Net Security, Flawed

    Date20 Dec 2000
    CategoryCryptography
    3241
    Posted ByAnthony Pell
    SSL and SSH have emerged, with other protocols, to provide authentication methods using a public key infrastructure. These protocols were developed to protect large amounts of network traffic from online shopping to financial transactions with online banks. . . . SSL and SSH have emerged, with other protocols, to provide authentication methods using a public key infrastructure. These protocols were developed to protect large amounts of network traffic from online shopping to financial transactions with online banks. But are the fundamental flaws of these protocols open to abuse, now that products exist to exploit these cracks in security?.

    Over the past year, the number of individuals and companies using the internet has increased at a breakneck speed. The need for security and protecting sensitive data has become even more demanding, the methods of encrypting and securing information more complex.

    You are not authorised to post comments.

    LinuxSecurity Poll

    Has your email account ever been pwned in a data breach?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 2 answer(s).
    /component/communitypolls/?task=poll.vote
    12
    radio
    [{"id":"53","title":"Yes","votes":"8","type":"x","order":"1","pct":88.89,"resources":[]},{"id":"54","title":"No","votes":"1","type":"x","order":"2","pct":11.11,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350
    bottom200

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.