Secure Your Internet Use
()
About this ebook
Jerome Svigals
Mr Svigals was a senior manager in IBM product development. He led the IBM team that developed the first international-standard magnetic-striped cards and tickets and architected their identification and authorization system design, now carried into smart devices. Since leaving IBM, he has contributed to five US patents. Patent 5,806,045 of 9/8/98 is considered the definitive patent for loyalty/incentive systems. More recently, he has obtained four US patents (8,453,223 dated 5/28/13; 8,806,603 dated 8/12/14; 8,997,188 dated 3/31/15; and 9,009,807 dated 4/14/15). These four are dedicated to the design of an Internet based secure transaction system.
Related to Secure Your Internet Use
Related ebooks
Blind Spot: Smartphone and Computer Personal Security Guide Rating: 3 out of 5 stars3/5Mobile Security Fundamentals: A Guide for CompTIA Security+ 601 Exam Rating: 0 out of 5 stars0 ratingsMobile Access Safety: Beyond BYOD Rating: 0 out of 5 stars0 ratingsInternet Basics: Everything You Need to Know Rating: 0 out of 5 stars0 ratingsCybersafe for Business: The Anti-Hack Handbook for SMEs Rating: 0 out of 5 stars0 ratingsShadows of the Abyss: Unveiling the Dark Web: The IT Collection Rating: 5 out of 5 stars5/5Ethical Hacking A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsWireless Security Masterclass: Penetration Testing For Network Defenders And Ethical Hackers Rating: 0 out of 5 stars0 ratingsEthical Hacking: A Comprehensive Beginner's Guide to Learn and Understand the Concept of Ethical Hacking Rating: 0 out of 5 stars0 ratingsConfident Programmer Debugging Guide: Confident Programmer Rating: 0 out of 5 stars0 ratingsThe Ultimate Kali Linux Book: Harness Nmap, Metaspolit, Aircrack-ng, and Empire for cutting-edge pentesting Rating: 0 out of 5 stars0 ratingsBug Bounty from Scratch: A comprehensive guide to discovering vulnerabilities and succeeding in cybersecurity Rating: 0 out of 5 stars0 ratingsAmazon Echo: How to Get the Most Out of Your Amazon Echo: User Guide, Tips, Tricks & Commands (Revised, Expanded & Updated for 2016) Rating: 0 out of 5 stars0 ratingsGray Hat: Vulnerability Scanning & Penetration Testing Rating: 0 out of 5 stars0 ratingsHACKING WITH KALI LINUX: A Practical Guide to Ethical Hacking and Penetration Testing (2024 Novice Crash Course) Rating: 0 out of 5 stars0 ratingsReconnaissance 101: Ethical Hackers Bible To Collect Data About Target Systems Rating: 0 out of 5 stars0 ratingsDeveloping Software Installers Rating: 0 out of 5 stars0 ratingsCyber Auditing Unleashed: Advanced Security Strategies For Ethical Hackers Rating: 0 out of 5 stars0 ratingsNetwork Engineer's Bible: Mastering 100 Protocols For Communication, Management, And Security Rating: 0 out of 5 stars0 ratingsTrojan Exposed: Cyber Defense And Security Protocols For Malware Eradication Rating: 0 out of 5 stars0 ratingsSecure Mobile Payment Service A Complete Guide - 2020 Edition Rating: 0 out of 5 stars0 ratingsSecurity and Privacy in the Internet of Things: & Dark-web Investigation Rating: 0 out of 5 stars0 ratingsInternet of Things Complete Self-Assessment Guide Rating: 1 out of 5 stars1/5Compsec: For the Home User Rating: 0 out of 5 stars0 ratingsHow To Do Virtualization: Your Step-By-Step Guide To Virtualization Rating: 0 out of 5 stars0 ratingsUltimate Penetration Testing with Nmap Rating: 0 out of 5 stars0 ratingshacktivist: Hacker School Attacked Rating: 0 out of 5 stars0 ratingsThe Core of Hacking Rating: 0 out of 5 stars0 ratings
Internet & Web For You
The Gothic Novel Collection Rating: 5 out of 5 stars5/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5Social Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5The Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5How to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsCoding For Dummies Rating: 5 out of 5 stars5/5No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5Tor and the Dark Art of Anonymity Rating: 5 out of 5 stars5/5An Ultimate Guide to Kali Linux for Beginners Rating: 3 out of 5 stars3/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5The $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 4 out of 5 stars4/5Six Figure Blogging Blueprint Rating: 5 out of 5 stars5/5Wireless Hacking 101 Rating: 5 out of 5 stars5/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5Python: Learn Python in 24 Hours Rating: 4 out of 5 stars4/5Cybersecurity All-in-One For Dummies Rating: 0 out of 5 stars0 ratingsThe Cyber Attack Survival Manual: Tools for Surviving Everything from Identity Theft to the Digital Apocalypse Rating: 0 out of 5 stars0 ratingsSurveillance and Surveillance Detection: A CIA Insider's Guide Rating: 3 out of 5 stars3/5Ultimate guide for being anonymous: Avoiding prison time for fun and profit Rating: 5 out of 5 stars5/5The Digital Marketing Handbook: A Step-By-Step Guide to Creating Websites That Sell Rating: 5 out of 5 stars5/5How To Start A Profitable Authority Blog In Under One Hour Rating: 5 out of 5 stars5/5Beginner's Guide To Starting An Etsy Print-On-Demand Shop Rating: 0 out of 5 stars0 ratingsCybersecurity For Dummies Rating: 5 out of 5 stars5/5Podcasting For Dummies Rating: 4 out of 5 stars4/5
Reviews for Secure Your Internet Use
0 ratings0 reviews
Book preview
Secure Your Internet Use - Jerome Svigals
Executive Summary
Purpose: Provide a summary of this Book.
This report is intended to help you understand the use of Smart Devices, e.g. Smartphones, on the Internet in preparing for Securing Your Internet Use
. It is intended to introduce you to the Internet and its role, in the Internet based transactions and Internet of Things
era.
The Internet
The Internet allows access from more points, more quickly and more easily than any other network in the history of networks. Thus, along with its new facilities comes new and serious security exposures. Since there is no central authority dealing with these security exposures, the users must insure that they are protecting Internet plans and banking activity programs. Their actions must protect your Internet plans and programs. There are security tools to protect your Internet actions. Your goal must be to use them effectively.
Card and Check Migration
Physical check entry to the bank disappeared with the advent of check image capture in ATM’s, cell phones and Smartphones. However, the real test is the process by which the individual originates a check-like
based payment. The payment needs to identify the payer and the payee. Where bills are being paid, the payee is identified by the demand for payment. The optical image feature of the Smartphone can be used to capture that data just as it is used to capture check images for processing.
The Plastic Card Equivalent Transaction
Use of the mobile banking device as a magnetic striped card equivalent signal source requires a wireless transmission from the mobile banking device to the signal accepting unit. A NFC, (Near Field Communications) signal is emitted by the mobile banking device. The mobile banking device displays multiple striped card equivalent type designations. A record is captured in the mobile banking unit for later reference, if needed. The acceptance device processes the card-like
transaction into the banking system. The variable amount of the transaction is added to the signal transmitted in the NFC signal to the accepting device. The complete transaction data is then processed by the banking system.
Smartphone and Cloud Computing
Smartphone based Cloud computing is the delivery of common Smartphone based bank transaction business computer applications from a remote facility, online, through the Internet. These Smartphone based applications are accessed with a Web Browser. It uses software and data stored on servers (computer subsystems). The bank Cloud user rents a portion of the Cloud infrastructure from a third party. These Smartphone based Cloud processes reduce cost to the bank by sharing the Cloud computer power and resources. The bank does not have to provide added capacities for peak loads. The user must be concerned about the security of Cloud stored information and its protection.
Bank Organization of 2020
The primary, government-licensed, bank functional units (teller, loan and payments) will be the same in 2020. The primary changes of 2020 will be in the implementation of each transaction. The former implementation with paper based, manual processing and local handling will be replaced. They will be replaced by Smartphone based electronic paper
, transaction processing and remote Internet based processing. This will be achieved by the use of mobile transaction devices, use of the world wide Internet, and electronic logic implementation smart devices.
Internet Bank Accounts and Transactions
The all electronic bank of year 2020 will use the Internet to provide bank account records, access and all branch
type functions and transactions for customers using the Internet. Smartphone based access to the 2020 bank, with all electronic accounts, will start with the URL (Internet address) of the Web page assigned to each customer’s account. An explicit URL will be a unique Web page address for each customer’s bank account. The customer’s Web page, in turn, will provide direct access to all bank relations for that customer.
What is a Smartphone?
The simple, hand held, portable telephone has evolved into a hand held computer, Internet based, and providing phone functions. It is the result of decades of electronic component functional growth and physical size reduction. The simple, hand-held, portable telephone has evolved to a compact, fist-sized, computer capable of 95% of the function of your desk top computer. Its portability reaches any place you can contact cellular phone electromagnetic signals. Its computational ability exercises any programmable computer application within the capability of its operational program system. In other words, the room full of computers in past decades now operate efficiently in your palm as a Smartphone. Furthermore, it has a full display, a keyboard, an operating system and communications