County Supes To Vote On Allowing Funds To Build Community Center That Includes Allowing Day Laborers On 41st Ave and MLK Jr Blvd.....

Go Back   Fight Back In Sac > Hot topics > The Economy
Register FAQForum Rules Members List Calendar Articles Media Center Downloads Search Today's Posts Mark Forums Read

The Economy This forum is for all topics related to the Local, state, U.S., and world economy


Welcome to the Fight Back In Sac forums.

You are currently viewing our boards as a guest which gives you limited access to view most discussions and access our other features. By joining our free community you will have access to post topics, communicate privately with other members (PM), respond to polls, upload content and access many other special features. Registration is fast, simple and absolutely free so please, join our community today!

If you have any problems with the registration process or your account login, please contact contact us.
Reply
 
Thread Tools Display Modes
  #1  
Old 06-28-2010, 12:00 AM
William Stockert William Stockert is offline
New Registrant
 
Join Date: Jun 2010
Posts: 1
Default Properly managing security of information on the net

The commodity trading business will be a profitable one only if it is properly managed. In the era of globalization, no business house can ever afford to ignore the fast developments in science and technology. Even when technology is available, the problem of security also needs to be considered. Technologies have, therefore been developed to add security to information on the net. This is an ongoing process since security requirements only increase with time.

The validity of any business transaction, whether on the net or otherwise, is based on its authenticity, integrity, privacy and non-repudiation. These are the four pillars on which a business or commercial deal stands. Let us understand each one of them.

Authentication: This involves comparing the user name and password to a list of authorized users and their passwords. It determines whether the message sent comes from the person/organization who claims to be the sender. There are two methods for the verification process:
1. Challenge and Receive
2. Digital Signatures

For example, an 'investor' providing details of his 'demat holdings' to a 'broker' to trade must be satisfied that the information is going into correct hands. Similarly, the 'Broker' has to be sure that the 'investor' is the real owner of the 'demat holdings'.

Integrity: To ensure that a third party has not tampered the information entered by the 'investor'.

Privacy: To ensure that the data inputted (entered) has not been intercepted and read by a third party.

Non-Repudiation: To ensure that the party does not refuse either having sent or received the respective messages. For example, it should not be possible for an 'investor' to report that he did not place an order to 'buy or sell' securities. At the same time, it should not be possible for the 'broker' to pretend that he did not receive the order to 'buy or sell' securities.

The internet, as a media, does not support any of the above parameters. Hence, technologies are being developed to permit sharing of authentic, integral, private and non-repudiable information.
Reply With Quote
Reply


Thread Tools
Display Modes

Posting Rules
You may not post new threads
You may not post replies
You may not post attachments
You may not edit your posts

vB code is On
Smilies are On
[IMG] code is On
HTML code is Off
Forum Jump


All times are GMT -7. The time now is 05:00 AM.


Powered by vBulletin® Version 3.6.8
Copyright ©2000 - 2017, Jelsoft Enterprises Ltd.