Rus Articles Journal

How our money on the Internet is protected?

Since the most ancient times people took great pain to protect information which possessed and which needed to be kept in a secret. But if then the main methods of protection were connected directly with danger of physical interception of confidential data and consisted in their physical protection, then now, in conditions when terabytes of information are every minute transferred on the Global network between the people who sometimes are on different continents, the problem of data protection rises in a new way.

How to catch the spy if you do not see him and you do not know where he? Besides, you, most likely, do not even learn that your information was stolen, and it is quite possible that you, will personally transfer it to the malefactor, about it without suspecting anything.

Ponder, when in a browser window on the website Webmoney you press a button “To enter a private office“, yours login and the password pass a set of computers, are transferred from one to another until reach the destination. For achievement of a host within one country data usually have to pass through dozens of different computers. For data transmission on the hosts which are in other countries more than 20 intermediate computers can be required. And it means that any of them can check data when they pass through it. And if someone learns login and the password from your purse, to silly hope that this someone will not use it.

You do not hurry to despair and withdraw the money from account on the Internet to hide them in socks. Believe, there they are threatened by much bigger danger. Article purpose - not to frighten, and on the contrary, to calm the reader, having explained to him as our data in the Global network are protected. Besides, methods which will be described here do not depend personally on you in any way and are observed irrespective of you so you can relax and not worry that after reading of this article you should run and urgently to change everything and to adjust.

So, we will begin.

Whether you paid attention what structure of the reference in the Internet? As a rule, it - “and the address necessary to us“. But not it is important, but another. Whether you noticed as ours dexterously turns When you see in the reference address All transmitted data are ciphered, and even in case of their interception the burglar will not be able to read them.

2. You can be sure that you transfer information to the one to whom intended to transfer it.

3. Tonight you can sleep peacefully.

At once It is necessary to tell that from the point of view of a subject matter “Information security“, this description of the protocol of the protected sockets (SSL), at least, is incomplete and it is ambiguous. However to the ordinary user of the Network who does not need to understand all subtleties of authentication on “Handshake model“ and to know the principle of attack like “People in the middle“, this explanation will inform of the main thought (see point 3). The only thing what it is worth mentioning is about the way allowing the client to define unambiguously the server to which he transfers data. The SSL protocol is engaged in it too, and here is how it occurs.

Before data transmission the server to which you are going to transfer these data has to at first you prove that it actually that for whom gives itself. For this purpose he transfers you the digital certificate which contains an open key of enciphering, other information on itself(himself), and also information on the center which issued this digital certificate. This description, besides, is quite conditional, but not it is important now. The fact that the received certificate contains an open key of enciphering allows you to create on its basis the code which can be deciphered only by means of the closed enciphering key which is transferred and stored only on the server anywhere and never. And it means that only the server which sent you the digital certificate can decipher what was ciphered by you. And if he makes it truly (and he also sends result of decoding to you), then it it unambiguously itself(himself) authenticates.

Thus, the possibility of carrying out attack “The person in the middle“ when the malefactor is represented to the server the client, and to the client - the server disappears, and all data pass at first through it. However the malefactor can create the digital certificate to himself and to itself to assure him therefore here the special third party - the center of certification to which initially trust both parties of an exchange and which, actually, and issues the digital certificate acts as the guarantor of safety.

You should not think that the magic SSL protocol and the reference of type So, for example, the SSL protocol will not rescue your login and the password if they are written down in a notebook which you forgot in the tram.

Trust each other, but do not forget about information security!