Thursday 1 August 2019

Evolution of Internet and Web Authorization 

In this era technology and modernization, Internet had provided us a facility of searching information from the corner around the world.To lay bare, Internet is an invention of modern and high technology science. By using internet, we can connect to each other easily although we does not meet each other mano a mano. So now, it is time for me to share the information about the evolution of Internet.

From the beginning, The origins of the Internet date back nearly 40 years, with the U.S. military's funding of a research network dubbed Arpanet in 1969. Since then, the Internet has undergone more than just a name change. In today’s life, the number of computers connected to the Internet has grown exponentially, while the number of  Internet users has risen to 1.5 billion consumers, whereby the network's reach had expanded beyond the United States to every corner of the globes, but since its popularity has a dark side, it evolved from a friendly research network to a hotbed of criminal activity including fraud and identity theft.

Actually, the world's largest network of computer networks got its original name from the U.S. military arm that funded it: Arpanet was for the Advanced Research Projects Agency.  In 1983, the U.S. Defense Department spun-off MILNET*, which was the part of Arpanet that carried unclassified military communications. Arpanet, it was renamed the Internet in 1984, which linked 1,000 hosts at university and corporate labs. According to the Internet's geographic research, when in the year of 1990, Tim Berners-Lee invented the World Wide Web as a method of publishing information in a hypertext format on the Internet. Until today, it is the grateful thing that we can still use the web side with World Wide Web, thanks for him!


Nowadays, the direct link for the people is more than 440 million, and there are even more Internet access that can go through with the private addressing schemes. According to the research again, the Internet usage had strongly exploded since the year of 1995. Although the estimation of people vary from the Internet, and yet there is a statement agreed that “Net has the room for growth as the worldwide population had become the tops 6 billions.

Back in 1988, the Morris Worm, was the first major attack on the Internet , disabling 10% of the Internet's 60,000 host computers. Today, hundreds of more sinister attacks are aimed at Internet users each day. Indeed, the U.S. Computer Emergency Readiness Team (US-CERT) stopped counting the number of security incident reports it received in 2004 because attacks against Internet-connected systems had become so commonplace that it felt this figure was getting too big to track.
There is a question, what is the difference is that the Internet will become increasingly mobile and social.? By 2012, there were more people will access the Internet via cell phones than PCs. Their favorite activities will be downloading music, videos and ringtones rather than searching the Web or sending e-mail.

Next, in my opinion, the web authorization in most standard implementations that included those featured by ASP.NET, the authorization phase kicks in right after the authentication, it’s mostly based on permissions or roles: any authenticated user might have their own set of permissions and/or belong to one or more roles, and thus be granted access to a specific set of resources. These role-based checks are usually set by the developer in a declarative fashion within the application source code or the configuration files.

We should never be confused with Authorization and Authentication , as it is a very different process and  in charge of a very different task to give a quick definition, we could say that the purpose of authorization is to confirm that the requesting user is allowed to have access to the action they want to perform. In other words, while authentication is about who he is, authorization is about what he’s allowed to do.

Taking all the pros and cons into the account, we could say that relying on third-party providers might be a great time-saving choice for small-scale apps. However, building our own account management system seems to be the only way to overcome the aforementioned governance and control-based flaws undeniably brought by that approach. As always, it’s mostly a matter of what we actually need or what we actually want to achieve our product owners.

No comments:

Post a Comment