| |
Information Security
Articles/Notes |
Links |
- Access Control:
- There are three basic process in an information security
infrastructure, authentication, access control, and audit. Once
an entity is authenticated, the access control process will
restrict the activities of the entity at the appropriate level. Full
Article
|
- Security issues in eCommerce:
- Electronic commerce utilizes different technologies and forms
such as electronic banking and trading, electronic funds
transfer (EFT), electronic data interchange (EDI), electronic
mail (e-mail), electronic catalogs, electronic conferences and
all forms of communications to transmit data (James, 1999).
Security is a major concern in e-commerce. Full
article
|
- Information security threats:
- The purpose of information security is to protect information
systems, assets and environments from security threats. The
business impact of these security threats would be the loss or
potential loss of confidentiality of data, integrity of data and
the availability of process (denial of service). Full
article
|
|
|
|
|
|
|
|
|
|
|