Apple Pay Case

Great Essays
1)
Apple Pay
In the spring session of 2014 apple released apple pay to provide a seamless transfer of money between two parties. This was a move to position apple to further pursue further transactions without the need to pull out a spate card. In the future it is hope that apple pay would act also like a security card, and transport capabilities that can be used to access buildings and transport options. Apple pay in the meanwhile has to further adapt and conform to counteract fraudulent and misadventure data, so securing a secure mobile platform is critical for its success.
How it works
Apple has devised a way in which to create a safe passage of fund without releasing credit card details. However apple uses in its place something called
…show more content…
This is 4 times larger in bits with 340,282,366,920,938,463,463,374,607,431,768,211,456 possible addressable nodes.

The need to have an increase in the amount of addressesarouse from the explosion in the usage of addresses which included:
a) An increase in the internet population by approximately 2 billion users in 2011.
b) Increase in the amount of mobile users including smart phones, PDAs, tablets, notepads etc.
c) An increase in consumer devices such as E-book readers, TVs and cable set-top boxes, cameras that also use the internet.
d) Transportation, which saw 1.1 billion automobiles in 2010
These factors has led to a rapid decline in available addresses for IPv4. Several methods were implemented in order save the remaining addresses. One of them included the use of Network Address Translation. NAT provides a method of allowing several addresses to be connected to the internet through a public IP address. There are many problems associated with NAT which is not prevalent in IPv6. This has seen a drastic improvement in performance by using
…show more content…
Realistically, though optional IPsec is implemented more widely in IPv4 rather than IPv6. Even though there may not be too much functional differences of IPsec within IPv4 and IPv6, the differences in performances are recognized through the use of NAT in most IPv4 networks. This would restrict the end-to-end communications using IPsec. The implementation of NAT within IPv6 will therefore weaken the security of IPv6.
With the implementation of a relatively new protocol such as IPv6 will be followed by an initial period of increased security vulnerabilities within a dual network environment. IPv6 provides support for configuration capabilities such as neighbour discovery, address auto-configuration, router discovery, and renumbering. These configuration capabilities are better than the auto -configuration capabilities which are typically found in IPv4.

Although there are many operational advantages of auto configuration and control capabilities, IPv6 fundamentally relies on the operations which create new threats and vulnerabilities which are associated with misuse. Most IPv6 auto-configuration mechanisms make significant use of multicast, unicast and scoped addressing capabilities.

Finally as IPv6 has become more prevalent, the experience gained from running IPv4 networks and comparing it with Ipv6 for 20 years will help identify and address many security issues.

Related Documents

  • Improved Essays

    IPsec is often installed on today's IPv4 networks to protect communication over VPN networks. It is used to access VPN, as well as between VPNs. IPv6 transition mechanisms can use this kind of infrastructure to achieve a certain level of protection, even in the absence of IPv6 IPsec. Remote IPv4 hosts access private networks by establishing encrypted VPN access to a gateway device set up for this purpose. If the same host is capable of IPv6, it can break through an IPv6 tunnel over this IPv4-protected communication channel.…

    • 274 Words
    • 2 Pages
    Improved Essays
  • Superior Essays

    Introduction The current information technology (IT) infrastructure consists of a mix of 2008 and 2008 R2 servers, with two legacy Windows 2000 servers, and four Windows Server 2012. In addition to the Windows server environment, the network consists of routers, switches, and security appliances, such as firewalls. The environment also consists of important services to ensure the security, and stability of the network.…

    • 922 Words
    • 4 Pages
    Superior Essays
  • Great Essays

    Nt1330 Unit 3

    • 1174 Words
    • 5 Pages

    Secure Shell (SSH) In this paper, I will discuss the network protocol Secure shell, better known as SSH. Interest in choosing this protocol came from my frequent use of SSH to run applications on the remote servers in Coover Hall. Because of this, I will be exploring the details on how the protocol works, vulnerabilities associated with it and mitigation techniques put in place to counter attacks. SSH is a Cryptographic Network Protocol created to replace Telnet.…

    • 1174 Words
    • 5 Pages
    Great Essays
  • Decent Essays

    Nt1330 Unit 3 Case Study

    • 305 Words
    • 2 Pages

    In round and robin mechanism it allocate IP address to the requested client as per the availability and making the server highly available . Answer 4:- "in.addr-arpa" is used to remove the obstruction to subnet on non-octet boundaries. Thus making it possible to assign IP address in smaller octet then 24 bit prefix without losing the ability to delegate authority for in.addr-arpa mapping.…

    • 305 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Attackers exploiting default configurations to gain access to the network and to information stored on devices in the network are major threat to home gateway devices. In order to mitigate this threat there are many common default configurations a user should change. When setting up a home network, a user should make sure to change the default passwords. They should set up a strong account password and wifi password using best practices. The user should use a strong security protocol such as WPA2 instead of the default WEP which is not secure.…

    • 693 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    In this task I will be using a diagram to outline the relationship between the layers in an interface showing each other of the points in the corresponding layer in the TCP/IP protocol suite. I will also be describing the type and functions of entities and the service they provide. A) The way communications are done between a computers on a network is through protocol suits. The most used protocol suite and commonly available protocol suite is TCP/IP protocol suite.…

    • 505 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Final Exam Paper

    • 1307 Words
    • 6 Pages

    How many bits are used in Each? In the IPV 4 the address space use 32 bits and in the IPV 6 totally 128 address bits are Used . but the IPV4 is the most Commonly used version because in the IPV4 it is relevant and faster processing and Compered to IPV 6 is less in cost . • IPv4 - 32 bits • IPv6 - 128 bits A.…

    • 1307 Words
    • 6 Pages
    Improved Essays
  • Improved Essays

    With this, a compromised node running malicious code disguised as a legitimate node continuously seeks to find ways to disrupt communication and paralyze the network. However, node compromise attack is severe when the base node is compromised. Therefore, different activities like stealing secrets from the encrypted data, reporting wrong and misleading information to the network, reporting other legitimate nodes as compromised nodes, launching different routing attacks takes place. The best way to counter node compromise is to utilize code testing schemes which employ an optimal program verification process to verify the memory of a sensor node by calculating the hash values of randomly selected memory regions.…

    • 869 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Penny Synthesis Essay

    • 699 Words
    • 3 Pages

    In the present day of 2017, Americans no longer have the time for simple inconveniences. At the swipe of a card, purchases can be made in as…

    • 699 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    With over 8 years of experience in the telecommunications and networking industry, I had the opportunity to work on challenging assignments and build innovative products. Consequently, I gained valuable skills in networking domain. During the last couple of years, the landscape of the networking industry has changed profoundly. In my current work on Software Defined Networking(SDN) and Network Function Virtualization(NFV), we are in the early stages of exploring technologies like Big data, Machine Learning(ML) to improve analytics, telemetry, orchestration, operation management, security etc. The use of ML in the field of networking can be transformational, in fact, we might see ML in all facets of networking.…

    • 616 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nobody would argue that the use of technology has dramatically increased over the past decade, let alone over the past century. Need an example? By looking at our everyday lives, countless examples exist from cars to computers. Technology has impacted and changed every aspect of our lives. Namely, one piece of technology in particular transformed people’s lives: the television.…

    • 1636 Words
    • 7 Pages
    Improved Essays
  • Great Essays

    Starbucks Case Study

    • 2837 Words
    • 12 Pages

    This is an added value to the brand. It enhances the overall consumer experience. Starbucks is also enabling mobile payments. They are testing this in pilot locations in the US.…

    • 2837 Words
    • 12 Pages
    Great Essays
  • Great Essays

    Due to this advanced technology, they could fine the data in more advance way and they could connect with only those service…

    • 1277 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    Outsourcing Trends

    • 1566 Words
    • 7 Pages

    Briefly describe the technologies that are leading businesses into the third wave of electronic commerce. The key technologies that are leading businesses into the third wave of electronic commerce include mobile phones and tablets along with high-speed networks that allow users to access the Internet and smart cards and radio frequency identification devices (RFID) that are being used with biometric technologies such as retina scanners and fingerprint readers. In about 100 words, describe the function of the Internet Corporation for Assigned Names and Numbers. Include a discussion of the differences between gTLDs and sTLDs in your answer.…

    • 1566 Words
    • 7 Pages
    Improved Essays
  • Improved Essays

    As computers became essential to business, industry, trades, and professions, educators and parents became increasingly concerned that young people acquire at minimum the basic understanding of computers and master the related skills. 2. Explain computer algorithms and its significance An algorithm is a set of instructions designed to perform a specific task. In computer science, an algorithm is a set of steps for a computer application to accomplish a task.…

    • 790 Words
    • 4 Pages
    Improved Essays