Risk in digital currency - data security, Other Subject

Data security

Digital Gold Systems are totally reliant on electronic storage and spread of account possession information. Consequently the security of a given digital currency explanation is reliant upon the security of the Issuer as well as the safety of the Account Holder's computer.

Whereas the Digital Gold Issuers utilize data security experts to look after their systems, the standard account holder's computer is inadequately confined against malware (Trojans, worms, and viruses) that can be used to interrupt information that could be used to right to use the user's DGC account. So the most widespread attacks on digital currency systems are going to against account holder's computer throughout the use of malicious spam, phishing and other techniques.

places the entire liability on the shoulders of the user, and uses a user-name and password verification system that is weak and extremely susceptible to interception by malware. (Although it is the most ordinary authentication technique used by online banks.) The "not our problem" approach to user security has depressingly contributed to e-gold's public picture, as not a few e-gold accounts have been hacked and swept clean by attackers.

E-Bullion presents account holders a "Crypto card" security voucher that changes the passphrase with every logon, but accuse the account holder USD $99.50 for the voucher. E-bullion does not need customers to use the Crypto card, so account holders who want not to get one may experience from the similar security matter as e-gold customers. Gold Money permits the user to login with user-name and passphrase, but sends an email with a exclusive personal identification number (PIN) that the user must enter in the type to entire the transaction. This diminish the likelihood of a successful attack because the attacker have to gain control of the user's email account in adding up to his login information, and must additional prevent the user from in receipt of the email with the PIN, which would aware the user that somebody is affronting to transfer gold out of his holding.

Pecunix work out a unique rotating key system that offer a lot of the benefits of a security voucher without requiring the user to purchase one. Pecunix also supports the use of PGP signatures to access an account, which is probably the strongest of all verification techniques.

Posted Date: 10/13/2012 3:18:36 AM | Location : United States







Related Discussions:- Risk in digital currency - data security, Assignment Help, Ask Question on Risk in digital currency - data security, Get Answer, Expert's Help, Risk in digital currency - data security Discussions

Write discussion on Risk in digital currency - data security
Your posts are moderated
Related Questions
There are three key flows in SCM, namely: The product flow, which consist the movement of goods from a provider to a customer, as well as any customer returns or service de

Question 1 How can one write scripts for commercials? Explain in detail                   Introduction                   Easily readable scripts                   Properly timed

The constitutional rights guaranteed in the Bill of Rights are most highly protected during the trial stage of a criminal proceeding. This is when the adversarial process, which ch

Weber could see the advantages of industrial capitalism, and he was optimistic about the future. but he thought it would never actually develop. but he thought workers wou

Problem Styrene can be produced by the reactions: Ethylbenzene ! Styrene+H2 Ethylbenzene ! Benzene+Ethylene Ethylbenzene+H2 ! Toluene+CH4 The reactions take place at 600C and 1.7

Post Harvest Loss The loss of fruit post harvest was a pervasive issue throughout the globe. Estimates put postharvest losses at around 25% worldwide and up to 50% in developin


Gender: Sex has an effect on our health. Research shows that women have a long life span than men. This can be argued in that women are more conscious with their health and mo

Question 1: (a) Define Counselling and name its relationship with psychotherapy. (b) Explain the process of counseling and demostrate how the technics use by the counsellor

Problem 1: (a) Critically show the following concepts: drug addict, dependency and tolerance. Use relevant examples to support your answer. (b) Critically discuss the d