Best Practices For Securing Your Online Retail Presence

Anderson, Dave
December 2013
Database & Network Journal;Dec2013, Vol. 43 Issue 6, p12
The article discusses the importance of commerce through mobile and internet for retailers due to growing influence of mobile factor and mobile payments and how to secure the channel of transactions. Topics included are assessing data encryption solutions with National Institute of Standards and Technology (NIST)'s certified format-preserving techniques and data protection framework for details like social security numbers and account numbers.


Related Articles

  • Questions Plague Mobile, Online Commerce.  // ISO & Agent Weekly;11/17/2011, Vol. 7 Issue 43, p23 

    The article offers information on the questions that plague the mobile and online commerce industry in the U.S. It notes that senior director Jamie Henry of Wal-Mart Stores Inc. asked about security on sensitive information in online payments in a symposium of the Federal Reserve Bank of...


    The article discusses the importance of layered security measures for merchants to prevent hackers from stealing payment card information and customer data. It states that layered security practices include using data encryption and tokenization to secure sensitive data such as credit card...

  • Scrambling for the next century. Kren, Lawrence // Machine Design;11/19/98, Vol. 70 Issue 21, p42 

    Announces the acceptance of the National Institute of Standards and Technology, Gaithersburg, Maryland of candidate encoding algorithms for the new Advance Encryption Standard (AES). Submission of formulae; Key sizes; Basis of judgment.

  • Encryption debate heats up. Moeller, Michael // PC Week;9/25/95, Vol. 12 Issue 38, p75 

    Focuses on the debate over the proposal by the National Institute of Standards and Technology (NIST) which would allow encryption technology of more than 40 bits to be exported outside the United States. Security and encryption community's claims that the plan would hamper the use of United...

  • U.S. Upgrade Of Encryption Puts Banks in Pivotal Role. KUTLER, JEFFREY // American Banker;8/16/1999, Vol. 164 Issue 156, p1 

    Reports on the United States National Institute of Standards & Technology's selection of five finalists in a competition to revise and strengthen the government standard for data encryption. Replacement of the federal data encryption standard with an advanced encryption standard with no less...

  • Public key encryption work group formed. J.S. // Electronic Design;9/16/96, Vol. 44 Issue 19, p27 

    Reports that the US National Institute of Standards and Technology established cooperative research and development agreements with several companies and institutions to find a common ground on public key encryption. Goal to develop a minimum interoperability specification; Contact information.

  • FastCrypto: Parallel AES Pipelines Extension for General-Purpose Processors. Soliman, Mostafa I.; Abozaid, Ghada Y. // Neural, Parallel & Scientific Computations;Mar2010, Vol. 18 Issue 1, p47 

    The article presents a study which proposes the use of advanced encryption standard (AES) in processors that are based on decoupled architectures. It mentions that the Rijndael algorithm was used to replace the Data Encryption Standard (DES) as selected by the National Institute of Standards and...

  • US next-generation encryption gets NIST blessing. Dipert, Brian // EDN;11/09/2000, Vol. 45 Issue 23, p30 

    Reports that the United States National Institute of Standards and Technologies has given its preliminary approval to the next-generation Advanced Encryption Standard (AES) known as Rijndael. Replacement of AES by the Data Encryption Standard; Algorithm's performance across a range of computing...

  • New crypto canon advances. Kerstetter, Jim // PC Week;08/16/99, Vol. 16 Issue 33, p31 

    Reports that five finalists have been named by the United States Department of Commerce's National Institute of Standards and Technology (NIST) to find a replacement for the Data Encryption Standard (DES). Why Advanced Encryption Standard (AES) is considered to be superior to DES; The...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics