As we know that the current technology is growing rapidly along with human activities are getting higher. Hence man and technology are two inseparable things. Humans need technology to support their daily activities. It is unfortunate that today many people are not responsible for spreading the virus through various systems that can damage the network technology itself. You do not have to worry, because even now some viruses can be hacked if you have bitcoins. You can easily get bitcoin hardware wallets at btcwallets. But there are also some ways to cope with cyber crime that is currently rampant in the community. Here’s the review!
Computer networks connected to the Internet need to be equipped with Internet Firewall. Internet Firewall serves to prevent access from external parties to the internal system. Thus the data residing in the computer network cannot be accessed by outsiders who are not responsible. Firewall works in 2 ways: using filters and proxies. Firewall filters filter communications to occur as needed only, only certain applications that can pass and only computers with a certain identity that can be connected. Proxy firewall means allowing users from within to access the internet as widely as possible, but from the outside can only access one particular computer only.
Cryptography is the art of encoding data. The data to be sent is encoded before it is sent over the internet. On the destination computer, the data is returned to its original form so that it can be read and understood by the recipient. The encoded data is intended to have the parties intercepting the data transmission. The party cannot understand the contents of the data sent because it is still a password. Thus data security can be maintained. There are two processes that occur in cryptography, namely the process of encryption and decryption. The encryption process is the process of converting the original data into password data, while the decryption process is the process of restoring the password data to the original data. The real data or data to be encoded is called plain text, while the resulted data is called cipher text. The encryption process occurs on the sending computer before the data is sent, while the decryption process occurs on the receiving computer shortly after the data is received so that the recipient can understand the data sent.
Secure Socket Layer (SSL)
The data transmission path through the internet through many transitions and controlled by many people. This causes the transmission of data over the Internet prone by tapping. Therefore, the browser is equipped with Secure Socket Layer that serves to encode the data. In this way, the computers that are between the sending and receiving computers can no longer read the contents of the data.