Essay: The Web and Security Instructions The internet and the web are separate entities that work together to allow communication. The internet provides the infrastructure and the web provides web applications to enable communications and services. Yet, along with the benefits they provide, the internet and the web have created a risk for our data to be stolen. As evidenced in the study material for this week, keeping the data transmitted through the web secure and confidential is paramount to the effectiveness of all online communications. Hence, security protocols have been developed to provide encryption to mitigate the risk for data theft. Write an essay explaining encryption and the use of security protocols used today. Discuss the various levels of encryption and which protocols secure the web applications. Describe how they work to keep communications safe on the web. Investigate various web applications used, including e-commerce and social media, and report on the encryption protocols used to protect each application.
Essay: The Web and Security
Instructions
The internet and the web are separate entities that work together to allow communication. The internet provides the infrastructure and the web provides web applications to enable communications and services. Yet, along with the benefits they provide, the internet and the web have created a risk for our data to be stolen.
As evidenced in the study material for this week, keeping the data transmitted through the web secure and confidential is paramount to the effectiveness of all online communications. Hence, security protocols have been developed to provide encryption to mitigate the risk for data theft.
Write an essay explaining encryption and the use of security protocols used today. Discuss the various levels of encryption and which protocols secure the web applications. Describe how they work to keep communications safe on the web. Investigate various web applications used, including e-commerce and social media, and report on the encryption protocols used to protect each application.
Word Count: Minimum of 750
Step by step
Solved in 10 steps