Apple Pay Case
In the spring session of 2014 apple released apple pay to provide a seamless transfer of money between two parties. This was a move to position apple to further pursue further transactions without the need to pull out a spate card. In the future it is hope that apple pay would act also like a security card, and transport capabilities that can be used to access buildings and transport options. Apple pay in the meanwhile has to further adapt and conform to counteract fraudulent and misadventure data, so securing a secure mobile platform is critical for its success.
How it works
Apple has devised a way in which to create a safe passage of fund without releasing credit card details. However apple uses in its place something called …show more content…
This is 4 times larger in bits with 340,282,366,920,938,463,463,374,607,431,768,211,456 possible addressable nodes.
The need to have an increase in the amount of addressesarouse from the explosion in the usage of addresses which included:
a) An increase in the internet population by approximately 2 billion users in 2011.
b) Increase in the amount of mobile users including smart phones, PDAs, tablets, notepads etc.
c) An increase in consumer devices such as E-book readers, TVs and cable set-top boxes, cameras that also use the internet.
d) Transportation, which saw 1.1 billion automobiles in 2010
These factors has led to a rapid decline in available addresses for IPv4. Several methods were implemented in order save the remaining addresses. One of them included the use of Network Address Translation. NAT provides a method of allowing several addresses to be connected to the internet through a public IP address. There are many problems associated with NAT which is not prevalent in IPv6. This has seen a drastic improvement in performance by using …show more content…
Realistically, though optional IPsec is implemented more widely in IPv4 rather than IPv6. Even though there may not be too much functional differences of IPsec within IPv4 and IPv6, the differences in performances are recognized through the use of NAT in most IPv4 networks. This would restrict the end-to-end communications using IPsec. The implementation of NAT within IPv6 will therefore weaken the security of IPv6.
With the implementation of a relatively new protocol such as IPv6 will be followed by an initial period of increased security vulnerabilities within a dual network environment. IPv6 provides support for configuration capabilities such as neighbour discovery, address auto-configuration, router discovery, and renumbering. These configuration capabilities are better than the auto -configuration capabilities which are typically found in IPv4.
Although there are many operational advantages of auto configuration and control capabilities, IPv6 fundamentally relies on the operations which create new threats and vulnerabilities which are associated with misuse. Most IPv6 auto-configuration mechanisms make significant use of multicast, unicast and scoped addressing capabilities.
Finally as IPv6 has become more prevalent, the experience gained from running IPv4 networks and comparing it with Ipv6 for 20 years will help identify and address many security issues.