use the internet to provide enhanced products and services, for example through use of tele-health to potentially offer better quality and access to healthcare, or fitness trackers to lower insurance premiums. The health care company Humana partners with
WebMD WebMD is an American corporation known primarily as an online publisher of news and information pertaining to human health and well-being. The site includes information pertaining to drugs. It is one of the top healthcare websites. It was fo ...
,
Oracle Corporation Oracle Corporation is an American multinational computer technology corporation headquartered in Austin, Texas. In 2020, Oracle was the third-largest software company in the world by revenue and market capitalization. The company sells da ...
, EDS and
Microsoft Microsoft Corporation is an American multinational corporation, multinational technology company, technology corporation producing Software, computer software, consumer electronics, personal computers, and related services headquartered at th ...
to enable its members to access their health care records, as well as to provide an overview of health care plans. Patient records are increasingly being placed on secure in-house networks, alleviating the need for extra storage space.


Secure access

The FBI, CIA, and
Pentagon In geometry, a pentagon (from the Greek language, Greek πέντε ''pente'' meaning ''five'' and γωνία ''gonia'' meaning ''angle'') is any five-sided polygon or 5-gon. The sum of the internal angles in a simple polygon, simple pentagon is ...
, all utilize secure controlled access technology for any of their buildings. However, the use of this form of technology is spreading into the entrepreneurial world. More and more companies are taking advantage of the development of digitally secure controlled access technology. GE's ACUVision, for example, offers a single panel platform for access control, alarm monitoring and digital recording. New approaches combine network DVR capabilities with intelligent
access control In the fields of physical security and information security, access control (AC) is the selective restriction of access to a place or other resource, while access management describes the process. The act of ''accessing'' may mean consuming ...
and alarm monitoring panel functionality into a single
image processing An image is a visual representation of something. It can be two-dimensional, three-dimensional, or somehow otherwise feed into the visual system to convey information. An image can be an artifact, such as a photograph or other two-dimension ...
application. Some systems now combine digital video monitoring/recording/playback, access control and intrusion detection functionality in a single panel solution. With these integrated digital video recording and access control platforms, security officers can display live and stored video associated with alarm conditions and cardholder activity.


References

{{DEFAULTSORT:Digital Security Digital technology