This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Onion Routing

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Onion Routing

Several internet users have employed the use of onion routing in protecting their data against eavesdropping and trafficking. Onion routing offers this security through the use of firewall configuration. The configuration is an onion router placed on the sensitive side of the firewall (Reed et al., 1998). It acts as the interface between the external system and the machines behind the firewall. These connections are restricted against traffic analysis or eavesdropping since the stream of data does not appear in the public network. Besides, users can apply firewall configuration to direct other onion routers to complicate tracking of data within the sensitive site (Reed et al., 1998). Moreover, the onion router at the initially safeguarded site is sensible of both the destination and source of a connection, therefore, securing connection anonymity from external observers.

Also,

the configuration establishes anonymous links between two critical sites, thus enabling

the system to conceal communication from outsiders. Other techniques, such as

the customer-ISP and remote proxy settings, also assist in managing

traffic analysis and eavesdropping in case of loopholes during interaction

(Reed et al., 1998). The resistance technique of the onion routing to both

eavesdropping and traffic analysis follows a biblical perspective on security

and identity. Psalms 61:3 states that “For you has been my safe place, a

powerful tower against the enemy” (Anderson, 2020). According to this verse,

King David is convinced that God is his refuge against his foes and therefore

feels secure in whatever he undertakes. Correspondingly, the firewall configuration

acts as a refuge for its users against computer enemies who would steal their

information or track the flow of their data. Therefore, with onion routing,

clients communicate confidently over a public network.

 

 

 

 

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask