TITLE

droit : le référentiel général de sécurité

AUTHOR(S)
Thomas, Michel
PUB. DATE
September 2012
SOURCE
Archimag;sep2012, Issue 257, p36
SOURCE TYPE
Periodical
DOC. TYPE
Article
ABSTRACT
The article discusses the electronic security protocol le référentiel général de sécurité (RGS), which concerns electronic exchanges between users and administrators and between administrative authorities. Topics discussed include authentication and electronic signatures, confidentiality, and legal issues related to information security.
ACCESSION #
82877060

 

Related Articles

  • Three IPS products pass security evaluation tests. Messmer, Ellen // Network World;6/26/2006, Vol. 23 Issue 25, p8 

    The article reports on the result issued by ICSA Labs presenting the three intrusion-prevention systems (IPS) products that have passed from its required performance and accuracy goals in the U.S. Out of ten products submitted by marketers for ICSA evaluation, only three were able to meet the...

  • OATH aims for open authentication. Grajek, Garret; Hoffmeier, Jay // Network World;9/25/2006, Vol. 23 Issue 37, p57 

    The article reports about a technological innovation that enables strong authentication of all users on all devices, across all networks developed by Open Authentication (OATH). OATH is a group of companies that manufactures leading devices, platforms and application products. OATH has already...

  • A wave of change in data laws. Simmons, Natasha // Lawyer 2B;Autumn2015, p8 

    The article discusses the proposed General Data Protection Regulation, a data law that aims to address some of the privacy challenges posed by technology in the European Union.

  • RSA Dismisses Researchers' SecurID Attack Claims.  // CIO Insight;6/28/2012, p1 

    The article discusses the claim of Sam Curry, chief technology officer of Identity and Data Protection unit of network security company RSA Security LLC, against the research on modified version of the Bleichenbacher RSA PKCS#1v1.5 attack strategy to access encryption keys. He emphasizes the...

  • The worst happens What next? Morbin, Tony // SC Magazine: For IT Security Professionals (UK Edition);Sep/Oct2014, p25 

    The article discusses how to respond to and recover from cyber breaches. Topics discussed include cyber resilience, the four-step approach proposed by Bruce Schneier of Co3 Systems, and the utilization of best practice following resolution of vulnerabilities in the network or inside threat. Also...

  • Eliminate mobile app threats. Walsh, Jack // Sports Car;Dec2013, Vol. 24 Issue 12, p50 

    In this article, the author reflects on the need to eliminate mobile device applications threats in business organizations. He states that the technology research firm Gartner Inc. has predicted that 25 percent of enterprises will have a mobile enterprise application stores (EAS) by 2017. He...

  • The changing face of data protection. Wood, Denise // Sports Car;Dec2013, Vol. 24 Issue 12, p16 

    In this article, the author focuses on the changing aspects of business and consumer data protection. She informs that information technology (IT), sakes and customer services departments should know IT security policies and standards and she states that businesses should be aware of latest...

  • States Aggressively Amend Data Breach Notification Obligations. McLoon, Daniel J.; Paez, Mauricio F.; Johnson, Jay; Perry, Nicole M. // Venulex Legal Summaries;2015 Q3, p1 

    The article focuses on the 2015 amendments made by several U.S. states to their data breach notification laws in light of President Barack Obama's proposed Personal Data Notification and Protection Act, which would preempt state notification and statues and establish a 30-day notification...

  • Electronic Access Control Systems: The Foundation of Your PSIM. Jensen, Joel // Security: Solutions for Enterprise Security Leaders;Jun2009, Vol. 46 Issue 6, p54 

    The article focuses on the use of electronic access control systems for physical security information management (PSIM). It highlights the consideration of the access control system in looking for the readiness in PSIM. It also indicates the things to be considered for the PSIM that include the...

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics