Throughout the internet community, there are many groups working on resolving a variety of security related issues online. The activities cover all aspects of internet security and networking in general from authentication, firewalls, one time passwords, public key infrastructure, transport layer security and much more.
Many of the most important security protocols, initiatives and specifications being developed can be researched at the following groups.
TCSEC (Trusted Computer System Evaluation Criteria)
These are requirements for secure products as defined by the US National Security Agency. These are important standards which many US and global companies use in establishing base lines for their computer and network infrastructure. You will often hear these standards referred to as the ‘Orange book’.
CAPI (Crypto API)
CAPI is an application programming interface developed by Microsoft which makes it much easier for developers to create applications which incorporate both encryption and digital signatures.
CDSA (Common Data Security Architecture)
CDSA is a security reference standard primarily designed to help develop applications which take advantage of other software security mechanisms. Although not initially widely used, CDSA has since been accepted by the Open Group for evaluation and technical companies usch as IBM, Netscape and Intel have aided in developing the standard further. It is important for a disparate communication medium such as the internet to have open and inter-operable standards for applications and software. The standard also includes an expansion platform for future developments and improvements in security elements and architecture.
GSS-API – (Generic Security Services API)
The GSS-API is a higher level interface that enables applications and software an interface into security technologies. For example it can act as a gateway into private and public key infrastructure and technologies.
This list is of course, a long way from being complete and because of the fast paced development of security technologies it’s very likely to change greatly. It should be remembered that although there is an obvious requirement for security at the server level, securing applications and software on the client is also important. Client side security is often more of a challenge due to different platforms and a lack of standards – configuration settings on every computer are likely to be different.
Many people now take security and privacy extremely seriously, especially now that so much of our lives involve online activities. Using encryption and some sort of IP cloaker like this to provide anonymity is extremely common. Most of these security services are provided by third parties through specialised software. Again incorporating these into some sort of common security standard is a sensible option yet somewhat difficult to achieve.
Further Reading: Netflix VPN Problem, Haber Press, 2015