This website uses cookies to ensure you have the best experience. Learn more

Security And Ict Essay

954 words - 4 pages

1. Today, it’s expected that organizations accept electronic payments, variant e-payment systems are credit card, debit card, digital money, micro-payment, etc.. It’s more than expected that those payments are secure. The highest priority of an organization is to ensure privacy, authentication, integrity, and non-repudiation for electronic payment users. Electronic payments are going through a network, so it runs risk. The secure electronic payment may choose one of the following payment channels; TCP/IP channel over the Internet; A WAP channel over cellular network; etc.. There is a special security problem with gateways in the situation of electronic payment over the internet or cellular ...view middle of the document...

Once a person has been authenticated, the authorization process begins. Authorization is usually determined by comparing information about the person with access control information. It is necessary to know that the user is authorized to do something. c) Integrity is the ability to prevent data from being altered, destroyed or intercepted in an unauthorized or accidental manner. The risk of intercepting data of e-payments have to be reduced. The both end of a transaction must be assured that the data connected with it can not be altered without detection. Lack of integrity can cause problems for example, if a customer places an order, and someone can access the system as the customer, they may be able to alter the contents of the order placed. Digital Signatures and hash algorithms are mechanisms used to provide data integrity. d) Non-Repudiation is the ability to ensure that neither side in a transaction can later claim that they for instance didn’t order something using a credit card or didn’t accept an order or offer for something. If there is no security services for non-repudiation either side can back out of a transaction by claiming it never took place. If this happens infrequently, it may not significantly harm, however, on a large scale this can be devastating.
2. TLS is a connection-oriented protocol that provides a secure channel between a client and a server. TLS supports confidentiality, data integrity, and client/server authentication. In the following example scenarios TLS is required in an electronic payments system. For example e-shop simply doesn’t use TLS for all pages that require authentication. An outsider simply monitors through open wireless, and observes an authenticated victim’s session cookie. The outsider can alter this cookie and takes over the user’s session. Another example where TLS is required is for example is by purchasing a book and put them in the shopping cart. Finally to invoke...

Other Papers Like Security and Ict

Ict in Malaysia Essay

2351 words - 10 pages ICT IN MALAYSIA: POLICY, REGULATION & INDUSTRY PROGRESS (1996-2000) AND PROSPECTS (2001-2005) Presented by Gazali Abas at ITU-Waseda University Workshop for Regulators and Policy-Makers “New Trends in ICT” 13th-24th November, 2001 Waseda University Tokyo, JAPAN CONTENTS 1. 2. 3. 4. 5. INTRODUCTION PROGRESS (1996-2000) PROSPECTS (2001-2005) ALLOCATION CONCLUSION 14 Nov.2001.Gazali A. 2 1. INTRODUCTION THE BIG PICTURE - Human

The Effect of ICT on Social Lives

1119 words - 5 pages The Effect of ICT on Social Lives These affects can be seen in areas such as: · Customers buying from home · Call centres and customer enquiries

Impact of Ict to Aviation Company

4680 words - 19 pages to facilitate the process of international travel for next-generation air transportation. Information and communication technologies (ICTs) have an especially significant role to play here, for it is only with the strategic, widespread, intensive, and innovative use of ICT in future airport development polices and programs that the ambitious agenda of passenger convenience and airport security becomes much more possible to achieve. But this

Most Significant Factor Driving the Security Screening Market

661 words - 3 pages information and communication technology (ICT) sector. Technological advancements in sensor technology have led to the emergence of non-immersive and contactless detection devices. Such devices have enabled regulatory authorities to enforce robust security solutions while limiting the inconvenience and intrusion of privacy of people. Modern security screening equipment are capable of screening the bones and other internal body parts for unethical and

Cyber Law of Bd

708 words - 3 pages first step of entering into the e-commerce. Not only these weaknesses of the Act but also others problems can to be brought through the Act. Advantages of Cyber law This Act has some disadvantages and also some advantages. This Act has provided us few advantages like as under the ICT Act, 2006, conduct important issues of security, which are so critical to the success of electronic transactions. The Act has given a legal definition to the

Jot Toy Company

2565 words - 11 pages Communications Technology (ICT) Managers: Information and Communications Technology (ICT) Managers. Events, Hospitality, Retail and Service Managers: Retail Managers, Call or Contact Centre and Customer Service Managers, Event and 4 Conference Managers, Transport Services Managers, Miscellaneous Hospitality, Retail and Service Managers. Miscellaneous Specialist Managers: Safety and Security Managers, Other Specialist Managers (includes

How to Plan for Security

1935 words - 8 pages connected computers aimed at preventing viruses from spreading in the network. d) Physical Security Physical security of the university’s computer facilities located in ICT labs, library and office facilities have been designed to prevent unauthorized physical access. Workers and students using these facilities are required to respect physical access modalities and hours for laboratory and library equipment. This is by ensuring correct use and

It Audit Guide

4838 words - 20 pages not provide any guarantee that the System or any connected networks cannot or| |will not be compromised. | The Information System Audit – Checklist The ISM defines processes and controls to assist agencies with security for all ICT systems. This checklist focuses on the ISM’s processes and controls allowing an


4728 words - 19 pages speed of ICT development and improvement was not matched with the speed of information security technologies development, so it allowed hackers to feel free in doing what they want Taylor (1999). It was ICT failure to provide high quality security technology that encouraged people who turned to be hackers to access information in unauthorized way without the fear of being caught. Furnell (2002:190) stated that “hackers have established their own

Is3230 Human Resources Risk Mitigation Policy

527 words - 3 pages Equipment • Always get permission before installing, attempting to install or storing programs of any type on the computers. • Damaging, disabling, or otherwise harming the operation of computers, or intentionally wasting resources puts your work at risk, and will cut short your time with the ICT equipment. • Only use the computers for educational purposes. Activities such as buying or selling goods are inappropriate. • Always check files

Capital Allowance for R & D

576 words - 3 pages (ICT) Equipment.Since ICT equipments are rapidly changing with the aim to accommodate changing business needs and to improve business efficiency.Whereby,100% deduction of cost is thus allowed as capital allowance in the acquisition.A resident individual or company will be given accelerated capital allowance(ACA) on qualifying capital expenditure incurred for the installation of security control and monitoring equipment.The initial allowance is 20

Related Essays

Importance, Impact And Barrier Of Ict On Teaching And Learning

6739 words - 27 pages International Journal for e-Learning Security (IJeLS), Volume 2, Issues 3/4, September/December 2012 Understanding the Importance, Impacts and Barriers of ICT on Teaching and Learning in East African Countries Berhane Aradom Tedla Northeast Normal University Abstract This paper based on synthesis of the research literature, observation and focused group discussion with East African Scholars on the use of Information and Computer Technology

Ict And Healthcare In Ghana: A Proposal

738 words - 3 pages ICT and Healthcare in Ghana by Mathew Adjei Darko (PG 3056209) Background Information Health is a key sector for development and plays a crucial role in poverty eradication. One of the key developments in the health sector in the last 25 years is the incursion of Information and Communication Technologies (ICT). This is clearly captured in a speech of Mr. Kofi Annan speaking at the World Summit of Information Society: “A technological

Effects Of Computers On Our Society

5223 words - 21 pages officers, who are often men, consult mainly men. Fourthly, women are less mobile, more culturally constrained and often too overburdened with various chores to be able to participate in technical training. Informal sector women too in many countries lack market information. (Kelles-Viitanen 1997). ICT can also play a major role in helping to monitor food security related issues (weather, droughts, crop failures, pests etc.), and to inform

Global It Essay

1128 words - 5 pages markets In transition from developing to developed countries. First suggested by world bank. MODULE 2 What global IT and why we read in this course. Network readiness index. Global information technology report Objective: providing a comprehensive view of the degree to which countries across the globe rely and use information and communication technologies (ICT) for enhanced competitiveness, job creation and improve economic and social