Found 359 Articles for Information Security

What is the difference between SOAP and RESTful Web Services in information security?

Ginni
Updated on 09-Mar-2022 09:32:08

497 Views

 SOAP Web ServicesSOAP stands for Simple Object Access Protocol. It is a XML-based protocol for accessing web services. It is produced as an intermediate language so that applications built in multiple programming languages can communicate with each other efficiently. Web services use SOAP for share of XML data among applications.SOAP provides both stateful and stateless operations. Stateful defines that the server keeps the data that it receives from the client across multiple requests. These requests are chained so that the server is aware about the prior requests. Examples are bank transactions, flight bookings, etc. Stateless messaging has adequate information about ... Read More

What are the types of web services in information security?

Ginni
Updated on 09-Mar-2022 09:23:05

243 Views

Web service is a regulated channel to propagate communication between the client and server applications on the WWW (World Wide Web). A web service is a software structure that is designed to implement a certain set of tasks.In web service, it is a standardized method of integrating Web-based applications using the XML, SOAP, WSDL and UDDI open standards over an Internet protocol determination. XML can be used to tag the data, SOAP can be used to transfer the data. WSDL is used for defining the services available and UDDI is used for listing what services are accessible.There are the following ... Read More

What are the elements of web services in information security?

Ginni
Updated on 09-Mar-2022 09:20:19

155 Views

A classic Web services includes three elements such as users, services and databases. It can describe a privacy model with three dissimilar types of privacy including user privacy, service privacy, and data privacy which are as follows −User Privacy − Users of a Web service comprise persons (e.g., citizens and case officers), applications, and multiple Web services. In some cases, users conversing with a Web service are required to provide a major amount of personal sensitive information. Users of Web services, though, can expect or need dissimilar levels of privacy as per their observation of the information sensitivity.A user can ... Read More

What is Web Service in information security?

Ginni
Updated on 09-Mar-2022 09:18:42

180 Views

Web service is a standardized channel to propagate communication between the user and server applications on the WWW (World Wide Web). A web service is a software structure that is designed to perform a specific set of tasks.In web service, it is a standardized method of integrating Web-based applications using the XML, SOAP, WSDL and UDDI open standards over an Internet protocol determination. XML can be used to tag the data, SOAP can be used to transfer the data. WSDL is used for defining the services available and UDDI is used for listing what services are accessible.A web service is ... Read More

What is Internet Privacy in information security?

Ginni
Updated on 09-Mar-2022 09:16:31

485 Views

Internet privacy defines the huge range of technologies, protocols and concepts related to providing individual users or other parties more privacy protections in their use of the global Internet. Internet privacy takes several forms, such as mandatory privacy statements on websites, data sharing controls, data transparency initiatives, etc. Internet privacy is also called as online privacy.Internet privacy is a main problem today. Privacy over the Internet has enhanced some ethical problems, which is needed to be dealt with. While catering to the privacy requirements of the Internet users, it is needed to executing certain ethics.Privacy can define ambiguity in case ... Read More

What is Asymmetric Key Authentication in information security?

Ginni
Updated on 09-Mar-2022 08:04:22

1K+ Views

Asymmetric encryption is a type of encryption that needs two separates yet mathematically associated keys to encrypt and decrypt information. The public key encrypts data while its correlating private key decrypts it.Asymmetric key authentication is a cryptographic approach that uses a different verification key in the CAD than the proving key utilized by the smart card. This method is usually executed using trapdoor one-way functions, in which smart card creates an electronic signature with its secret key and the CAD needs a public key to authenticate the signature.The Rivest-Shamir-Adelman (RSA) public key cryptosystem is the generally implemented asymmetric key authentication ... Read More

What is Symmetric Key Authentication in information security?

Ginni
Updated on 09-Mar-2022 08:02:00

2K+ Views

A symmetric key is one that can be used both to encrypt and decrypt data. This means that to decrypt data, one should have the similar key that was used to encrypt it. Symmetric encryption is usually more effective than asymmetric encryption and therefore preferred when high amounts of data need to be exchanged.It can be creating the shared key is complex using only symmetric encryption algorithms, so in some cases, an asymmetric encryption is used to create the shared key between two parties.The Digital Encryption Standard (DES) algorithm is a symmetric key cryptography approach commonly used smart card systems. ... Read More

What are the drawbacks of Kerberos in information security?

Ginni
Updated on 09-Mar-2022 08:00:26

2K+ Views

There are several drawbacks of Kerberos which are as follows −Password guessing attacks − Password guessing attacks are not solved by Kerberos. If a user select a poor password, it is applicable for an attacker to successfully mount an offline dictionary attack by constantly attempting to decrypt messages acquired which are encrypted under a key changed from the user's password. The goal is on designing a user authentication protocol that is not affected to password guessing attacks. The main objective is to delete this password guessing attack.KDC spoofing − This define an attack which based essentially on the capability to ... Read More

What are the Dynamic Password Authentication in information security?

Ginni
Updated on 09-Mar-2022 07:53:11

1K+ Views

Dynamic Password is also known as One Time Password. It is used to solve the traditional problems which occur when the static Password authentication cannot cope with eavesdropping and replaying, making, guessing, etc.Using dynamic password, uncertainties will be treated in authentication information during the procedure of lodging to make authentication information different every time, which can enhance the security of information in the procedure of lodging. This technology can effectively prevent replay attack, and solve the issues that the static password is likely to be stolen in transmission and database.There are three fields which are transmitted to authentication server or ... Read More

How does Smart Card Authentication work?

Ginni
Updated on 09-Mar-2022 07:49:58

517 Views

Smart Card Authentication is a means of checking users into enterprise resources including workstations and applications using a physical card in tandem with a smart card reader and application on the workstation. Smart card authentication is hugely secure but it has a poor user experience and is expensive to deploy and maintain.Smart card systems enable a distributed transaction network, without physical link between network terminals. The smart card is the data distribution tool that supports the data used in transactions. The terminal or card acceptor device (CAD) processes the smart card supplied data based on business processes for its application.A ... Read More

Advertisements