Evolution of Internet and Web Authorization
In this era technology and
modernization, Internet had provided us a facility of searching information
from the corner around the world.To lay bare, Internet is an invention of
modern and high technology science. By using internet, we can connect to each other
easily although we does not meet each other mano a mano. So now, it is time for
me to share the information about the evolution of Internet.
From the beginning, The origins of the
Internet date back nearly 40 years, with the U.S. military's funding of a
research network dubbed Arpanet in 1969. Since then, the Internet has undergone
more than just a name change. In today’s life, the number of computers
connected to the Internet has grown exponentially, while the number of Internet users has risen to 1.5 billion
consumers, whereby the network's reach had expanded beyond the United States to
every corner of the globes, but since its popularity has a dark side, it
evolved from a friendly research network to a hotbed of criminal activity
including fraud and identity theft.
Actually, the world's largest network of computer networks
got its original name from the U.S. military arm that funded it: Arpanet was
for the Advanced Research Projects Agency. In 1983, the U.S.
Defense Department spun-off MILNET*, which was the part of Arpanet that carried
unclassified military communications. Arpanet, it was renamed the Internet in
1984, which linked 1,000 hosts at university and corporate labs. According to the
Internet's geographic research, when in the year of 1990, Tim Berners-Lee
invented the World Wide Web as a method of publishing information in a
hypertext format on the Internet. Until today, it is the grateful thing that we
can still use the web side with World Wide Web, thanks for him!
Nowadays, the direct link for the people is more than 440
million, and there are even more Internet access that can go through with the
private addressing schemes. According to the research again, the Internet usage
had strongly exploded since the year of 1995. Although the estimation of people
vary from the Internet, and yet there is a statement agreed that “Net has the
room for growth as the worldwide population had become the tops 6 billions.
Back in 1988, the Morris Worm, was the first major attack on
the Internet , disabling 10% of the Internet's 60,000 host computers.
Today, hundreds of more sinister attacks are aimed at Internet users each day.
Indeed, the U.S. Computer Emergency Readiness Team (US-CERT) stopped counting
the number of security incident reports it received in 2004 because attacks
against Internet-connected systems had become so commonplace that it felt this
figure was getting too big to track.
There is a question, what is the difference is that the
Internet will become increasingly mobile and social.? By 2012, there were more
people will access the Internet via cell phones than PCs. Their favorite
activities will be downloading music, videos and ringtones rather than
searching the Web or sending e-mail.
Next, in my opinion, the web authorization in most standard
implementations that included those featured by ASP.NET, the authorization
phase kicks in right after the authentication, it’s mostly based on permissions
or roles: any authenticated user might have their own set of permissions and/or
belong to one or more roles, and thus be granted access to a specific set of
resources. These role-based checks are usually set by the developer in a
declarative fashion within the application source code or the configuration
files.
We should never be confused with Authorization and
Authentication , as it is a very different process and in charge of a very different task to give a
quick definition, we could say that the purpose of authorization is to confirm
that the requesting user is allowed to have access to the action they want to
perform. In other words, while authentication is about who he is, authorization
is about what he’s allowed to do.
Taking all the pros and cons into the account, we could say
that relying on third-party providers might be a great time-saving choice for
small-scale apps. However, building our own account management system seems to
be the only way to overcome the aforementioned governance and control-based
flaws undeniably brought by that approach. As always, it’s mostly a matter of
what we actually need or what we actually want to achieve our product owners.
No comments:
Post a Comment