TITLE

Encryption and Digital Signatures

AUTHOR(S)
Corbitt, Terry
PUB. DATE
October 2002
SOURCE
Management Services;Oct2002, Vol. 46 Issue 10, p20
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
In the past many governments have been strongly opposed to the use of strong encryption techniques because of the implications in the fight against terrorism, organized crime, fraud and drug trafficking. Because of the widespread development of electronic commerce, these governments have had to rethink their views and have enacted legislation to regulate the use of encryption and digital signatures. In addition to this the continuing growth of the use of the Internet for electronic commerce, electronic mail and online banking have made encryption and digital signatures a necessity for security.
ACCESSION #
12145498

 

Related Articles

  • Towards a common key management standard: making encryption work.  // MarketWatch: Technology;Apr2009, Vol. 8 Issue 4, p13 

    The article reports on the importance of implementing encryption in business enterprises. Businesses are aware of the need to implement encryption to protect their information assets. However, this emphasizes the challenges around interoperability and effective key lifecycle management. Intends...

  • The Death of Privacy. Rothfeder, Jeffrey // CIO Insight;Sep2006, Issue 72, p55 

    The article provides information on companies' management of the personal information of its consumers in the U.S. In some companies, privacy of information is regarded as a risk that must be mitigated instead of treating it as a strategy imperative. Other companies do not believe on privacy...

  • IT leaders must take a long-term view. Glick, Bryan // Computer Weekly;11/13/2012, p14 

    The editor discusses the importance of long-term strategic planning in corporate information technology (IT). He notes the emergence of technologies such as cloud computing, advanced data encryption, and bring your own device (BYOD) user access programs. He argues that chief information officers...

  • IT spending on security, CRM to rise in 2004. Dubie, Denise // Network World;1/19/2004, Vol. 21 Issue 3, p12 

    Predicts a rise in IT spending on security and CRM software in 2004. Importance of business goals in IT projects; Types of security products that a customer will look for; Efforts of the companies to enhance their competitive position; More attention to secure messaging, unified management,...

  • SECUREWORKS/CORPORATE AMERICA CREDIT UNION DEBUT SECURITY.  // Computer Security Update;Mar2008, Vol. 9 Issue 3, p3 

    The article reports that SecureWorks Inc. has partnered with Corporate America Credit Union (CACU) who would resell the company's security and professional services to its member credit unions in the U.S. Under the partnership, SecureWorks' encrypted electronic mail, firewall management, and...

  • Key Management for Enterprise Data Encryption. Mattsson, Ulf // Software World;Jan2008, Vol. 39 Issue 1, p6 

    The article illustrates different elements of a suggested policy for a key management system used for managing encryption keys of business enterprises. It has been noted by the author that one of the major problems with encryption as a security method is the expensiveness and onerous...

  • IBM to expand into the information protection market.  // MarketWatch: Technology;Jul2008, Vol. 7 Issue 7, p17 

    The article focuses on the initiatives taken by International Business Machines Corp. (IBM) towards its plan to enhance its capabilities in the information protection market. The company announces its plan to release an enterprise encryption key management solution and a data classification and...

  • SONICWALL GOLD MEDALLION PARTNER SIGNS 1,000TH MSP CUSTOMER.  // Computer Security Update;Aug2005, p7 

    The article reports that SonicWall Inc. has announced that Activant Solutions Inc., a provider of vertical enterprise resource planning solutions and a SonicWALL Gold Medallion channel partner, has signed the 1,000th customer for its successful managed services program. The program incorporates...

  • Check Your Security Knowledge: Check Point Exam #156-110. Finley, Kenneth // Certification Magazine;May2005, Vol. 7 Issue 5, p28 

    This article presents information on the Check Point Certified Security Principles Associate (CCSPA) exam. Check Point began offering certifications in late 1998. The initial focus was on the technical implementation of a software-based firewall solution. As solutions became more complex and...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics