登陆注册
27082000000079

第79章 Computer Security(9)

Other types of fraud essentially persuade you to do something in tile (wrong) belief that it should be done, or to accept something in settlement that proves to be without the value you were led to believe. But they all come back to the same thing--the fraudster has to persuade you that his vision of the world is the correct one.

How do we normally counter fraud?

In ordinary life there are many things set up to help avoid fraud. Mostly we rely upon physical things--buildings (such as banks) help to prove to us that we are dealing with something real--talking to people on the telephone on a number that is in a directory helps us believe that they are who we expect. At a more sophisticated level, businesses have to be registered. There are also agencies with a duty to respond to complaints over the trading practices of businesses.

Avoiding obvious frauds on the Internet

Some potential sources of fraud--misrepresenting a business as that of someone else--are being slowly dealt with. Domain name registration has almost reached the point where there is some certainty that www. Harrods.com is the web version of a famous department store in Knightsbridge, London. But it is still very far from being fully resolved. It is still possible to register www. harrodds.com, www.harrodss.com. You can copy the real thing without too much difficulty, and with a bit of luck and some spelling mistakes a fraudster can still be in business.

Some less obvious frauds

The Internet uses a technology called TCP/IP in order to send information between one point on the Internet and another. Unfortunately it was not designed to be secure; it was designed to be resilient. As a result it is possible to read information that travels around the Internet, and also to alter it. Therefore, it is possible both to read information that is not protected and copy information that has been protected using cryptography, (a technique that makes information unreadable to the unauthorized) and to change the unprotected information without being detected.

The effect of this is to create a situation where fraud can be carried out even when a genuine transaction is taking place. Fraud might include putting other recipient’s names on the distribution list to make you believe they are also involved or in agreement with what is going on. The fraud is subtle because it is impossible for either party to detect. It is effective because the fraudster may have gathered information that allows them to completely impersonate both parties in the future.

Solutions for technical problems

These frauds require a manipulation of the Internet technologies, and so can be resisted by technology. However, the technology being marketed to solve this problem Secure Sockets Layer (SSL), in the way in which it is usually implemented, has fundamental weaknesses, and has been shown to be capable of being defrauded. Many other schemes, based upon codes of practice and logos shown on web sites, although worthy in themselves, are equally capable of being defrauded. It seems strange that some advertising appears to suggest encryption technology using a 40 bit algorithm is perfectly secure for commerce, whilst also saying that 128 bit algorithms are essential.

Alternative technologies such as those from Artic-Soft are being delivered now that allow end users to gain immediate validation of web site content itself. They require software to be present in the machines of the end users to act on behalf of theuser to carry out checks that the user can be prevented for doing themselves by competent fraudsters.

They also require competent registration procedures for Internet traders to make it more difficult for a fraudster to enter the system and pretend to be genuine. Such registration procedures are claimed to be in place for SSL.

同类推荐
  • Z. Marcas

    Z. Marcas

    本书为公版书,为不受著作权法限制的作家、艺术家及其它人士发布的作品,供广大读者阅读交流。
  • 人性的弱点全集(英文朗读版)

    人性的弱点全集(英文朗读版)

    HowtoWinFriends&InfluencePeopleisthegrandfatherofallpeople-skillsbooks,whichwasfirstpublishedin1937.Itwasanovernighthit,eventuallyselling15millioncopies.DalecarnegiehadanunderstandingofhumannaturethatwillneverbeoutdatedFormorethansixtyyearsthero……
  • 课外英语-流行妙语(双语版)

    课外英语-流行妙语(双语版)

    本套书共50册,分为美国各州的小知识,七彩缤纷的音符,优美好看的小散文,开心时分的短文,经典流传的寓言,超级高效的短句,实际有用的词汇等等在这些书中,备有单词解释,相关简介,或中文翻译,便于同学们更好的阅读和理解,真正进入文字的内涵当中,准确地和文字进行交流。本书主要收录了一些经典谚语、流行美语,俚语、吵架用语、经典赞美用语,对处理日常生活中的小事小情很有帮助。
  • Le Mort d'Arthur

    Le Mort d'Arthur

    本书为公版书,为不受著作权法限制的作家、艺术家及其它人士发布的作品,供广大读者阅读交流。
  • 课外英语-高考必备词汇(双语版)

    课外英语-高考必备词汇(双语版)

    本套书共50册,分为美国各州的小知识,七彩缤纷的音符,优美好看的小散文,开心时分的短文,经典流传的寓言,超级高效的短句,实际有用的词汇等等在这些书中,备有单词解释,相关简介,或中文翻译,便于同学们更好的阅读和理解,真正进入文字的内涵当中,准确地和文字进行交流。本书主要分为地理小贴士、生活的角落和科技的发展等板块。本书介绍了高考必备词汇。
热门推荐
  • 逆天狂妃邪王别嚣张

    逆天狂妃邪王别嚣张

    24世纪第一特工穿越了?好吧,那是九州八荒图为了让我活下来做的。既然来到这斗灵大陆,就让我干出一番大事!说我是废物?你见过拥有全系感知力的废物?你拥有灵器?不好意思,我这最低都是神器!你有灵品丹药?呵呵哒,我把神品丹药当糖吃!你的契约兽是圣兽?我的只想说我的契约兽最低都是神兽!“嗯,看在你为我好的份上,就你了!”“好的,娘子~”
  • 找寻来时的路

    找寻来时的路

    每天,我们都在忙在赶路;走得太急,有时难免会误入歧途,等到发现走错了再想回头时,是否还能找到来时的路?
  • 永世之缘

    永世之缘

    他在前世被自己心爱的人所……从一个以武为尊的世界转世到最平常的普通世界,但自己却忘记自己的前世记忆,许多非比寻常的人为了使他重返前世而来到这个世界,从而展开了一场隔世之斗。
  • 契约者关谷神奇

    契约者关谷神奇

    在意料之外的营救任务中意外牺牲的文职警员关谷重生到了泥轰国。现名关谷神奇,父亲关谷健次郎是关谷流料理的当代传人。一个新生代的梦魇空间契约者。
  • 落日劫

    落日劫

    在遥远的云端,那是人类可望而不可即的世界。神的世界,诸神像天地一般存在于那个高高在上的世界里。他们掌握着天地的变化,他们主宰着日月星辰,他们掌控着生死祸福,他们看似掌控着一切。但是他们的命运由谁来掌握,他们的幸福用什么来获得。大地女神,执掌人间。她是代表希望的女神,她是“生”的象征。冥王,冥界的最高统治者,他是死亡的代名词。当大地女神遇到了冥王,当时空的轨迹发生了诡异的偏转,这次的相遇,是缘,还是孽。大地女神与冥王,不该有交集的轨迹,他们之间,注定是一场虐恋。
  • 天行

    天行

    号称“北辰骑神”的天才玩家以自创的“牧马冲锋流”战术击败了国服第一弓手北冥雪,被誉为天纵战榜第一骑士的他,却受到小人排挤,最终离开了效力已久的银狐俱乐部。是沉沦,还是再次崛起?恰逢其时,月恒集团第四款游戏“天行”正式上线,虚拟世界再起风云!
  • 站在原点开始玺欢你

    站在原点开始玺欢你

    婉婷一次偶然的机会让她来到了明星学校,结实了很多的好朋友,当然也结了很多的仇恨,即使这样婉婷依然选择好朋友,在毕业的这三年里,经历了很多,也想了许多,当婉婷离开你们之时就是她再也不回来的理由.
  • 寒月征尘

    寒月征尘

    寒月照铁铠,浮世染征尘,故作寒月征尘。侠之大者,为国为民。替朝廷分忧,为百姓解难。架空背景下的朝堂与民间、沙场与江湖。有理想主义者为理想赴汤蹈火,有现实主义者为利益大动干戈。文中一切,俱是梦呓,倘若冒犯,权当胡言,如有雷同,纯属巧合。
  • 梧桐树下的青春

    梧桐树下的青春

    他是帅气狂妄的校草,却爱上她这个小土妹。奈何因为重重误会,他们最终分手。多年后,阔别校园,他们再次重逢。而她早已不是当年恐龙妹,轻熟性感令他心跳不止,当年青涩爱情能否再续?
  • 纵横河山

    纵横河山

    刘枫,一个汽车修理厂的工人,在一次和朋友去野外烧烤时,因背的东西太多,走山路时脚下打滑掉下了山谷,阴差阳错的穿越到了东汉末年,从此开起了属于他的三国之路。