Type of paper:Â | Essay |
Categories:Â | Data analysis Cyber security Information systems |
Pages: | 3 |
Wordcount: | 746 words |
Information confidentiality plays a critical role in ensuring that every piece of data is secured from harm, or unauthorized accessibility, which plays a security mechanism to ensure that data is not compromised (Paul, Sengupta, Mohamedrasheed, Saxena, & Kaulgud, 2016). The accessibility of data may be provided by the use of a database, embedded in the server to ensure paramount and explicit data storage is enhanced through the use of authentications before the data is accessed. On the same token, the authentication of users is one of the highly essential aspects to ensure that a user accesses, specific data in the database that is only associated with the user in the system. In this case, security protocol in ensuring better communication between the client and back end side will play a critical role in helping implement the section.
With the increase in the number of clients, so does the chances of threat are generating, where the site becomes bulky as well as developing several loopholes that usher in hackers. As a result, the system administrator has a meticulous task to ensure that all connections within the web server are secured, and no threat is arising from the client side, to help them gain control of the system. In this case, the use of restrictions, and privileges, to individual accounts within the web server, is one of the security measures to gain a better understanding of the clients and monitoring their traffic in the system.
The use of layered security is an essential approach that can be implemented in this section to restrict any authorized accessibility of data in the web server. As O'Hare, Orsini, & Martin, (2018) observed, that a web server makes greater use of the Secure Socket Layer (SSL) to ensure that the customer activities are secure, where data from the client side, is compared with the stored data in the database before the client receives the feedback of the stored data.
Compare and Contrast Secure File Sharing vs. Insecure File sharing
File transfer is one of the common activities that a user performs while interacting with the application and the server. In many cases, File Transfer Protocol has been widely used due to its ease of accessibility and use. Never the less, the dangers of using FTP has opened a broader threat since the data channel, or the command channel is encrypted to reduce the chances of data configuration from the unwanted intruders. As a result, the need to use encrypted channels of data is essential since they guarantee a safer mechanism in data transfer from one point to the other.
Secure file sharing is one of the convenient methods of sharing data on the internet without the intrusion of outsiders to intercept and decode the date. In this case, sensitive data is encrypted unlike un the FTP format, where confidential data is sent in a plain text, making it easier for interceptions (Ali, Dhamotharan, Khan, Khan, Vasilakos, & Zomaya, 2015). On the other hand, insecure file sharing may be used to pass data which is not sensitive, such as documents with minimal confidentiality.
Provide Details on how to Implement Secure File Sharing
First World Bank Savings and Loan employees, require a substantial investment in several areas of the network to ensure that a secure connection is set for file sharing. As Sharma, Krishnan, Akella, & Drewry, (2015) observed, a secure connection requires an encrypted platform that keeps unwanted intruders from the site. The use of Secure Socket Layer (SSL) is widely used to ensure that information sent between the client and the server is encrypted, reducing the possibility of data interception. As a result, the man-in-the-middle attacks is minimized through the use of SSL or HTTPS.
References
Ali, M., Dhamotharan, R., Khan, E., Khan, S. U., Vasilakos, A. V., Li, K., & Zomaya, A. Y. (2015). SeDaSC: secure data sharing in clouds. IEEE Systems Journal, 11(2), 395-404. 10.1109/JSYST.2014.2379646
O'Hare, M.S., Orsini, R.L. and Martin, D., Security First Corp, 2018. Secure file-sharing method and system. U.S. Patent Application 10/027,484. https://patentimages.storage.googleapis.com/f9/00/db/9ad61ba44fc079/US10027484.pdf
Paul, S., Sengupta, S., Mohamedrasheed, A.K., Saxena, A. and Kaulgud, V., Accenture Global Services Ltd, 2016. Secure online distributed data storage services. U.S. Patent 9,483,657. https://patentimages.storage.googleapis.com/db/a2/81/85003a155c6972/US9483657.pdf
Sharma, R., Krishnan, S., Akella, V.S. and Drewry, J., Mobile Iron Inc, 2015. Secure virtual file management system. U.S. Patent 9,213,858. https://patentimages.storage.googleapis.com/56/68/38/dcba5e99d913f7/US9213858.pdf
Cite this page
Paper Example on How Data Can Be Shared With the Web Server in a Secure Fashion. (2023, Jan 19). Retrieved from https://speedypaper.net/essays/how-data-can-be-shared-with-the-web-server-in-a-secure-fashion
Request Removal
If you are the original author of this essay and no longer wish to have it published on the SpeedyPaper website, please click below to request its removal:
- Free Essays on the Internet as a Competitive Advantage of a Business
- Free Essay - Cell Phones Create a Barrier to Social Connections
- Education Essay Example: A Technical School Is Better Than University
- Free Essay on Fitting the Security Team into the Company Hierarchy
- Essay Sample on the Flat Earth Theory
- Paper Example on Pregnant Woman Abuse
- Advantages of Building Space for the Orthopedic Line. Essay Example
Popular categories