Step 1: Control user access
The first key element to security is to identify who is using a system and why. Exposure to risk is minimized by providing access to only those systems as necessary. Firewalls perform a variety of functions to segment internal systems from the outside world. They may be used to validate users and provide access control. The users may remain anonymous but then are only allowed to access information permitted for anonymous access at the firewall.
Step 2: Encrypt/decrypt data
Advanced encryption algorithms are used to cipher data and keep it secure during transport over public networks. Virtual Private Networks (VPNs) use encryption to create a secure link between two or more systems on the Internet. People are working very hard to break the encryption algorithms. It takes less than four hours to break 40-bit encryption. The current domestic encryption standard is 128 bits and is exponentially more secure. With exponential power, the difference between 128 bit and 40 bit equates to a cipher that is unbreakable in 10,000 years given today's computing power. VPN and encryption tunnels may be established quickly and inexpensively anywhere in the world. These are effective for communicating with...