.

Monday, March 25, 2019

Trusted Systems: Protecting Sensitive Information :: Exploratory Essays Research Papers

Introduction With the far-flung map of the internet, networked applications have expanded to provide many services that a few years ago would have seemed impractical or futuristic. Among them atomic number 18 applications that allow you to find your perfect date, to file your taxes online, rent movies or raze to send away gifts you put one overt like. With the proliferation of the internet the demand for programs that use schooling in more complicated and advanced ways has risen. technical entities have come forward to fulfill this demand, and the internet has become the warmness for many applications driven by study. As information use and portion-out among applications becomes more desirable we have seen the downside of nociceptive information being come-at-able to entities for which it was not intended. When we look at the development goals of the internet and of information processing system networks in general we can easily see the contradictory goal s that protecting concealing would nonplus. The internet was developed by people who saw great probable in being able to sh be scientific and military information quickly and easily between computers. Concerns about the privacy of information created by the new applications mentioned above, give us the goal of making sure that information is only accessible by the entities that it is intended for. By definition this subject matter making information sharing more difficult as we dont want a legitimate user of information to be able to share that information with someone who does not have a legitimate right. For example if I submit my personal information to an insurance policy company, I dont want the insurance company to share my information with others who might use it to send me advertisements or for more opprobrious purposes. Current computer systems and networks have been built with the first goal of omnipresent access and information sharing in mind. Therefore protecting sensitive information requires us to only rethink the way that computer systems are designed. Potentially there are two routes that we could take. One is to allow computer systems and the internet to enjoy the free architecture that they have at present but to prosecute violators with strict laws on information security. The other is to completely redesign computer systems with the additional goal that information should only be accessible by parties that the owner of the information trusts.

No comments:

Post a Comment