18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Internet Security 293<br />

no point in securing just the communication channel, if the intruders are<br />

able <strong>to</strong> access the information by breaking in<strong>to</strong> internal systems of the<br />

company.<br />

10.6. Key Concepts in E-Security Solutions<br />

Some key technologies that have emerged as the foundation of<br />

e-security are: cryp<strong>to</strong>graphy, digital signatures/certificates and firewalls.<br />

In this section, we will take a closer look at these technologies and<br />

understand the role played by each in creating a secure environment for<br />

an enterprise.<br />

10.6.1. Cryp<strong>to</strong>graphy<br />

Cryp<strong>to</strong>graphy, also called encryption, protects the privacy of sensitive<br />

information being transmitted over the Internet. It ensures that the<br />

information is not intelligible if it falls in<strong>to</strong> the wrong hands. While<br />

cryp<strong>to</strong>graphy has been in existence since ancient times, its level of<br />

sophistication has increased, commensurate with the increase in risks.<br />

Today's cryp<strong>to</strong>graphy uses sophisticated mathematical formulas and<br />

computer algorithms.<br />

The main elements of cryp<strong>to</strong>graphy are:<br />

• Original Text — the precise contents of the message;<br />

• Cipher Text — the form in which the message appears after being<br />

encrypted. This is not humanly readable;<br />

• Encryption Algorithm — the algorithm or mathematical formula used<br />

<strong>to</strong> convert the original message in<strong>to</strong> cipher text; and<br />

• Key — the element used <strong>to</strong> encrypt and decrypt the message. Every<br />

encryption algorithm makes use of a key. Depending on the key used,<br />

the same algorithm will produce different cipher text for the same<br />

message contents.<br />

Encryption is done <strong>to</strong> secure not only text, but also video, sound,<br />

etc. — any form of communication across the Internet.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!