Explained – Terms about the Internet which you always wanted to know

What is a IP Address?

You might have heard about this word many a times. We humans live in houses which have addresses which the postman uses to locate our house, Similarly devices connected to the internet have a digital address.

The IP Address is a numerical address that is assigned to every device connected to the Internet.

 ipaddress
                   In many cases, IP addresses may be used to identify an organisation or individual that has acquired the services of an Internet Service Provider in order to connect one or more devices to the Internet.
In other cases, particularly on corporate networks, public or unprotected wireless connections and mobile Internet connections, the IP address does not always identify the person behind some digitally traceable act.
As the common household and business router will often display just one IP address for all of the people connected to it, the IP address will identify a group of people rather than just one individual. As a result, it is often hard, if not impossible, to be sure who exactly did what, purely on the basis of an IP address.
ip2
On the other hand, IP addresses are very often personally identifiable, and so, following a basic precautionary principle, must be treated as such unless they can definitively proven not to be.
 ip4
Due to shortages in the current generation of IP addresses, it is increasingly common, particularly in business networks, for IP addresses to be shared – by all of the computers in one office, The current shortages are being addressed by the roll-out of IPv6 addresses.
What is Encryption?

How can a user send a sensitive message so that it remains secure from prying eyes? If you send a letter, it could be intercepted,

opened, read and then closed without leaving a trace. A telephone call can be wiretapped.Rapid development of cryptography.

started in 20th century together with development of computing technologies. Computers allowed not only much faster.

encryption of electronic messages, but also much faster cracking of encryption keys used so far.Encryption is not a silver bullet and doesn’t guarantee total confidentiality. A frequent technique to bypass encryption is to capture the message before it even gets encrypted – for example by a stealth Trojan horse program installed on sender’s computer that will monitor all keys pressed on the keyboard or even in the victim’s mobile telephone.Another attribute you almost always need to protect when encrypting a message is its integrity (i.e. the completeness of the file) – otherwise the message can be manipulated, without even knowing the encryption key. Most respected encryption tools will do that for you automatically.The following image demonstrates the stages of public key encryption – this works on the basis of a pair of keys – one public and one private:1.The sender requests a copy of this public key.

2.Using the appropriate software, the sender encrypts the message using the recipient’s public key.

3.The message is sent.

4.The recipient decrypts the message by using the public key and the private key together.

 encryption

Leave a Reply