TITLE

Thieves Won't Wait. Neither Should You

AUTHOR(S)
Krieg, Geoff
PUB. DATE
July 2012
SOURCE
Hospitality Upgrade;Summer2012, p162
SOURCE TYPE
Trade Publication
DOC. TYPE
Article
ABSTRACT
The article offers the author's insights on the significance of adoption of point-to-point encryption (P2PE) to secure sensitive payment data in hotels and restaurants. He says that P2PE technologies encrypt and guard data of merchants from thieves who try to install merchant's network with sniffing or hacking software. He adds that despite having cost as argument for the adoption, merchants should reflect on the savings P2PE offer on scope reduction and possible data breach cost.
ACCESSION #
77937240

 

Related Articles

  • Distributed private key for P2P network message security. Patil, Pankaj R.; Patil, D. R. // World Journal of Science & Technology;2012, Vol. 2 Issue 3, p122 

    Peer-to-peer (P2P) networking is a distributed application architecture that partitions tasks or workloads among peers. Peers are equally privileged, equipotent participants in the application. Identity based cryptography (IBC) was introduced into peerto- peer networks recently for identity...

  • Distributing security-mediated PKI. Vanrenen, Gabriel; Smith, Sean; Marchesini, John // International Journal of Information Security;Jan2006, Vol. 5 Issue 1, p3 

    The security-mediated approach to PKI offers several advantages, such as instant revocation and compatibility with standard RSA tools. In this paper, we present a design and prototype that addresses its trust and scalability problems. We use trusted computing platforms linked with peer-to-peer...

  • Development of Collaborative Defensible Services based on P2P Systems. Aarti, R.; Aishwarya, M. J.; Bhavana, B.; Gokul, Vanaja // International Journal of Computer Applications;May2012, Vol. 46, p1 

    With the immense development of computer networks, the network security problems have also developed simultaneously, causing severe damage, thus reducing the efficiency of the networks and also the nodes in the networks. Protection provided at the nodes is not sufficient to completely protect...

  • GOLD RUSH. Butler, Harry // Custom PC;Mar2013, Issue 114, p94 

    The article discusses the implications of the rise in value of the digital crypto-currency Bitcoin as of 2013. Bitcoin was founded by Satoshi Nakamoto, whose true identity is still a mystery, as a purely peer-to-peer version of electronic cash. Bitcoin is protected by layer upon layer of...

  • Research on Mechanism of PKI Trust Model. Qinghai Bai; Ying Zheng; Linna Zhao; Hua Chun; Chunying Cheng // Applied Mechanics & Materials;2014, Issue 536-537, p694 

    Trust model is the foundation of the whole secure architecture because it determines the trust form adopted and the risk to adopt it in network. So the research of trust model in PKI has been the hot spot of PKI technology. Firstly, some backgrounds of PKI and trust model as well as the problems...

  • Advanced Reputation Management and P2P Networks. Ravi, Ranjit Kumar; Jatla, Srikanth; S., Swarnalatha // International Journal of Advanced Research in Computer Science;Sep/Oct2011, Vol. 2 Issue 5, p455 

    Reputation management in a peer to peer network is difficult as challenges are posed by lack of centralized authority. For this reason P2P (Peer-to-Peer) network is vulnerable which can facilitate non-cooperation, cheating, leaching on the network and propagation of malicious code. The security...

  • Shared property. Mayne, Mark // SC Magazine: For IT Security Professionals (UK Edition);Mar2007, p44 

    The article focuses on peer-to-peer (P2P) technology. There are several threats facing businesses from client-side P2P technologies. For instance, downloads of original client software can be contaminated by spyware and Trojans. Another indirect threat to businesses is encryption cracking via...

  • GNUnet.  // Network Dictionary;2007, p217 

    A definition of the term "GNUnet" is presented. It refers to a free software framework for decentralized, peer-to-peer networking. First published on November 6, 2001, the GNUnet provides link encryption, peer discovery and resource allocation. Currently, the framework runs on GNU/Linux, BSD,...

  • A Reputation-Based Trust Evaluation Model for P2P E-Commerce. Liang, Wang; Yajun, Guo; Mei, Qi // International Journal of Distributed Sensor Networks;Jan/Feb2009, Vol. 5 Issue 1, p39 

    P2P e-commerce as a new shopping pattern is developing rapidly, and users can transact with anybody anytime and anywhere in the P2P e-commerce system, but as users often interact with strangers, hence building trust among the users, make the users know each other well, estimate the risk of...

Share

Read the Article

Courtesy of VIRGINIA BEACH PUBLIC LIBRARY AND SYSTEM

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics