CIS 505 Week 4 Discussions STR
Just Click on Below Link To
Download This Course:
https://bit.ly/2qlddXH
CIS 505 Week 4 Discussions STR
CIS 505 Week 4 Discussion 1
Hyper Text Transfer Protocol (HTTP) or Hyper
Text Transfer Protocol Secure (HTTPS) basically HTTPS is the secure version of
HTTP. The secure form encrypts all communication between the browser and
the website. HTTPS is used for the highly confidential online
transactions such as banking and shopping. The padlock icon in the web
browser is an indication that HTTPS is in effect. HTTP is a set of
standards that allow users of the web to exchange information found on web
pages. HTTPS provides confidentiality, integrity, and identity. HTTP I
see it will soon disappear since HTTPS provides a more secure way of
communicating. Sites that do not use HTTPS judiciously are crippling the
privacy controls you thought were protecting your data. HSTS (Hyper Strict
Transport Security makes sure communication is only used during HTTPS which is
needed to prevent downgrade attacks and cookie hijacking.
HTTP came around when internet protocols were
simple text-based. Hackers can easily obtain information sent over HTTP
because it is in plain text form. HTTPS sends information in encrypted
text format which is hard to read for hackers. Protocols for HTTPS are
SSL and TLS. SSL or secure sockets layer and TLS or Transport Layer
Security use asymmetric public key infrastructure (PKI) which uses two keys to
encrypt communication. The two keys are a public key and a private
key. An example of a private key would be replacing letters with numbers.
The only way it can be deciphered if the receiver knows the key pattern.
A public key is provided by the sharing of a secret between two entities.
Such as if person A had a message for person B the keys would be sent and the
encryption could only be decoded by these two people.
CIS 505 Week 4 Discussion 2
Inelastic traffic does not adjust its
material in answer to network conditions. Apps such as Skype,
Facebook Messenger, or Google hangouts are examples of Inelastic traffic.
These apps implement free options to voice and video calls.
Elastic traffic alters its material between
and end hosts in reply to network situation. Elastic traffic is TCP-friendly.
The cloud is used in many ways and Elastic Computing is when supplies can be
ascended up and down effortlessly by the cloud service provider. Cloud
computing is about equipping on-demand computing resources with the simplicity
of a mouse click. A number of resources which can be sourced through cloud
computing incorporate almost all the facets of computing from raw processing
power to massive storage space. The knack of a service provider to running
malleable computing command when and wherever mandatory. The flexibility
of these means can be in relations of processing power, storage, and bandwidth.
Elastic Traffic can adjust, over wide ranges,
to changes in delay and throughput across the internet and still meet the needs
of its applications. Elastic traffic was created for the internet due to
its support of TCP/IP. Organizers flourish on building innovative
commodities and services to satisfy purchaser requirements, although, prices
decide if a corporation earns a profit. If prices are inexpensive, businesses
can’t cover their liabilities, and if costs are too great, they may not lure
just shoppers to break even. Elastic demand illustrates a situation where the
quantity of product consumers wants to buy is very sensitive to its price,
which can be an important consideration when setting or changing prices.


Comments
Post a Comment