Premium Essay

Security and Ict

In:

Submitted By KarMA61
Words 940
Pages 4
1. Today, it’s expected that organizations accept electronic payments, variant e-payment systems are credit card, debit card, digital money, micro-payment, etc.. It’s more than expected that those payments are secure. The highest priority of an organization is to ensure privacy, authentication, integrity, and non-repudiation for electronic payment users. Electronic payments are going through a network, so it runs risk. The secure electronic payment may choose one of the following payment channels; TCP/IP channel over the Internet; A WAP channel over cellular network; etc.. There is a special security problem with gateways in the situation of electronic payment over the internet or cellular network. Internet is a public space. Organizations must guard their own data, and their customer’s data and create a secure and predictable environment for commercial exchange. The Privacy, Authentication, Integrity, Non-repudiation (PAIN) security services are required for electronic payments because; a) Organizations need to ensure that information that is private or sensitive is kept secure and not used for any purpose other than that agreed to credit/debit card numbers, proprietary information etc. Confidentiality during transactions is usually ensured by encryption. Confidentiality is assurance of data privacy. Only the intended and authorized recipients may read the data. Disclosure to unauthorized entities with lack of privacy, for example using unauthorized network sniffing is a confidentiality violation. b) Authentication is the process to verify the identity of the entity who they claim to be. It is necessary because with the lack of authentication otherwise unauthorized people can access to your bank account, what may harm the real user. For example when someone purchases something from your (web)shop, how can you be sure that they are who they claim to be. For

Similar Documents

Premium Essay

Ict Architecture and Security

...A REPORT ON ICT ARCHITECTURE AND SECURITY Prepared for: Justin Debuse Submitted: 31. October 2008 Prepared by: André Nordal Sylte University of the Sunshine Coast Word count: 1665 Executive summary This report, authorised by Justin Debuse in Introduction to ICT, BUS108, looks at ICT architecture and security in an organisation. This report found that the major security threats within an organisation’s ICT are; Cracking into an organisation’s wireless intranet in search for vital corporate information; Former employees accessing wireless intranets and extranets without authorization; Information sent via an extranet could be intercepted in its transit; Viruses and Trojans accidentally downloaded by employees and been spread around the LAN. Solutions to these threats are; WiFi protected access (WPA) password and hide the network; ICTs should be protected with a login screen for the users; To secure an extranet, organisations should use a virtual private network (VPN); Any organisation should provide basic training in how to detect viruses and Trojans. This is a proactive way to prevent an infection in a whole organisation’s LAN. This report also found that the major legal and ethical issues within an organisation’s ICT are; Employee monitored by computer technology and in the building; Privacy on e-mail stored on an organisation’s computer; Illegal and offensive use of an organisation’s...

Words: 2419 - Pages: 10

Premium Essay

Assignment Security & Ict Audit

...Security and ICT Audit Assignment 2 12-11-2012 A business continuity plan is the totality of plans made to recover the business operations following a disaster. A disaster is an event that causes a significant and perhaps prolonged disruption in the system availability. In this case the disaster is a fire which burned the office to the ground. Nothing could be salvaged from the ashes. There are a few measures included in the Business Continuity Plan of this travel agency, in order to provide an effective response. In this way they are still able to serve their customers and to continue their business operations. One of the key elements of a BCP is to consider what processes are critical and how quickly they should be resumed. In this way, you know what processes should be given priority and which may be delayed. By taking the critical processes as a basis, you can identify the critical resources and record them in the BCP. Those are the resources that are absolutely necessary to run the critical processes at an acceptable level. Measures: * From an IT process perspective: * Back-ups of the entire IT environment should be created frequently and tested periodically. Databases may contain e.g. information regarding reservations/bookings made, booking history, client databases and destinations. IT applications used for operational activities may also be recovered. * It should be possible to replace the back-up on new IT equipment. * From a facilities...

Words: 389 - Pages: 2

Premium Essay

Automated Cash Registers, Scanners, or Other Digital Devices.

...National ICT Strategy and Plan NICI - 2015 © No part of this document can be reproduced, stored in a retrieval system, or transmitted in any form or by any means - electronic, mechanical, photocopying, recording, or otherwise - without the permission of the Rwanda Ministry in charge of ICT in the Office of the President.   List of Acronyms AGAGE AISI AMIS ARTEL BNR BPO CD CERT COMESA CNS-ATM CS CSIRT CTC FWG DCRS EAPP EASSy EDPRS e-GOV EMIS EMR EQMS ERMS FMS FY GDP GIS GNI GNP GoR G2B G2C G2G HIV HLSC HRMS ICT ICT4D IDS IPAR IPS ISP ISPA ITU IXP JICA Advanced Global Atmospheric Gases Experiment African Information Society Initiative Agriculture management Information System Africa Rural Telecommunication Banque National du Rwanda Business Processing Outsourcing Community Development Computer Emergency Response Team Common Market for Eastern and Southern Africa Communication Navigation Surveillance /Air Management Cyber Security Computer Security Incident Response Team Coordination Technical Committee Focus area Working Group Develop a Digital Court Recording System East African Power Pool Eastern Africa Submarine Cable System Economic Development & Poverty Reduction Strategy (2008-2012) e-Government Education Management Information System Electronic Medical Records Electronic Queue Management System Electronic Records Management System Financial Management Systems Fiscal Year Gross Domestic...

Words: 28160 - Pages: 113

Premium Essay

Cloud Computing

...White Paper Cloud Computing. Alternative sourcing strategy for business ICT. Contents. 3 1. Abstract. 4 4 5 2. Introduction to Cloud Computing. 2.1 A historical background. 2.2 Definitions. 7 7 11 12 3. Flexible ICT services - more than just a dream. 3.1 Business needs as a driver of Cloud Computing. 3.2 Status Quo. 3.3 A summary - added value with Cloud Computing. 14 14 14 15 4. Areas and examples of application. 4.1 Cloud Computing in business startups. 4.2 Cloud Computing in companies with existing infrastructure. 4.3 Cloud Computing with business-critical applications. 17 19 20 22 23 5. Dynamic Services – a top-quality Cloud Computing service. 6. Summary. 7. Glossary. 8. List of figures. 9. List of sources. 1. Abstract. The term "Cloud Computing" has been mentioned for just under two years in relation to services or infrastructural resources, which can be contracted over a network. Thus, the idea of renting instead of buying IT is nothing new. And so, Cloud Computing has many antecedents and equally as many attempts to define it. The players in the large world of clouds are Software as a Service providers, outsourcing and hosting providers, network and IT infrastructure providers and, above all, the companies whose names are closely linked with the Internet's commercial boom. But, all these services in combination outline the complete package known as Cloud Computing – depending on the source with the appropriate focus. That which...

Words: 8225 - Pages: 33

Premium Essay

Cloud Computing

...White Paper Cloud Computing. Alternative sourcing strategy for business ICT. Contents. 3 1. Abstract. 4 4 5 2. Introduction to Cloud Computing. 2.1 A historical background. 2.2 Definitions. 7 7 11 12 3. Flexible ICT services - more than just a dream. 3.1 Business needs as a driver of Cloud Computing. 3.2 Status Quo. 3.3 A summary - added value with Cloud Computing. 14 14 14 15 4. Areas and examples of application. 4.1 Cloud Computing in business startups. 4.2 Cloud Computing in companies with existing infrastructure. 4.3 Cloud Computing with business-critical applications. 17 19 20 22 23 5. Dynamic Services – a top-quality Cloud Computing service. 6. Summary. 7. Glossary. 8. List of figures. 9. List of sources. 1. Abstract. The term "Cloud Computing" has been mentioned for just under two years in relation to services or infrastructural resources, which can be contracted over a network. Thus, the idea of renting instead of buying IT is nothing new. And so, Cloud Computing has many antecedents and equally as many attempts to define it. The players in the large world of clouds are Software as a Service providers, outsourcing and hosting providers, network and IT infrastructure providers and, above all, the companies whose names are closely linked with the Internet's commercial boom. But, all these services in combination outline the complete package known as Cloud Computing – depending on the source with the appropriate focus. That which...

Words: 8225 - Pages: 33

Premium Essay

Reademe

...submitting the assignment on paper, please staple this sheet to the front of each assignment. If you are submitting the assignment online, please ensure this cover sheet is included at the start of your document. (This is preferable to a separate attachment.) Student ID |  1 | 1 | 0 | 0 | 7 | 4 | 4 | 1 | 7 | Email: kamry007@mymail.unisa.edu.au | Course code and title: Strategic Information Systems M (INFS 5058) | School: School of Computer and Information Science | Program Code: LMCB | Course Coordinator: Dr Don Falconer | Tutor: Dr Don Falconer | Assignment number: Two (2) | Due date: 08th Nov 2013, 10:00 PM | Assignment topic as stated in Course Information Booklet: Essay : Information and Communication Technology (ICT) on National Level | Further Information: (e.g. state if extension was granted and attach evidence of approval, Revised Submission Date)  N.A. | I declare that the work contained in this assignment is my own, except where acknowledgement of sources is made. I authorise the University to test any work submitted by me, using text comparison software, for instances of plagiarism. I understand this will involve the University or its contractor copying my work and storing it on a database to be used in future to test work submitted by others. I understand that I can obtain further information on this matter at http://www.unisa.edu.au/learningadvice/integrity/default.asp Note: The attachment of...

Words: 3165 - Pages: 13

Free Essay

Uganda.Pdf

...THE INTER-SESSIONAL PANEL OF THE UNITED NATIONS COMMISSION ON SCIENCE AND TECHNOLOGY FOR DEVELOPMENT 15-17 December 2010 Geneva UGANDA CONTRIBUTION " ICT POLICIES, STRATEGIES AND INITIATIVES PUT IN PLACE IN UGANDA " The views presented here are the participants’ and do not necessarily reflect the views and the position of the United Nations or the United Nations Conference on Trade and Development i      ICT POLICIES, STRATEGIES  AND INITIATIVES PUT IN  PLACE IN UGANDA      NITA‐U  11/2/2010      ii    Table of Contents  1    2  Table of Contents ………………………………………………………………………………………………………………………………………………….iii  INFORMATION COMMUNICATION TECHNOLOGY (ICT) STRATEGIES…………………………………………………………………….1  2.1  3  Creation of the Ministry of ICT……………………………………………………………………………………………………………………..1  AGENCIES UNDER MINISTRY OF ICT………………………………………………………………………………………………………………….....1  3.1  National Information Technology Authority‐Uganda……………………………………………………………………………………1  Functions of the Authority ........................................................................................................................ 1  Initiatives ................................................................................................................................................... 2  3.1.1  3.1.2  3.2  Uganda Communications Commission (UCC)………………………………………………………………………………………………..3  Initiatives ...............................................................................................................

Words: 3997 - Pages: 16

Free Essay

Assignment

...effective performance and thus leading to high productivity and profitability, it has to implement and deploy optimal ICT practice. The report examines the ICT infrastructure that is utilized and deployed at Bahrain Polytechnic, which is one of the leading and well-established public universities in Bahrain. It attempts to provide a comprehensive overview of how ICT is implemented within the institution in regard to the physical infrastructure, systems, applications, networking and all other technical issues that are relevant to the ICT implementation and operations. Through the journey of investigating all aspects and concepts of ICT at Bahrain Polytechnic, this report tries of shed light on and assess the ICT services provided to the staff as well as to the customers who are the students. As it is the case to any organization, Bahrain polytechnic’s main aim of implementing best ICT practices is to ensure the best learning environment to the students and improve their performance and achievement as well as facilitate the performance of both the tutors and other staff. All this can maintain the institution’s competitive edge and place it amongst the most distinguished and pioneering universities in Bahrain. By carrying out surveys, observations and face-to-face interviews with ICT team members, this reports seeks to assess the overall performance of the ICT department, the systems, applications and their suitability and adequacy to support the various needs and requirements...

Words: 6680 - Pages: 27

Premium Essay

For One

...Interdependence and Conflict: An Introduction Edward D. Mansfield and Brian M. Pollins Over the past few decades, there has been a surge of interest in the relationship between economic interdependence and political con›ict. One view that has gained considerable popularity and empirical support is that heightened interdependence fosters cooperative political relations. Voiced with increasing regularity in both academic and policy circles, this claim has been used to help justify the formation of the European Economic Community, Richard Nixon’s opening to China, Willy Brandt’s Ostpolitik, and Henry Kissinger’s conception of détente with the Soviet Union. Nonetheless, critics of this argument have not been stilled. Some observers maintain that, rather than fostering cooperation, increased interdependence generates political discord. Even more widespread is the argument that economic exchange has no strong bearing on the high politics of national security. This debate is hardly new. For centuries, the nature and strength of the links between interdependence and con›ict have been the subject of heated disagreement. Until lately, however, these links remained the subject of remarkably little systematic scrutiny. In recent years, a growing number of studies have attempted to ‹ll this gap in the literature, but they have yet to resolve various crucial questions. Most important, how and to what extent does interdependence in›uence political antagonism? What are the causal...

Words: 11753 - Pages: 48

Premium Essay

Australian Cyber Security Framework Essay

...The Australian Cyber Security Capability Framework (CSCF) & Mapping of ISM Roles by Australian Government Information Management Office (AGIMO) formalizes training, certification, competency and development requirements for staff employed within the IT Security profession [14]. The 20- pages Framework has a two level structure with six main categories of capability: Service Delivery; IT Business Management; Business Change; Solutions Development; Solutions Implementation; and Service Support. The Security domain sits within the Service Delivery area and it is broken down into four capability groupings: Service Delivery; IS; Technology Audit; and Emerging Technology Monitoring. The competencies are mapped onto the Framework based on complexity...

Words: 911 - Pages: 4

Premium Essay

How to Plan for Security

...How to Plan for Security i). Statement of Policy This policy statement seeks to address the optimum and responsible use of the wireless local area network WLAN facility available at the university in relation to specific network security issues. The issue of concern in this policy is the promotion of responsible use of the WLAN facility among the university’s student and workers. The strategy aims at preventing security problems that may arise from the misuse and malicious exploitation of the facility by people granted approval to access the university’s WLAN information systems. a) Scope and Applicability The scope of this policy statement covers the hardware, software and access protocols associated with the WLAN use by students and workers at the university. The policies adopted will seek to regulate access permissions for the users of the WLAN facility and to promote responsible use in line with policies outlined in this policy document and by industry standards and legal requirements of use. b) Definition of Technology Address The WAN is available for use by the students and workers within the university. The WLAN facility provides access to information systems meant to facilitate the learning and worker needs by providing information access and software platforms. c) Responsibilities The administration and management of the WLAN facility is the responsibility of appointed network administrators at the university’s faculty of Information and Communication Technology. The...

Words: 1907 - Pages: 8

Free Essay

Importance, Impact and Barrier of Ict on Teaching and Learning

...e-Learning Security (IJeLS), Volume 2, Issues 3/4, September/December 2012 Understanding the Importance, Impacts and Barriers of ICT on Teaching and Learning in East African Countries Berhane Aradom Tedla Northeast Normal University Abstract This paper based on synthesis of the research literature, observation and focused group discussion with East African Scholars on the use of Information and Computer Technology (ICT) in primary and secondary schools in East African Countries with a particular focus to understand the importance, impacts and barriers of ICT into classroom Instruction. The study explored internal and external factors that surround ICT issues, policies of ICT integration and factors that facilitate or impede the use of ICT, with the focus of improving the quality of teaching-learning process. The study reveals that the inhibiting factors are unrealistic policies of ICT, poor infrastructure, lack of teacher competence, confidence, incentive, perception and beliefs, imposed curriculum, lack of proper network, political instability, brain drain, sporadic electricity, poor transportation, lack of public awareness and participation, poor school leadership, technological illiteracy and lack of pedagogical skills. The study further revealed that ICT integration is far behind in East African Schools as a consequence of ICT deficiency, absence of pre-service and in-service teacher training and poor teachers’ welfare and morale. Eventually, the study concluded that ICT is crucial...

Words: 6739 - Pages: 27

Premium Essay

Internet and Business

...status of any country, territory, city or area or of its authorities, or concerning the delimitation of its frontiers or boundaries. The views expressed do not necessarily represent the decisions or the stated policy of the United Nations. Mention of firm names and commercial products does not imply the endorsement of the United Nations. This publication has been issued without formal editing. ii PREFACE The role of small and medium-sized enterprises (SMEs) in national competitiveness and development, as well as in generating jobs and revenues for countless citizens, is well documented. Their meaningful and useful access to Information and Communications Technologies (ICT), particularly the Internet, will significantly enhance this critical role and will drive demand for and innovation in the ICT sector even more. This set of training modules was therefore developed to serve as a policymaking reference on Internet Use for Business Development, principally for middle- to senior-level Internet policy makers and implementers of public policy issues of Internet governance. More particularly, it is intended as an introductory guide to the various issues and legislative/policy options that developing countries should consider as they put into place the policies and...

Words: 27227 - Pages: 109

Premium Essay

Ict: a Double Edged Sword

...ICT: A DOUBLE EDGED SWORD ICT is a doubled age sword, no doubt its true but only if its powerfulness and robustness is used in a wrong way The freedoms and rights entrenched in the constitution are also double edged, having both a good side and a bad side. Take for example the freedom of expression. As we know it, it’s a fundamental human right in a democracy for one to express his or her thoughts, be it about the government or an occurrence. The individual can express negative or positive attitude towards the government or an occurrence. It’s normal for a positive expression to be well received, but it also hurts if the negative is said about let’s say the government. It also depends on the extremes of the criticism. An individual can decide to express in a newsgroup something like “the government is not doing well enough to ease the hunger crisis in north east Kenya”. Most definitely the government would react and probably give a news statement via its official spokesman saying it’s doing all within its means to avert and ease the situation. Such an expression is negative but cannot be considered extreme. Its most probable for the opposition parties to say such statement every day in the media, as one is free to express what he or she feels and the government is well within its right to react and save its image. Suppose an individual comes up, calls a press conference and confidently says “the government of Kenya officials are engaged and involved in drug trafficking around...

Words: 1453 - Pages: 6

Premium Essay

Position Paper Summary

...in the context of information security Dear delegates, After reading your position papers, we made a summary as follows. Please read it and may it help you. Country Name Argentina Basic Position Argentina is focusing on cracking down the ill-using of ICTs. Past Actions Reached a ‘Tunisia commitment’ with many countries to make the commitment in advancing the development of information technology and accelerate the national exchange. Proposed Solutions (1) Introduce a law named" Information security law "to promote the protection of the domestic information security. (2) Call upon national institutions and social organizations to corporate to promote the maintenance of information security. (3) Call for regional organization to implement technology exchange. (1) Normalize laws and standards on cyber perpetration and ICT intelligence use and supply. (2) Promote a comprehensive collaboration framework based on critical regional cyber security organizations. (3) Elaborate common terms and definitions and exchange national views on the use of ICTs in conflict for the sake of confidence-building. Australia Australian government calls for international collaboration to cope with information perpetration and to establish constricting norms on the state use of ICT, relieving international instability and enhancing the freedom of information. Communication and cooperation among (1) Committed $125.8 million to cyber safety measures. (2) Cyber Security Strategy was ensued; (3) Completed...

Words: 4012 - Pages: 17