Access Control: There are three basic process
in an information security infrastructure, authentication, access
control, and audit. Once an entity is authenticated, the access
control process will restrict the activities of the entity at the
appropriate level. Full
Article |
Security issues in eCommerce: Electronic
commerce utilizes different technologies and forms such as
electronic banking and trading, electronic funds transfer (EFT),
electronic data interchange (EDI), electronic mail (e-mail),
electronic catalogs, electronic conferences and all forms of
communications to transmit data (James, 1999). Security is a major
concern in e-commerce. Full
article |
Information security threats: The purpose of
information security is to protect information systems, assets and
environments from security threats. The business impact of these
security threats would be the loss or potential loss of
confidentiality of data, integrity of data and the availability of
process (denial of service). Full
article |
|
|
|
|
|
|
|
|
|