Risk in digital currency - data security, Other Subject

Assignment Help:

Data security

Digital Gold Systems are totally reliant on electronic storage and spread of account possession information. Consequently the security of a given digital currency explanation is reliant upon the security of the Issuer as well as the safety of the Account Holder's computer.

Whereas the Digital Gold Issuers utilize data security experts to look after their systems, the standard account holder's computer is inadequately confined against malware (Trojans, worms, and viruses) that can be used to interrupt information that could be used to right to use the user's DGC account. So the most widespread attacks on digital currency systems are going to against account holder's computer throughout the use of malicious spam, phishing and other techniques.

places the entire liability on the shoulders of the user, and uses a user-name and password verification system that is weak and extremely susceptible to interception by malware. (Although it is the most ordinary authentication technique used by online banks.) The "not our problem" approach to user security has depressingly contributed to e-gold's public picture, as not a few e-gold accounts have been hacked and swept clean by attackers.

E-Bullion presents account holders a "Crypto card" security voucher that changes the passphrase with every logon, but accuse the account holder USD $99.50 for the voucher. E-bullion does not need customers to use the Crypto card, so account holders who want not to get one may experience from the similar security matter as e-gold customers. Gold Money permits the user to login with user-name and passphrase, but sends an email with a exclusive personal identification number (PIN) that the user must enter in the type to entire the transaction. This diminish the likelihood of a successful attack because the attacker have to gain control of the user's email account in adding up to his login information, and must additional prevent the user from in receipt of the email with the PIN, which would aware the user that somebody is affronting to transfer gold out of his holding.

Pecunix work out a unique rotating key system that offer a lot of the benefits of a security voucher without requiring the user to purchase one. Pecunix also supports the use of PGP signatures to access an account, which is probably the strongest of all verification techniques.


Related Discussions:- Risk in digital currency - data security

U.s. government, Most U.S. supreme court cases involve issues which affect ...

Most U.S. supreme court cases involve issues which affect a lot of people true or false

Constitutional Rights, The constitutional rights guaranteed in the Bill of ...

The constitutional rights guaranteed in the Bill of Rights are most highly protected during the trial stage of a criminal proceeding. This is when the adversarial process, which ch

What are the essential elements of socialisation, Question 1: (a) Is it...

Question 1: (a) Is it true that Conjugal roles in the family are now increasingly integrated? (b) Analyse the functionalists' argument that it is biological differences that

Environmental management, Instructions You have been appointed as the envir...

Instructions You have been appointed as the environmental manager of Snackfoods Ltd. Read the description of the company’s activities and answer the questions below. Snackfoods Cas

Leadership, Ask questioThe initial investment in the project is estimated t...

Ask questioThe initial investment in the project is estimated to be $210,000 in year 0 of the project. Terra Nova Inc. requires a discount rate of 11%. It is anticipated project fu

Education and society, as a teacher how to overcome the factors of wastage...

as a teacher how to overcome the factors of wastage and stagnation

Research on the dangers of virtual reality games software, formations and s...

formations and social relationships. Immoral acts can easily be performed in Virtual Reality (for example, video games that incorporate gender bias, domestic violence and sexual ac

Applications of data encryption standard, Applications- Data encryptio...

Applications- Data encryption (cryptography) is utilized in a variety of environments and applications. The exact utilization of encryption and the implementation of the DES w

Discuss the relevance of counseling in society, Question 1: Discuss the...

Question 1: Discuss the similarities and differences involved in counseling and psychotherapy practice. Question 2: Discuss counseling practices in relation to Structur

Briefly explain what is e-trading, Question: a) In the context of e-b...

Question: a) In the context of e-banking or e-commerce, outline some of the risks associated with informational websites and transactional websites. b) In addition to tr

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd