Computer Internet

Published on January 2017 | Categories: Documents | Downloads: 37 | Comments: 0 | Views: 471
of 21
Download PDF   Embed   Report

Comments

Content

Internet.
The Internet is a global system of interconnected computer networks that use the standard Internet Protocol Suite (TCP/IP) to serve billions of users worldwide. It is a network of networks that consists of millions of private, public, academic, business, and government networks, of local to global scope, that are linked by a broad array of electronic, wireless and optical networking technologies. The Internet carries a vast range of information resources and services, such as the inter-linked hypertext documents of the World Wide Web (WWW) and the infrastructure to support electronic mail. Most traditional communications media including telephone, music, film, and television are reshaped or redefined by the Internet, giving birth to new services such as Voice over Internet Protocol (VoIP) and IPTV. Newspaper, book and other print publishing are adapting to Web site technology, or are reshaped into blogging and web feeds. The Internet has enabled or accelerated new forms of human interactions through instant messaging, Internet forums, and social networking. Online shopping has boomed both for major retail outlets and small artisans and traders. Business-to-business andfinancial services on the Internet affect supply chains across entire industries. The origins of the Internet reach back to research of the 1960s, commissioned by the United States government in collaboration with private commercial interests to build robust, faulttolerant, and distributed computer networks. The funding of a new U.S. backbone by the National Science Foundation in the 1980s, as well as private funding for other commercial backbones, led to worldwide participation in the development of new networking technologies, and the merger of many networks. The commercialization of what was by the 1990s an international network resulted in its popularization and incorporation into virtually every aspect of modern human life. As of 2009, an estimated one-quarter of Earth's population uses the services of the Internet. The Internet has no centralized governance in either technological implementation or policies for access and usage; each constituent network sets its own standards. Only the overreaching definitions of the two principal name spaces in the Internet, the Internet Protocol address space and the Domain Name System, are directed by a maintainer organization, the Internet Corporation for Assigned Names and Numbers (ICANN). The technical underpinning and standardization of the core protocols (IPv4 and IPv6) is an activity of the Internet Engineering Task Force (IETF), a non-profit organization of loosely affiliated international participants that anyone may associate with by contributing technical expertise.

Amity School Of Hospitality Sandeep Maji

Terminology
Internet is a short form of the technical term internetwork, the result of interconnecting computer networks with special gateways or routers. The Internet is also often referred to as the Net. The term the Internet, when referring to the entire global system of IP networks, has been treated as a proper noun and written with an initial capital letter. In the media and popular culture a trend has also developed to regard it as a generic term or common noun and thus write it as "the internet", without capitalization. Some guides specify that the word should be capitalized as a noun but not capitalized as an adjective. The terms Internet and World Wide Web are often used in everyday speech without much distinction. However, the Internet and the World Wide Web are not one and the same. The hardware and software infrastructure of the Internet establishes a global data communications system between computers. In contrast, the Web is one of the services communicated via the Internet. It is a collection of interconnected documents and other resources, linked by hyperlinks and URLs.

Amity School Of Hospitality Sandeep Maji

Internet access
Many technologies and service plans for Internet access allow customers to connect to the Internet. Consumer use first became popular through dial-up connections in the 20th century. By the 21st century, most products were marketed using the term "broadband".

Types of connections
Although the term broadband once had a technical meaning, it has become "an excellent 21st-century buzzword." Common methods of consumer Internet access in 2011 include:
      

dial-up (including ISDN) Asymmetric digital subscriber line (ADSL) Internet over cable television lines LAN (PPPoE) - usually in areas of high population density Wi-Fi hotspots Wireless Internet service provider - sometimes simply called 'microwave' Mobile broadband over terrestrial mobile phone networks

using CSD, GPRS, EDGE, EVDO, HSPA, etc. either through mobile phones (called cell phones in North America) or PCs


Satellite Internet

See also: Last mile#Existing last mile delivery systems and Local loop As of 2011, the following methods see a smaller usage share:
        

data-only cellular networks like WiMAX and LTE Leased line broadband over power line IP over DVB fiber to the home Wireless mesh network - mostly military and One laptop per child use Packet radio Free-space optical communication Wizzy Digital Courier

Amity School Of Hospitality Sandeep Maji

At the turn of the century most residential access was by dial-up while access from businesses was usually by higher speed connections. In subsequent years dial-up declined.

Availability
Besides offices and residences, there are public places to use the Internet, including libraries and Internet cafes, where computers with Internet connections are available. Some libraries provide stations for connecting users' laptops to local area networks (LANs). There are wireless Internet access points in public places such as airport halls, in some cases just for brief use while standing. These access points may also provide coin operated computers. Various terms are used, such as "public Internet kiosk", "public access terminal", and "Web payphone". Many hotels also have public terminals, though these are usually fee based. Coffee shops, shopping malls and other venues also offer wireless access to computer networks, referred to as hotspots, for users who bring their own wireless-enabled devices such as a laptop orPDA. These services may be free to all, free to customers only, or feebased. A hotspot need not be limited to a confined location. The whole campus or park, or even the entire city can be enabled.Grassroots efforts have led to wireless community networks.

Proliferation of users
Internet use around the world has been growing rapidly. With market saturation the phase of rapid growth is ending in industrialized countries, but the spread continues in Asia, Africa, Latin America, the Caribbean and the Middle East. For example, the PC Conectado program helped the industry to grow in Brazil.

Access as a human right
The United Nations has proposed that Internet access should be a human right. This push was made when it called for universal access to basic communication and information services at the UN Administrative Committee on Coordination. In 2003, during the World Summit on the Information Society, another claim for this was made. In some countries such as Estonia, France, Spain, Finland and Greece, Internet access has already been made a human right.

Amity School Of Hospitality Sandeep Maji

Internet marketing
Internet marketing, also known as digital marketing, web marketing, online marketing, search marketing or e-marketing, is referred to as the marketing(generally promotion) of products or services over the Internet. iMarketing is used as an abbreviated form for Internet Marketing Internet marketing is considered to be broad in scope because it not only refers to marketing on the Internet, but also includes marketing done via e-mail and wireless media. Digital customer data and electronic customer relationship management (ECRM) systems are also often grouped together under internet marketing. Internet marketing ties together the creative and technical aspects of the Internet, including design, development, advertising, and sales. Internet marketing also refers to the placement of media along many different stages of the customer engagement cycle through search engine marketing (SEM), search engine optimization (SEO),banner ads on specific websites, email marketing, mobile advertising, and Web 2.0 strategies. In 2008, The New York Times, working with comScore, published an initial estimate to quantify the user data collected by large Internet-based companies. Counting four types of interactions with company websites in addition to the hits from advertisements served from advertising networks, the authors found that the potential for collecting data was up to 2,500 times per user per month.

Types of Internet Marketing
iMarketing is broadly divided in to the following three types,


PPC/I (Pay per click/impression): Advertisements for brands and products is done

on pre-decided websites and helps in generating leads for companies.


SEO Search engine optimization is the process of improving the visibility of

a website or a web page in search engines via the "natural" or un-paid ("organic" or "algorithmic") search results.


Social media marketing (SMM)

Amity School Of Hospitality Sandeep Maji

Business models
Internet marketing is associated with several business models:


E-commerce: a model whereby goods are sold directly to consumers (B2C), Lead-based websites: a strategy whereby an organization generates value by

businesses (B2B), or from consumer to consumer (C2C).


acquiring sales leads from its website. Similar to walk-in customers in retail world. These prospects are often referred to as organic leads.


Affiliate Marketing: a process wherein a product or service developed by one entity

is sold by other active sellers for a share of profits. The entity that owns the product may provide some marketing material (e.g., sales letters, affiliate links, tracking facilities, etc.); however, the vast majority of affiliate marketing relationships come from e-commerce businesses that offer affiliate programs.


Local Internet marketing: a strategy through which a small company utilizes the

Internet to find and to nurture relationships that can be used for real-world advantages. Local Internet marketing uses tools such as social media marketing, local directory listing, and targeted online sales promotions.

One-to-one approaches
In a one-to-one approach, marketers target a user browsing the Internet alone and so that the marketers' messages reach the user personally. This approach is used in search marketing, for which the advertisements are based on search engine keywords entered by the users. This approach usually works under the pay per click (PPC) method.

Appeal to specific interests
When appealing to specific interests, marketers place an emphasis on appealing to a specific behavior or interest, rather than reaching out to a broadly defined demographic. These marketers typically segment their markets according to age group, gender, geography, and other general factors.

Niche Marketing
Niche and hyper-niche internet marketing put further emphasis on creating destinations for web users and consumers on specific topics and products. Niche marketers differ from traditional Internet marketers as they have a more specialized topic knowledge. For

Amity School Of Hospitality Sandeep Maji

example, whereas in traditional Internet marketing a website would be created and promoted on a high-level topic such as kitchen appliances, niche marketing would focus on more specific topics such as 4-slice toasters. Niche marketing provides end users of such sites very targeted information, and allows the creators to establish themselves as authorities on the topic or product.

Geo-targeting
In Internet marketing, geo targeting and geo marketing are the methods of determining the geolocation of a website visitor with geolocation software, and delivering different content to that visitor based on his or her location, such as latitude and longitude, country, region or state, city, metro code or zip code, organization, Internet Protocol (IP) address, ISP, and other criteria.

Internet marketing principles
6 key principles of persuasion by Robert Cialdini One of the most famous guides to internet marketing is the book by Robert Cialdini "Influence: The Psychology of Persuasion." According to Cialdini there are 6 key principles of persuasion: 1. Connection, 2. Scarcity, 3. Sympathy, 4. Reputation, 5. Popularity, 6. Persistence.

Amity School Of Hospitality Sandeep Maji

Advantages and Limitations of Internet marketing Advantages
Internet marketing is inexpensive when examining the ratio of cost to the reach of the target audience. Companies can reach a wide audience for a small fraction of traditional advertising budgets. The nature of the medium allows consumers to research and to purchase products and services conveniently. Therefore, businesses have the advantage of appealing to consumers in a medium that can bring results quickly. The strategy and overall effectiveness of marketing campaigns depend on business goals and cost-volumeprofit (CVP) analysis. Internet marketers also have the advantage of measuring statistics easily and inexpensively; almost all aspects of an Internet marketing campaign can be traced, measured, and tested, in many cases through the use of an ad server. The advertisers can use a variety of methods, such as pay per impression, pay per click, pay per play, and pay per action. Therefore, marketers can determine which messages or offerings are more appealing to the audience. The results of campaigns can be measured and tracked immediately because online marketing initiatives usually require users to click on an advertisement, to visit a website, and to perform a targeted action.

Limitations
However, from the buyer's perspective, the inability of shoppers to touch, to smell, to taste, and "to try on" tangible goods before making an online purchase can be limiting. However, there is an industry standard for e-commerce vendors to reassure customers by having liberal return policies as well as providing in-store pick-up services.

Security concerns
Information security is important both to companies and consumers that participate in

online business. Many consumers are hesitant to purchase items over the Internet because they do not believe that their personal information will remain private. Some companies that purchase customer information offer the option for individuals to have their information removed from their promotional redistribution, also known as opting out. However, many customers are unaware if and when their information is being shared, and are unable to stop the transfer of their information between companies if such activity occurs. Additionally, companies holding private information are vulnerable to data Amity School Of Hospitality Sandeep Maji

attacks and leaks. Internet browsing privacy is a related consumer concern. Web sites routinely capture browsing and search history which can be used to provide targeted advertising. Privacy policies can provide transparency to these practices. Spyware prevention software can also be used to shield the consumer.
Another consumer e-commerce concern is whether or not they will receive exactly what they purchase. Online merchants have attempted to address this concern by investing in and building strong consumer brands (e.g., Amazon.com, eBay, and Overstock.com), and by leveraging merchant and feedback rating systems and ecommerce bonding solutions. All these solutions attempt to assure consumers that their transactions will be free of problems because the merchants can be trusted to provide reliable products and services. Additionally, several major online payment mechanisms (credit cards, PayPal, Google Checkout, etc.) have provided back-end buyer protection systems to address problems if they occur.

Usage trends
Technological advancements in the telecommunications industry have dramatically affected online advertising techniques. Many firms are embracing a paradigm that is shifting the focus of advertising methodology from traditional text and image advertisements to those containing more recent technologies like JavaScript and Adobe Flash. As a result, advertisers can more effectively engage and connect their audience with their campaigns that seek to shape consumer attitudes and feelings towards specific products and services.

Effects on industries
The number of banks offering the ability to perform banking tasks over the internet has increased. Online banking appeals to customers because it is often faster and considered more convenient than visiting bank branches.

Internet auctions
Internet auctions have become a multi-billion dollar business. Unique items that could only previously be found at flea markets are now being sold on Internet auction websites such as eBay. Specialized e-stores sell a vast amount of items like antiques, movie props, clothing, gadgets, and so on.
As the premier online reselling platform, eBay is often used as a price-basis for specialized items. Buyers and sellers often look at prices on the website before going to flea markets; the price shown on eBay often becomes the item's selling price.

Amity School Of Hospitality Sandeep Maji

Advertising industry
In addition to the major effect internet marketing has had on the technology industry, the effect on the advertising industry itself has been profound. In just a few years, online advertising has grown to be worth tens of billions of dollars annually. PricewaterhouseCoopers reported that US$16.9 billion was spent on Online marketing in the U.S. in 2006. This has caused a growing impact on the United States' electoral process. In 2008, candidates for President heavily utilized Internet marketing strategies to reach constituents. During the 2007 primaries candidates added, on average, over 500 social network supporters per day to help spread their message.[17] President Barack Obama raised over US$1 million in one day during his extensive Democratic candidacy campaign, largely due to online donors. Several industries have heavily invested in and benefited from internet marketing and online advertising. Some of them were originally brick and mortar businesses such as publishing, music, automotiveor gambling, while others have sprung up as purely online businesses, such as digital design and media, blogging, and internet service hosting

Amity School Of Hospitality Sandeep Maji

Encryption
In cryptography, encryption is the process of transforming information (referred to as plaintext) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key. The result of the process is encrypted information (in cryptography, referred to as ciphertext). In many contexts, the word encryption also implicitly refers to the reverse process, decryption (e.g. “software for encryption” can typically also perform decryption), to make the encrypted information readable again (i.e. to make it unencrypted). Encryption has long been used by militaries and governments to facilitate secret communication. Encryption is now commonly used in protecting information within many kinds of civilian systems. For example, the Computer Security Institute reported that in 2007, 71% of companies surveyed utilized encryption for some of their data in transit, and 53% utilized encryption for some of their data in storage. Encryption can be used to protect data "at rest", such as files on computers and storage devices (e.g. USB flash drives). In recent years there have been numerous reports of confidential data such as customers' personal records being exposed through loss or theft of laptops or backup drives. Encrypting such files at rest helps protect them should physical security measures fail.Digital rights management systems which prevent unauthorized use or reproduction of copyrighted material and protect software against reverse engineering (see also copy protection) are another somewhat different example of using encryption on data at rest. Encryption is also used to protect data in transit, for example data being transferred via networks (e.g. the Internet, e-commerce), mobile telephones, wireless microphones, wireless intercom systems,Bluetooth devices and bank automatic teller machines. There have been numerous reports of data in transit being intercepted in recent years. Encrypting data in transit also helps to secure it as it is often difficult to physically secure all access to networks. Encryption, by itself, can protect the confidentiality of messages, but other techniques are still needed to protect the integrity and authenticity of a message; for example, verification of a message authentication code (MAC) or a digital signature. Standards and cryptographic software and hardware to perform encryption are widely available, but successfully using encryption to ensure security may be a challenging problem. A single slip-up in system design or execution can allow successful attacks. Sometimes an adversary can obtain unencrypted information without directly undoing the encryption. See, e.g., traffic analysis, TEMPEST, or Trojan horse.

Amity School Of Hospitality Sandeep Maji

One of the earliest public key encryption applications was called Pretty Good Privacy (PGP). It was written in 1991 by Phil Zimmermann and was purchased by Symantec in 2010. Digital signature and encryption must be applied at message creation time (i.e. on the same device it has been composed) to avoid tampering. Otherwise any node between the sender and the encryption agent could potentially tamper it.

Electronic data interchange
Electronic data interchange (EDI) is the structured transmission of data between organizations by electronic means. It is used to transfer electronic documents or business data from one computer system to another computer system, i.e. from one trading partner to another trading partner without human intervention. It is more than mere e-mail; for instance, organizations might replace bills of lading and even cheques with appropriate EDI messages. It also refers specifically to a family of standards. In 1996, the National Institute of Standards and Technology defined electronic data interchange as "the computer-to-computer interchange of strictly formatted messages that represent documents other than monetary instruments. EDI implies a sequence of messages between two parties, either of whom may serve as originator or recipient. The formatted data representing the documents may be transmitted from originator to recipient via telecommunications or physically transported on electronic storage media." It distinguishes mere electronic communication or data exchange, specifying that "in EDI, the usual processing of received messages is by computer only. Human intervention in the processing of a received message is typically intended only for error conditions, for quality review, and for special situations. For example, the transmission of binary or textual data is not EDI as defined here unless the data are treated as one or more data elements of an EDI message and are not normally intended for human interpretation as part of online data processing." EDI can be formally defined as the transfer of structured data, by agreed message standards, from one computer system to another without human intervention.

Amity School Of Hospitality Sandeep Maji

Specifications
Organizations that send or receive documents between each other are referred to as "trading partners" in EDI terminology. The trading partners agree on the specific information to be transmitted and how it should be used. This is done in human readable specifications (also called Message Implementation Guidelines). While the standards are analogous to building codes, the specifications are analogous to blue prints. (The specification may also be called a "mapping," but the term mapping is typically reserved for specific machine-readable instructions given to the translation software.) Larger trading "hubs" have existing Message Implementation Guidelines which mirror their business processes for processing EDI and they are usually unwilling to modify their EDI business practices to meet the needs of their trading partners. Often in a large company these EDI guidelines will be written to be generic enough to be used by different branches or divisions and therefore will contain information not needed for a particular business document exchange. For other large companies, they may create separate EDI guidelines for each branch/division.

Interpreting data
EDI translation software provides the interface between internal systems and the EDI format sent/received. For an "inbound" document the EDI solution will receive the file (either via a Value Added Network or directly using protocols such as FTP or AS2), take the received EDI file (commonly referred to as a "mailbag"), validate that the trading partner who is sending the file is a valid trading partner, that the structure of the file meets the EDI standards, and that the individual fields of information conform to the agreed upon standards. Typically the translator will either create a file of either fixed length, variable length or XML tagged format or "print" the received EDI document (for non-integrated EDI environments). The next step is to convert/transform the file that the translator creates into a format that can be imported into a company's back-end business systems or ERP. This can be accomplished by using a custom program, an integrated proprietary "mapper" or to use an integrated standards based graphical "mapper" using a standard data transformation language such as XSLT. The final step is to import the transformed file (or database) into the company's back-end enterprise resource planning (ERP) system. For an "outbound" document the process for integrated EDI is to export a file (or read a database) from a company's back-end ERP, transform the file to the appropriate format for the translator. The translation software will then "validate" the EDI file sent to ensure that it meets the standard agreed upon by the trading partners, convert the file into "EDI"

Amity School Of Hospitality Sandeep Maji

format (adding in the appropriate identifiers and control structures) and send the file to the trading partner (using the appropriate communications protocol). Another critical component of any EDI translation software is a complete "audit" of all the steps to move business documents between trading partners. The audit ensures that any transaction (which in reality is a business document) can be tracked to ensure that they are not lost. In case of a retailer sending a Purchase Order to a supplier, if the Purchase Order is "lost" anywhere in the business process, the effect is devastating to both businesses. To the supplier, they do not fulfill the order as they have not received it thereby losing business and damaging the business relationship with their retail client. For the retailer, they have a stock outage and the effect is lost sales, reduced customer service and ultimately lower profits. In EDI terminology "inbound" and "outbound" refer to the direction of transmission of an EDI document in relation to a particular system, not the direction of merchandise, money or other things represented by the document. For example, an EDI document that tells a warehouse to perform an outbound shipment is an inbound document in relation to the warehouse computer system. It is an outbound document in relation to the manufacturer or dealer that transmitted the document.

Barriers to implementation
There are a few barriers to adopting electronic data interchange. One of the most significant barriers is the accompanying business process change. Existing business processes built around slow paper handling may not be suited for EDI and would require changes to accommodate automated processing of business documents. For example, a business may receive the bulk of their goods by 1 or 2 day shipping and all of their invoices by mail. The existing process may therefore assume that goods are typically received before the invoice. With EDI, the invoice will typically be sent when the goods ship and will therefore require a process that handles large numbers of invoices whose corresponding goods have not yet been received. Another significant barrier is the cost in time and money in the initial set-up. The preliminary expenses and time that arise from the implementation, customization and training can be costly and therefore may discourage some businesses. The key is to determine what method of integration is right for the company which will determine the cost of implementation. For a business that only receives one P.O. per year from a client, fully integrated EDI may not make economic sense. In this case, businesses may implement inexpensive "rip and read" solutions or use outsourced EDI solutions provided by EDI

Amity School Of Hospitality Sandeep Maji

"Service Bureaus". For other businesses, the implementation of an integrated EDI solution may be necessary as increases in trading volumes brought on by EDI force them to reimplement their order processing business processes. The key hindrance to a successful implementation of EDI is the perception many businesses have of the nature of EDI. Many view EDI from the technical perspective that EDI is a data format; it would be more accurate to take the business view that EDI is a system for exchanging business documents with external entities, and integrating the data from those documents into the company's internal systems. Successful implementations of EDI take into account the effect externally generated information will have on their internal systems and validate the business information received. For example, allowing a supplier to update a retailer's Accounts Payables system without appropriate checks and balances would be a recipe for disaster. Businesses new to the implementation of EDI should take pains to avoid such pitfalls. Increased efficiency and cost savings drive the adoption of EDI for most trading partners.

Digital signature
A digital signature or digital signature scheme is a mathematical scheme for demonstrating the authenticity of a digital message or document. A valid digital signature gives a recipient reason to believe that the message was created by a known sender, and that it was not altered in transit. Digital signatures are commonly used for software distribution, financial transactions, and in other cases where it is important to detect forgery or tampering.

Explanation
Digital signatures are often used to implement electronic signatures, a broader term that refers to any electronic data that carries the intent of a signature, but not all electronic signatures use digital signatures. In some countries, including the United States, India, and members of the European Union, electronic signatures have legal significance. However, laws concerning electronic signatures do not always make clear whether they are digital cryptographic signatures in the sense used here, leaving the legal definition, and so their importance, somewhat confused. Digital signatures employ a type of asymmetric cryptography. For messages sent through a nonsecure channel, a properly implemented digital signature gives the receiver reason to

Amity School Of Hospitality Sandeep Maji

believe the message was sent by the claimed sender. Digital signatures are equivalent to traditional handwritten signatures in many respects; properly implemented digital signatures are more difficult to forge than the handwritten type. Digital signature schemes in the sense used here are cryptographically based, and must be implemented properly to be effective. Digital signatures can also provide non-repudiation, meaning that the signer cannot successfully claim they did not sign a message, while also claiming their private key remains secret; further, some non-repudiation schemes offer a time stamp for the digital signature, so that even if the private key is exposed, the signature is valid nonetheless. Digitally signed messages may be anything representable as a bitstring: examples includeelectronic mail, contracts, or a message sent via some other cryptographic protocol.

Definition

Diagram showing how a simple digital signature is applied and then verified A digital signature scheme typically consists of three algorithms:


A key generation algorithm that selects a private key uniformly at random from a

set of possible private keys. The algorithm outputs the private key and a corresponding public key.
 

A signing algorithm that, given a message and a private key, produces a signature. A signature verifying algorithm that, given a message, public key and a signature,

either accepts or rejects the message's claim to authenticity. Two main properties are required. First, a signature generated from a fixed message and fixed private key should verify the authenticity of that message by using the corresponding

Amity School Of Hospitality Sandeep Maji

public key. Secondly, it should be computationally infeasible to generate a valid signature for a party who does not possess the private key.

Notions of security
In their foundational paper, Goldwasser, Micali, and Rivest lay out a hierarchy of attack models against digital signatures

1. 2. 3.

In a key-only attack, the attacker is only given the public verification key. In a known message attack, the attacker is given valid signatures for a In an adaptive chosen message attack, the attacker first learns signatures on

variety of messages known by the attacker but not chosen by the attacker. arbitrary messages of the attacker's choice. They also describe a hierarchy of attack results

1. 2. 3. 4.

A total break results in the recovery of the signing key. A universal forgery attack results in the ability to forge signatures for any A selective forgery attack results in a signature on a message of the An existential forgery merely results in some valid message/signature pair

message. adversary's choice. not already known to the adversary. The strongest notion of security, therefore, is security against existential forgery under an adaptive chosen message attack.

Uses of digital signatures
As organizations move away from paper documents with ink signatures or authenticity stamps, digital signatures can provide added assurances of the evidence to provenance, identity, and status of an electronic document as well as acknowledging informed consent and approval by a signatory. The United States Government Printing Office (GPO) publishes electronic versions of the budget, public and private laws, and congressional bills with digital signatures. Universities including Penn State, University of Chicago, and Stanford are publishing electronic student transcripts with digital signatures.

Amity School Of Hospitality Sandeep Maji

Below are some common reasons for applying a digital signature to communications:

Authentication
Although messages may often include information about the entity sending a message, that information may not be accurate. Digital signatures can be used to authenticate the source of messages. When ownership of a digital signature secret key is bound to a specific user, a valid signature shows that the message was sent by that user. The importance of high confidence in sender authenticity is especially obvious in a financial context. For example, suppose a bank's branch office sends instructions to the central office requesting a change in the balance of an account. If the central office is not convinced that such a message is truly sent from an authorized source, acting on such a request could be a grave mistake.

Integrity
In many scenarios, the sender and receiver of a message may have a need for confidence that the message has not been altered during transmission. Although encryption hides the contents of a message, it may be possible to change an encrypted message without understanding it. (Some encryption algorithms, known as nonmalleable ones, prevent this, but others do not.) However, if a message is digitally signed, any change in the message after signature will invalidate the signature. Furthermore, there is no efficient way to modify a message and its signature to produce a new message with a valid signature, because this is still considered to be computationally infeasible by most cryptographic hash functions (see collision resistance).

Non-repudiation
Non-repudiation, or more specifically non-repudiation of origin, is an important aspect of digital signatures. By this property an entity that has signed some information cannot at a later time deny having signed it. Similarly, access to the public key only does not enable a fraudulent party to fake a valid signature.

Amity School Of Hospitality Sandeep Maji

Project on Internet Marketing Issue
Submitted by:Sandeep Maji A2706009086 B.sc-Hm 3rd year
Amity School Of Hospitality Sandeep Maji

Batch-B

THANK YOU

Amity School Of Hospitality Sandeep Maji

ACKNOWLEDGEMENT

I am extremely thankful to the Mr. Bhoop Singh Mehta, for his throughout guidance , encouragement and technical support. He provided me an opportunity to enhance my technical knowledge as required in the industry. It also helped me in developing the spirit of professionalism , sincerity and dedication at my work.

Amity School Of Hospitality Sandeep Maji

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close