43 research outputs found

    An Evaluated Certification Services System for the German National Root CA - Legally Binding and Trustworthy Transactions in E-Business and E-Government

    Full text link
    National Root CAs enable legally binding E-Business and E-Government transactions. This is a report about the development, the evaluation and the certification of the new certification services system for the German National Root CA. We illustrate why a new certification services system was necessary, and which requirements to the new system existed. Then we derive the tasks to be done from the mentioned requirements. After that we introduce the initial situation at the beginning of the project. We report about the very process and talk about some unfamiliar situations, special approaches and remarkable experiences. Finally we present the ready IT system and its impact to E-Business and E-Government.Comment: 6 pages; 1 figure; IEEE style; final versio

    Security Safeguards on E-Payment Systems in Malaysia: Analysis on the Payment Systems Act 2003

    Full text link
    Central to the infrastructure of electronic commerce activities is the electronic payment system. This encompasses not only the issues of technical sophistication but also legal readiness. In the context of electronic commerce environment in Malaysia, this paper seeks to highlight and examine the Malaysian legal readiness in the aspect of electronic payment system, focusing on its Payment Systems Act 2003. The discussion is limited to the issue of electronic security measures embodied in the law. Within its restricted scope, this paper seeks to demonstrate how the law recognizes the importance of security measures in order to build confidence and trust among the public and mainly the users of electronic payments in the country.

    Security safeguards on e-Payment systems in Malaysia: an analysis on the Payment Systems Act 2003

    Get PDF
    Central to the infrastructure of electronic commerce activities is the electronic payment system. This encompasses not only the issues of technical sophistication but also legal readiness. In the context of electronic commerce environment in Malaysia, this paper seeks to highlight and examine the Malaysian legal readiness in the aspect of electronic payment system, focusing on its Payment Systems Act 2003. The discussion is limited to the issue of electronic security measures embodied in the law. Within its restricted scope, this paper seeks to demonstrate how the law recognizes the importance of security measures in order to build confidence and trust among the public and mainly the users of electronic payments in the country. (Keywords: Security, electronic payment, electronic commerce, Payment Systems Act 2003)

    Understanding the vulnerabilities in Wi-Fi and the impact on its use in CCTV systems

    No full text
    Modern surveillance devices are increasingly being taken off private networks and placed onto networks connected via gateway to the Internet or into Wi-Fi based local area wireless networks (LAWN). The devices are also increasingly using IPv4 and IPv6 network stacks and some form of embedded processing or compute built in. Additionally, some specialist devices are using assistive technologies such as GPS or A-GPS. This paper explored the issues with use of the technologies in a networked environment, both wireless and internetworked. Analysis of these systems shows that the use of IP based CCTV systems carries greater risk than traditional CCTV systems, primarily due to the exposure to IP based vulnerabilities. Furthermore, Wi-Fi based IP CCTV systems are additionally susceptible to remote, physical denial of service attacks due to the broadcast nature of wireless communication systems. Interception of traffic is possible with IP based systems, and again, Wi-Fi IP based CCTV systems are more susceptible due to protocol vulnerabilities and lack of processing power. The paper concludes that more research is needed in this area to identify and classify generic vulnerabilities that these systems are vulnerable to, and to present a framework which can be used to mitigate the risk of adopting these systems

    Understanding the Vulnerabilities in Wi-Fi and the Impact on its Use in CCTV Systems

    Get PDF
    Modern surveillance devices are increasingly being taken off private networks and placed onto networks connected via gateway to the Internet or into Wi-Fi based local area wireless networks (LAWN). The devices are also increasingly using IPv4 and IPv6 network stacks and some form of embedded processing or compute built in. Additionally, some specialist devices are using assistive technologies such as GPS or A-GPS. This paper explored the issues with use of the technologies in a networked environment, both wireless and internetworked. Analysis of these systems shows that the use of IP based CCTV systems carries greater risk than traditional CCTV systems, primarily due to the exposure to IP based vulnerabilities. Furthermore, Wi-Fi based IP CCTV systems are additionally susceptible to remote, physical denial of service attacks due to the broadcast nature of wireless communication systems. Interception of traffic is possible with IP based systems, and again, Wi-Fi IP based CCTV systems are more susceptible due to protocol vulnerabilities and lack of processing power. The paper concludes that more research is needed in this area to identify and classify generic vulnerabilities that these systems are vulnerable to, and to present a framework which can be used to mitigate the risk of adopting these systems

    Pillars of IT Security

    Get PDF

    The Determinates Of Selecting Accounting Software: A Proposed Model

    Get PDF
    Selecting the appropriate accounting software has become an important issue for many organizations. Selecting the wrong accounting software would be a great disaster, it might lead to major financial losses, and possibly even bankruptcy. Certain crucial factors such as users’ current and future needs, business type, business size, features and attributes of accounting software, information technology infrastructure and environment, and vendor reliability should be taken into consideration before obtaining the software. The objective of this paper is to investigate, analyze and evaluate the main factors an organization should consider in its decision to select the appropriate accounting software. The paper introduces an integrated theoretical framework of the main factors affecting the selection of an appropriate accounting software package for an organization. The paper proceeds to introduce a proposed mathematical model of the determinants of selecting accounting software. The proposed model would help an organization to select the most appropriate accounting software that would satisfy its current and future needs for information and financial and non-financial reports
    corecore