Tuesday, September 29, 2009

Lec 7 : Security Application

In the chapter 7 we learn about security application. In this chapter we must know about electronic mail security and what it is and how it works. In security provided in email is confidentiality , data origin authentication, message integrity, non-repudiation of origin and key management. We must to know how emails transported in when user used email. Mostly in this chapter about email security and threats. We must know how to secure the web. In HTTPS we must know access control.Nowadays, the
world is become expand especially in term of technology. For example, biometric technology and fingerprint recognition. At the same time, it also came with
advantage and disadvantage.

1 comment:

  1. You are right that In HTTPS we must know access control and technology has evolved very fast and we need to work seriously to make information secure over network.Good blog specially it is chapter wise.Keep going .
    eSignature

    ReplyDelete