tailieunhanh - Webmaster's Guide to the Wireless Internet part 48

Webmaster's Guide to the Wireless Internet part 48. The Webmaster’s Guide to the Wireless Internet provides the Wireless Webmaster with all of the tools necessary to build the next generation Internet. Packed with the essential information they need to design, develop, and secure robust, e-commerce enabled wireless Web sites. This book is written for advanced Webmasters who are experienced with conventional Web site design and are now faced with the challenge of creating sites that fit on the display of a Web enabled phone or PDA | 442 Chapter 10 Securing Your Wireless Web cyclic redundancy check CRC algorithm which represents the integrity of information as a number. Privacy Privacy means that information communicated between two people or computers is inscrutable to third parties. Encrypting information so that only the sender and recipient understand it ensures privacy. Public Key In public-key cryptography the sender and recipient each get two keys a private key and a public key. The public key is made accessible while the private key remains secret. The sender of a message encrypts the information using the recipient s public key but the information can only be decrypted using the recipient s private key. Secret Key In secret key cryptography the sender and recipient use the same method of encrypting and decrypting information. A shared piece of information or secret known only to a message s sender and recipient can be used to encrypt and decrypt the message. This is known as secret key or symmetric cryptography. Trojan A program that appears to be legitimate but is designed to have destructive effects on the programs and data of the computer onto which the Trojan program has been loaded. Virus A program that replicates itself by infecting other programs. Viruses are typically programmed to append their executable code to other programs resulting in their propagation. Worm A malicious program that replicates itself over a network and that typically fills all of the storage space or network capacity. Worms typically exploit a specific vulnerability such as a buffer overflow in a particular network application in order to execute their own code on remote machines. WTLS and Point-to-Point Security Models The term point-to-point security describes an approach where information is protected at each leg of the journey from a user to a Web server by the appropriate security technology for each part of the communication. As we have seen this approach has inherent weaknesses at the points where

TỪ KHÓA LIÊN QUAN