TITLE

Encryption and Digital Signatures

AUTHOR(S)
Corbitt, Terry
PUB. DATE
October 2002
SOURCE
Management Services;Oct2002, Vol. 46 Issue 10, p20
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
In the past many governments have been strongly opposed to the use of strong encryption techniques because of the implications in the fight against terrorism, organized crime, fraud and drug trafficking. Because of the widespread development of electronic commerce, these governments have had to rethink their views and have enacted legislation to regulate the use of encryption and digital signatures. In addition to this the continuing growth of the use of the Internet for electronic commerce, electronic mail and online banking have made encryption and digital signatures a necessity for security.
ACCESSION #
12145498

 

Related Articles

  • Towards a common key management standard: making encryption work.  // MarketWatch: Technology;Apr2009, Vol. 8 Issue 4, p13 

    The article reports on the importance of implementing encryption in business enterprises. Businesses are aware of the need to implement encryption to protect their information assets. However, this emphasizes the challenges around interoperability and effective key lifecycle management. Intends...

  • The Death of Privacy. Rothfeder, Jeffrey // CIO Insight;Sep2006, Issue 72, p55 

    The article provides information on companies' management of the personal information of its consumers in the U.S. In some companies, privacy of information is regarded as a risk that must be mitigated instead of treating it as a strategy imperative. Other companies do not believe on privacy...

  • IT leaders must take a long-term view. Glick, Bryan // Computer Weekly;11/13/2012, p14 

    The editor discusses the importance of long-term strategic planning in corporate information technology (IT). He notes the emergence of technologies such as cloud computing, advanced data encryption, and bring your own device (BYOD) user access programs. He argues that chief information officers...

  • IT spending on security, CRM to rise in 2004. Dubie, Denise // Network World;1/19/2004, Vol. 21 Issue 3, p12 

    Predicts a rise in IT spending on security and CRM software in 2004. Importance of business goals in IT projects; Types of security products that a customer will look for; Efforts of the companies to enhance their competitive position; More attention to secure messaging, unified management,...

  • SECUREWORKS/CORPORATE AMERICA CREDIT UNION DEBUT SECURITY.  // Computer Security Update;Mar2008, Vol. 9 Issue 3, p3 

    The article reports that SecureWorks Inc. has partnered with Corporate America Credit Union (CACU) who would resell the company's security and professional services to its member credit unions in the U.S. Under the partnership, SecureWorks' encrypted electronic mail, firewall management, and...

  • Key Management for Enterprise Data Encryption. Mattsson, Ulf // Software World;Jan2008, Vol. 39 Issue 1, p6 

    The article illustrates different elements of a suggested policy for a key management system used for managing encryption keys of business enterprises. It has been noted by the author that one of the major problems with encryption as a security method is the expensiveness and onerous...

  • SONICWALL GOLD MEDALLION PARTNER SIGNS 1,000TH MSP CUSTOMER.  // Computer Security Update;Aug2005, p7 

    The article reports that SonicWall Inc. has announced that Activant Solutions Inc., a provider of vertical enterprise resource planning solutions and a SonicWALL Gold Medallion channel partner, has signed the 1,000th customer for its successful managed services program. The program incorporates...

  • Flexible Workspaces. N., Malini // Voice & Data;Oct2012, Vol. 19 Issue 10, p73 

    The article offers information on Bring Your Own Device (BYOD) strategy which is transforming the structure of traditional organizations. It mentions that the strategy should minimize cost of implementation, ensure secure corporate data and networks, and reduce call and device costs. Moreover,...

  • PGP: addressing core data protection issues.  // MarketWatch: Technology;Mar2008, Vol. 7 Issue 3, p5 

    The article reports on the plan of PGP Corp. to position its Encryption Platform to address core data protection issues. It cites that the Encryption Platform will encourage chief information officers (CIOs), chief scientist officers (CSOs) and information technology (IT) managers to re-evaluate...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics