Open figure viewer
Suggests that there are four principal security functions for commercial transactions: confidentiality; integrity; authentication; and non‐repudiation. States the conduction of business has been changed by the Internet. Discusses the need for electronic business security technology, physical as well as electronic. Highlights various forms of security as: different links; encryption; digital signatures; public key infrastructure; smart cards and smart buttons; and identification. Sums up that no data security system is impenetrable and the main vulnerabilities are: secret key compromise; public key tampering; viruses; direct cryptanalysis; or old‐fashioned physical security breaches.
This content is only available via PDF.
© MCB UP Limited
2000
You do not currently have access to this content.
