Subscribe by Email


Showing posts with label Method. Show all posts
Showing posts with label Method. Show all posts

Wednesday, October 2, 2013

What is link encryption method?

- Link encryption method is one of the classic methods used in the digital communications for the application of the crypto.
- Link encryption method has been designed for hiding the secrets and preventing the forgery of data. 
- It is quite a simple concept that has been discussed here and it fits for all the types of existing applications and software used in the communication.  
- Even though this method does not works well enough for most of the applications, it is the simplest of all. 
- Link encryption method is a security measure that should be used only if your security objectives match with those of the link encryption method. 
- It is commonly used in the applications where a boundary has to be maintained between the internal users and the external users. 
- With the link encryption it gets easy for the internal users to share data whereas it is just the opposite for the external users. 
- It provides transparent protection except for the separation that is maintained between the two classes of the users. 

Below we mention some security objectives that can be met with the link encryption:

Ø  Maintaining confidentiality: Our systems of course store very sensitive data. While exchanging the data with other systems, it is required that the risk of leakage involved should be as minimum as possible.

Ø  Communication with the outsiders: Obviously, we do not want to share our data with the unwanted outsiders and unauthorized sites and so we want these to be blocked. Such exchanges should be prevented from happening even by carelessness or accident.

Ø  Hiding data traffic: As much as possible we want our data and its details to be shielded from the outsiders. This data might contain information about the destination host and other info necessary for communication control. However, here it is assumed that the information will not be leaked by the insiders.

Ø  Familiarity and safety: We rank these two factors above the cost.

Ø  Protection of the data transfers: We need protection for our data against any sort of tampering or forgery by the outsiders during the transition. An assurance is important.  This objective is unconditionally met by this link encryption method.

- From security standpoint, a design is yielded by the link encryption that is highly reliable. 
- If in your organization some security parameter has been established that is strong enough, link encryption is the best technique for its maintenance. 
- A strict control is kept over the flow of physical documents through this security parameter. 
- The link encryption provides a complementary protection for the flow of the electronic documents. 
- We can have an environment with every data link that traverses the boundary having encryptors. 
- The documents will be kept within the parameter limits. 
- The data leaving the parameter will be protector by means of the encryptors. 
Link encryption method is being used since years in banking organizations and military communications for providing secure links. 
- The link encryption uses the in-line encryptors as its building blocks.
- This hardware devices takes plain text and converts it into cipher text.

The encryptors have their own vulnerabilities as mentioned below:
Ø  Rewrite attacks: It is also known as the plain-text attack, it is used for forging the messages. Few crypto algorithms are vulnerable to these attacks.
Ø  Replay attacks: Most of us think that the encrypted data is self-validating and so by matching the encryptor with its keys a sensibly de-crypting message can be generated. Since the encrypted data is accessible to the outsiders, they can also access the message that decrypts sensibly.
Ø  Covert signaling attacks: This attack is based on the idea that there is always a way to leak info if there exists an internal process that tries to do so. 


Sunday, June 3, 2012

What is meant by CRC cards? How they are used in extreme programming?


In its full form the CRC cards are known as “class responsibility collaboration cards” and have been considered to be a brain storming tool in the field of designing of the object oriented software. 
The concept of the class responsibility collaboration i.e. the CRC cards was introduced by the two people: Kent Beck and Ward Cunningham. 

What is written on index cards used in CRC cards?


- These cards find their typical use in the determination of the classes that are needed and also regarding their interaction among themselves. 
- The creation of a typical CRC card is regulated by the use of index cards on which the following 5 basic things are written:
  1. The name of the class.
  2. If applicable its super classes and sub classes.
  3. The responsibilities of the class.
  4. The name of the other classes involved in the collaboration for the fulfilment of the responsibilities.
  5. The name of the author.

What kind of CRC card should be used?


- To keep the complexity levels of the program design at minimum it is recommended that a small card is used. 
- Such a card helps the designer to focus up on the essential requirements of the class and thus preventing the designer from falling unnecessarily in to the details of it. 
- Also, the designer is prevented from getting in to the inner workings at one time when so much of detail holds the chances of becoming probable counter- productive thing. 
- The class responsibility collaborative cards are a means for forcing the designer to keep the class refrained from too many responsibilities.
- Since the cards have the property of portability, hence it becomes easy to lay them out on a table and re arrange them according to the designs discussed by the team members with the other people. 

Method for determining type of card


- A method for determining the types of the cards required is recently becoming very common. 
- The method consists of determining what all cards should be created by reading all the specifications regarding the program that is being designed.
- It also takes in to consideration of each noun as a class and on the other hand each verb as a responsibility of the class or the noun to which it rightly belongs. 
- To be more precise, you will find that the existence of the nouns or the verbs does not calls for a class or responsibility in the program, though it is still considered to be a good point to start with. 

Below we have given an example of the class- responsibility collaboration card’s format so that it becomes easy for you to understand how actually it displays the information:

- Name of the class: super class
- Sub classes: (lists the name of the classes that are derived from this class)
- Responsibilities: list all the responsibilities of the classes and description of the methods being used.
- Collaborations: this lists the relationship of the class to the other classes.

Use of CRC cards in Extreme Programming


- The CRC cards have played a great role in helping the developers design the software system or application as a team. 
- The best thing with the use of the CRC cards is that they allow the developers to break away from the usual monotonous procedure and follow new routines.
With the help of the CRC cards the entire project team is able to give the individual contribution in the development of the software project.
- This further leads to the incorporation of more individual and creative ideas in to the design of the system.
- For every object there is an individual CRC card. 


Facebook activity