Secure Your Internet Use
()
About this ebook
Jerome Svigals
Mr Svigals was a senior manager in IBM product development. He led the IBM team that developed the first international-standard magnetic-striped cards and tickets and architected their identification and authorization system design, now carried into smart devices. Since leaving IBM, he has contributed to five US patents. Patent 5,806,045 of 9/8/98 is considered the definitive patent for loyalty/incentive systems. More recently, he has obtained four US patents (8,453,223 dated 5/28/13; 8,806,603 dated 8/12/14; 8,997,188 dated 3/31/15; and 9,009,807 dated 4/14/15). These four are dedicated to the design of an Internet based secure transaction system.
Related to Secure Your Internet Use
Related ebooks
Electronic Business Cards Rating: 0 out of 5 stars0 ratingsInternet of Things Complete Self-Assessment Guide Rating: 1 out of 5 stars1/5Web Development Secrets: This Book Below Will Show You Exactly What What You Need To Do To Finally Be A Success With Your Website! Rating: 0 out of 5 stars0 ratingsMobile Device Management A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsSecrets of a Stingy Scoundrel: 100 Dirty Little Money-Grubbing Secrets Rating: 3 out of 5 stars3/57 Steps To Becoming More Resilient Rating: 0 out of 5 stars0 ratingsBack office Operations Third Edition Rating: 0 out of 5 stars0 ratingsThe Law of Universal Mendacity: And Don't Be Conned Rating: 0 out of 5 stars0 ratingsPhishing Detection A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsMobile Application Security Testing Third Edition Rating: 0 out of 5 stars0 ratingsWinning with Cash Rating: 0 out of 5 stars0 ratingsEffective Negotiation A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratingsIdeaclicks: All About Innovation . . . Rating: 0 out of 5 stars0 ratingsReal-World Solutions for Developing High-Quality PHP Frameworks and Applications Rating: 3 out of 5 stars3/5Dropshipping: Full Guide & How To Make A Business Step By Step Rating: 0 out of 5 stars0 ratingsFreight Broker Business Startup: Manual on how to expand operations, legal requirements, and pricing strategies Rating: 0 out of 5 stars0 ratingsHow to get free cryptocurrency Rating: 0 out of 5 stars0 ratingsSecurity and Privacy in the Internet of Things: & Dark-web Investigation Rating: 0 out of 5 stars0 ratingsCreating and Managing Virtual Machines and Networks Through Microsoft Azure Services for Remote Access Connection Rating: 0 out of 5 stars0 ratingsConfident Programmer Debugging Guide: Confident Programmer Rating: 0 out of 5 stars0 ratingsSecurity in the Digital World Rating: 0 out of 5 stars0 ratingsiOS SDK Complete Self-Assessment Guide Rating: 0 out of 5 stars0 ratingsCryptocurrency Trading Guide : Mastering the Cryptocurrency Market: Techniques and Tactics for Profitable Trading Rating: 0 out of 5 stars0 ratingsEmail 101 Rating: 0 out of 5 stars0 ratingsCentOS: The Commercial Grade Linux Desktop Rating: 0 out of 5 stars0 ratingsThe Compass Mind: A Short Guide to Think in All Directions Rating: 0 out of 5 stars0 ratingsThe Bitcoin Revolution - Why The Decentralization Of Currency Will Change The Way We Spend Rating: 0 out of 5 stars0 ratingsThe End of Spamming the Spammers (With Dieter P. Bieny) Rating: 0 out of 5 stars0 ratingsIan Talks Hacking A-Z Rating: 0 out of 5 stars0 ratingsHyperledger Fabric A Complete Guide - 2019 Edition Rating: 0 out of 5 stars0 ratings
Internet & Web For You
Podcasting For Dummies Rating: 4 out of 5 stars4/5No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State Rating: 4 out of 5 stars4/5Get Rich or Lie Trying: Ambition and Deceit in the New Influencer Economy Rating: 0 out of 5 stars0 ratingsCoding For Dummies Rating: 5 out of 5 stars5/5Coding All-in-One For Dummies Rating: 4 out of 5 stars4/5How to Be Invisible: Protect Your Home, Your Children, Your Assets, and Your Life Rating: 4 out of 5 stars4/5The Logo Brainstorm Book: A Comprehensive Guide for Exploring Design Directions Rating: 4 out of 5 stars4/5Grokking Algorithms: An illustrated guide for programmers and other curious people Rating: 4 out of 5 stars4/5How to Disappear and Live Off the Grid: A CIA Insider's Guide Rating: 0 out of 5 stars0 ratingsSocial Engineering: The Science of Human Hacking Rating: 3 out of 5 stars3/5The Internet Is Not What You Think It Is: A History, a Philosophy, a Warning Rating: 4 out of 5 stars4/5Six Figure Blogging Blueprint Rating: 5 out of 5 stars5/5How To Start A Podcast Rating: 4 out of 5 stars4/5More Porn - Faster!: 50 Tips & Tools for Faster and More Efficient Porn Browsing Rating: 3 out of 5 stars3/5The Beginner's Affiliate Marketing Blueprint Rating: 4 out of 5 stars4/5How To Make Money Blogging: How I Replaced My Day-Job With My Blog and How You Can Start A Blog Today Rating: 4 out of 5 stars4/5Remote/WebCam Notarization : Basic Understanding Rating: 3 out of 5 stars3/5Stop Asking Questions: How to Lead High-Impact Interviews and Learn Anything from Anyone Rating: 5 out of 5 stars5/5The Gothic Novel Collection Rating: 5 out of 5 stars5/5Everybody Lies: Big Data, New Data, and What the Internet Can Tell Us About Who We Really Are Rating: 4 out of 5 stars4/5The Hacker Crackdown: Law and Disorder on the Electronic Frontier Rating: 4 out of 5 stars4/5Cybersecurity For Dummies Rating: 4 out of 5 stars4/5How To Start A Profitable Authority Blog In Under One Hour Rating: 5 out of 5 stars5/5The $1,000,000 Web Designer Guide: A Practical Guide for Wealth and Freedom as an Online Freelancer Rating: 5 out of 5 stars5/5
Reviews for Secure Your Internet Use
0 ratings0 reviews
Book preview
Secure Your Internet Use - Jerome Svigals
Executive Summary
Purpose: Provide a summary of this Book.
This report is intended to help you understand the use of Smart Devices, e.g. Smartphones, on the Internet in preparing for Securing Your Internet Use
. It is intended to introduce you to the Internet and its role, in the Internet based transactions and Internet of Things
era.
The Internet
The Internet allows access from more points, more quickly and more easily than any other network in the history of networks. Thus, along with its new facilities comes new and serious security exposures. Since there is no central authority dealing with these security exposures, the users must insure that they are protecting Internet plans and banking activity programs. Their actions must protect your Internet plans and programs. There are security tools to protect your Internet actions. Your goal must be to use them effectively.
Card and Check Migration
Physical check entry to the bank disappeared with the advent of check image capture in ATM’s, cell phones and Smartphones. However, the real test is the process by which the individual originates a check-like
based payment. The payment needs to identify the payer and the payee. Where bills are being paid, the payee is identified by the demand for payment. The optical image feature of the Smartphone can be used to capture that data just as it is used to capture check images for processing.
The Plastic Card Equivalent Transaction
Use of the mobile banking device as a magnetic striped card equivalent signal source requires a wireless transmission from the mobile banking device to the signal accepting unit. A NFC, (Near Field Communications) signal is emitted by the mobile banking device. The mobile banking device displays multiple striped card equivalent type designations. A record is captured in the mobile banking unit for later reference, if needed. The acceptance device processes the card-like
transaction into the banking system. The variable amount of the transaction is added to the signal transmitted in the NFC signal to the accepting device. The complete transaction data is then processed by the banking system.
Smartphone and Cloud Computing
Smartphone based Cloud computing is the delivery of common Smartphone based bank transaction business computer applications from a remote facility, online, through the Internet. These Smartphone based applications are accessed with a Web Browser. It uses software and data stored on servers (computer subsystems). The bank Cloud user rents a portion of the Cloud infrastructure from a third party. These Smartphone based Cloud processes reduce cost to the bank by sharing the Cloud computer power and resources. The bank does not have to provide added capacities for peak loads. The user must be concerned about the security of Cloud stored information and its protection.
Bank Organization of 2020
The primary, government-licensed, bank functional units (teller, loan and payments) will be the same in 2020. The primary changes of 2020 will be in the implementation of each transaction. The former implementation with paper based, manual processing and local handling will be replaced. They will be replaced by Smartphone based electronic paper
, transaction processing and remote Internet based processing. This will be achieved by the use of mobile transaction devices, use of the world wide Internet, and electronic logic implementation smart devices.
Internet Bank Accounts and Transactions
The all electronic bank of year 2020 will use the Internet to provide bank account records, access and all branch
type functions and transactions for customers using the Internet. Smartphone based access to the 2020 bank, with all electronic accounts, will start with the URL (Internet address) of the Web page assigned to each customer’s account. An explicit URL will be a unique Web page address for each customer’s bank account. The customer’s Web page, in turn, will provide direct access to all bank relations for that customer.
What is a Smartphone?
The simple, hand held, portable telephone has evolved into a hand held computer, Internet based, and providing phone functions. It is the result of decades of electronic component functional growth and physical size reduction. The simple, hand-held, portable telephone has evolved to a compact, fist-sized, computer capable of 95% of the function of your desk top computer. Its portability reaches any place you can contact cellular phone electromagnetic signals. Its computational ability exercises any programmable computer application within the capability of its operational program system. In other words, the room full of computers in past decades now operate efficiently in your palm as a Smartphone. Furthermore, it has a full display, a keyboard, an operating system and communications