IT Governance, Risk, and Compliance:

Public Key Infrastructure

1

November 17, 2012  1:58 AM

A Few Fundamental Features of IPv6 Internetworking – Part VI



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration Management, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet Protocol Security, IPSec, IT Hardware, IT Security, Multiprocessing, Public Key Infrastructure, Service Delivery, Transport Mode, Tunnel Mode

Why understanding IPv6 is important to end-users Currently, the dominant internetworking protocol is Internet Protocol version 4 (IPv4). Yet, each IPv4 address is limited to a thirty-two bit field length, which corresponds...

November 15, 2012  2:54 AM

A Few Fundamental Features of IPv6 Internetworking – Part V



Posted by: Robert Davis
Authentication, Availability Management, Cloud Computing, Configuration Management, Encapsulating Security Payload, ICT, Information and Communication Technology, Information Technology Service Management, Infrastructure Management, Internet Protocol Security, IPSec, IT Hardware, IT Security, Multiprocessing, Public Key Infrastructure, Service Delivery, Transport Mode, Tunnel Mode

Bookmark and Share     0 Comments     RSS Feed     Email a friend


October 6, 2012  12:16 AM

Online Data Communication Access Controls – Part IV



Posted by: Robert Davis
BYOD, Configuration Management, Distributed Platforms, ICT, Information Assets Protection, Information Security, IT Architecture, IT Configuration, IT Infrastructure, Physical Security, Public Key Infrastructure, QoS, Risk Management, Service Delivery

Data encryption as an access control Data encryption provides an additional level of security and privacy over message transmissions. Data encryption is the re-encoding of electronic signals to disguise their meaning....


May 26, 2009  6:14 PM

Electronic Commerce – Part IV



Posted by: Robert Davis
B2B, B2C, B2E, B2G, Business-to-Business, Business-to-Consumer, Business-to-Employee, Business-to-Government, E-commerce, EDI, Electronic Commerce, Electronic Data Interchange, Internet, Message Integrity, PKI, Public Key Infrastructure, UCC, Uniform Commercial Code

EDI is commonly defined as the transfer of data between different companies utilizing networks. For the vast majority of entities, enhanced transactional traceability, reliability, and accessibility are derived EDI benefits; but without appropriate...

Bookmark and Share     0 Comments     RSS Feed     Email a friend


1

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: