Cryptography: Protecting Confidentiality, Integrity and Availability of Data

Cryptography: Protecting Confidentiality, Integrity and Availability of Data

Henry B. Wolfe (University of Otago, New Zealand)
Copyright: © 2000 |Pages: 22
DOI: 10.4018/978-1-878289-71-1.ch006
OnDemand PDF Download:
$37.50

Abstract

The protection of information for business or private purposes can be achieved through the careful selection and use of cryptographic tools. Throughout recorded history the art and science of cryptography has been the exclusive domain of government in the form of military and diplomatic use. For the most part the many and varied techniques were used for protecting strategic communications. With the advent of the microcomputer the tools to incorporate some of the complex mathematical tools necessary to provide strong encryption1 became readily available to the public at large. That availability has contributed to the proliferation and use of cryptographic tools that are capable of providing strong encryption to anyone who would care to use them. This important security technique has become the main tool for protecting communications of all kinds and is used throughout the business community. The banking community, for example, is probably one of the largest users of data encryption for the protection of their clients’ financial transactions.

Complete Chapter List

Search this Book:
Reset
Table of Contents
Preface
Lech Janczewski
Chapter 1
Jonathan W. Palmer, Jamie Kliewer, Mark Sweat
The security issue has been a compelling one for many organizations. In two separate studies completed in April 1998, Fortune 1000 companies... Sample PDF
Security Risk Assessment and Electronic Commerce: A Cross-Industry Analysis
$37.50
Chapter 2
Jairo A. Gutierrez
The growing popularity of the Internet has taken many organisations by surprise. Established mechanisms such as fax technology, electronic data... Sample PDF
Securing the Internet in New Zealand: Threats and Solutions
$37.50
Chapter 3
Dieter Fink
While much attention is currently being devoted to solving technological challenges of the Internet, for example increasing the bandwidth on... Sample PDF
Developing Trust for Electronic Commerce
$37.50
Chapter 4
Lech Janczewski
In this chapter we will discuss the issue of managing security processing in business organization with special emphasis on computer systems. Our... Sample PDF
Managing Security Functions Using Security Standards
$37.50
Chapter 5
Fredj Dridi, Gustaf Neumann
Advances in the World Wide Web technology have resulted in the proliferation of significant collaborative applications in commercial environments.... Sample PDF
Managing Security in the World Wide Web: Architecture, Services and Techniques
$37.50
Chapter 6
Henry B. Wolfe
The protection of information for business or private purposes can be achieved through the careful selection and use of cryptographic tools.... Sample PDF
Cryptography: Protecting Confidentiality, Integrity and Availability of Data
$37.50
Chapter 7
Dieter Gollmann
Products promising to secure electronic commerce and other Internet applications tend to rely heavily on cryptography. On occasion, it seems that... Sample PDF
Foundations for Cryptography
$37.50
Chapter 8
Chris Mitchell
However, despite this wide range of standardisation activity, the ISO/IEC JTC1/SC27 work is unique in being both truly international and also aimed... Sample PDF
Developments in Security Mechanism Standards
$37.50
Chapter 9
Charles Prysby, Nicole Prysby
Electronic mail (e-mail) has become increasingly important in the workplace. The growth of this new medium of communication has generated important... Sample PDF
Electronic Mail, Employee Privacy and the Workplace
$37.50
Chapter 10
Gehan Gunasekara
This chapter canvasses the impact of the Privacy Act 1993 on those who transact their business in cyberspace who fall within the Act’s definition of... Sample PDF
Protecting Personal Privacy in Cyberspace: The Limitations of Third Generation Data Protection Laws such as the New Zealand Privacy Act 1993
$37.50
About the Authors