||How it works
|| A firewall establishes security by defining the services and access permitted to various users. Effectively, it creates a barrier between a corporate network and an external network.
Technically, a firewall is software and/or hardware that allows only external users with specific characteristics to access a protected network or site.
It gives insiders full access to services while granting outsiders access to services only selectively, based on user names and passwords, an Internet IP address, or a domain name.
||Encryption is designed to secure information that travels over public channels such as copyrighted or confidential data. It helps to ensure privacy, confidentiality, and integrity.
Two kinds of encryption exist: secret-key encryption and public-key encryption:
1.Secret-key encryption (also known as symmetric key encryption) involves the use of a shared key for encryption by the transmitter and decryption by the receiver.
2. Public-key encryption (also known as asymmetric encryption) uses two keys, one to encrypt the message and another to decrypt the message.
The two keys are mathematically related so that data encrypted with one key can only be decrypted by using the other.
|| Biometrics are a means of using biology and/or physiology to identify a user though either thumb prints, eye-scans, or voice recognition. They are generally used for physical security for highly sensitive sites.
|| Digital certificates are attachments to electronic messages that are used for security purposes.
They are one method of ensuring the identity of a person or entity in order to guarantee the integrity and to verify the origin of the user/order.
|| A Secure Sockets Layer (SSL) negotiates point-to-point security between clients and servers. By convention, Web pages that require an SSL connection start with https: instead of http:.
|Public-key infrastructure (PKI)
|| PKIs are Internet-specific security suites that combine encryption technology, software, and services.
They enable organizations to secure online business transactions and communication by integrating public-key cryptography and digital certificate technology into an organization-wide security infrastructure.