Suggests that there are four principal security functions for commercial transactions: confidentiality; integrity; authentication; and non-repudiation. States the conduction of business has been changed by the Internet. Discusses the need for electronic business security technology, physical as well as electronic. Highlights various forms of security as: different links; encryption; digital signatures; public key infrastructure; smart cards and smart buttons; and identification. Sums up that no data security system is impenetrable and the main vulnerabilities are: secret key compromise; public key tampering; viruses; direct cryptanalysis; or old-fashioned physical security breaches.
The Antidote – Emerald Publishing
Published: Feb 1, 2000
Keywords: Security; Security products; Commercial property