3.1 Local Network: Security
Security & Electronic Commerce
2.3.3 Point to point
3 How Can Security Issue Be Addressed?
3.1 Local Network: Security Policy
3.1.2 Access decisions
3.1.3 Systems development process
3.1.4 Physical security
3.1.5 Data security
3.1.6 Monitoring and review
3.1.7 Personnel management
3.1.8 Personnel security
3.1.10 User-level security policy
3.2 Access Security: Firewalls
3.2.2 Design decisions
3.2.3 Levels of threat
3.2.4 Firewalls and their components
3.3 Data Security: Cryptography
3.3.1 What is cryptography?
3.3.2 What is a key?
3.3.3 What is public key cryptography (PKC)?
3.3.4 How does someone obtain a pair of keys?
3.3.5 How is information integrity assured?
3.3.6 What about authenticity?
3.3.7 Is the certificate trustworthy?
3.3.8 What about non-repudiatability of origin?
3.3.9 What about non-repudiatability of receipt?
3.4 Transaction Security
3.4.1 What are Kerberos, PGP, PEM, SSL, S-HTTP and IPSEC?
Pretty Good Privacy (PGP)
Privacy Enhanced Mail (PEM)
Secure Sockets Layer (SSL)
Secure HTTP (S-HTTP)
Comparison between SSL and S-HTTP
Internet Protocol Security (IPSEC)
3.4.2 How can these protocols contribute to transaction security?
3.5 What a Smart Card is Intended for - A Typical Example: the Authentication Issue
3.5.1 Smart card applications
Prepaid smart cards
3.5.2 What is a smart card?
The plastic card
Access control to the information
3.5.3 How can your company use smart card systems?
Two-factor authentication process
3.5.4 The future