.

Thursday, February 14, 2019

Trusted Systems: Protecting Sensitive Information :: Exploratory Essays Research Papers

Introduction With the widespread use of the profit, networked applications beat expanded to provide many an(prenominal) services that a few years ago would have seemed aired or futuristic. Among them are applications that allow you to find your perfect date, to file your taxes online, allow movies or even to send a demeanor gifts you dont like. With the proliferation of the meshwork the demand for programs that use nurture in more complicated and progress ways has risen. Commercial entities have come forward to fulfill this demand, and the meshwork has become the center for many applications driven by study. As information use and sharing among applications becomes more desirable we have seen the downside of sensitive information being accessible to entities for which it was not intended. When we look at the development goals of the internet and of computer networks in general we can easily see the contrasted goals that protecting solitude would present. T he internet was developed by people who apothegm great potential in being able to share scientific and military information quickly and easily between computers. Concerns about the privacy of information created by the new applications mentioned above, give us the goal of making sure that information is only accessible by the entities that it is intended for. By definition this means making information sharing more grueling as we dont want a legitimate substance abuser of information to be able to share that information with someone who does not have a legitimate right. For example if I submit my in-person information to an policy company, I dont want the insurance company to share my information with others who might use it to send me advertisements or for more sinister purposes. Current computer systems and networks have been built with the graduation exercise goal of ubiquitous access and information sharing in mind. therefrom protecting sensitive information requires us to completely rethink the way that computer systems are designed. Potentially there are two routes that we could take. unity is to allow computer systems and the internet to enjoy the free architecture that they have at present but to prosecute violators with strict laws on information security. The other is to completely redesign computer systems with the additional goal that information should only be accessible by parties that the owner of the information trusts.

No comments:

Post a Comment