Technologies and security management features
A. Safeguarding records and files B. Back up files 1. Son-father-grandfather concept 2. Back up of systems that can be shut down 3. Backups of systems that do not shut down 4. Mirroring C. Uninterrupted power supply D. Program modification controls E. Data encryption 1. Digital certificates 2. Digital signatures vs E-signatures F. Managing passwords 1. Password length 2. Password complexity 3. Password age 4. Password reuse G. User access 1. Initial passwords and authorization for system access 2. Changes in position
A. Safeguarding records and files
- data can be protected by the use of internal and external labels and file protection rings
B. Back up files
Back up files
C. Uninterrupted power supply
a device that maintains a continuous supply of electrical power to connected equipment. Called battery back up.
D. Program modification controls
Program modification controls are controls over the modification of programs being used in production applications. They include controls designed to prevent changes by unauthorized personnel and also controls that track program changes
E. Data encryption
E. Data encryption - an essential foundation for electronic commerce. Encryption involves using a password or a digital key to scramble a readable message into an unreadable message. Then intended recipient of the message then uses the same or another digital key to decrypt or decipher the ciphertext message back into plaintext.
F. Managing passwords
F. Managing passwords - every account needs one
G. User access
G. User access
Brute force attack
the attacker simply tries every possible key until the right one is found
A. Security Policy defined
A. Security Policy defined - a document that states how an org plans to protect the org’s info.
B. Security Policy goal
B. Security Policy goal - requires people to protect info, which protects the org, its people, and customers.
C. States and Locations of information covered by security policies:
Types of policies
Development and management of security policies
Policy support documents
Decryption or decipherment
the intended recipient converts the cipher text into plain text
Digital signature
is a means of ensuring that a message is not altered in transmission. It is a form of data encryption
Electronic Commerce (E-Commerce)
Electronic Business (E-business)
Electronic Data Interchange (EDI)
the computer to computer exchange of business transaction documents
EDI -Reduced handling costs and increased processing speed
reduces transaction handling costs and speeds transaction processing
EDI- Standard data format
Standard data format
a. Mapping - process of determining the correspondence between data elements in an organization’s terminology and data elements in standard EDU terminology.
b. Standards - several different standards
- XML - extensible markup language - technology that has been developed to transmit data in flexible formats instead of the standard formats of EDI.
EDI - Communication
EDI can be implemented using direct links between the organizations exchanging information via communication intermediaries, VANs or networks of VANs, or over the Internet.
Features of EDI