1
Authentication – are parties to the transaction who they claim to be (risk (c) above)?
2
Privacy and confidentiality – are transaction data protected? The consumer may want
to make an anonymous purchase. Are all non- essential traces of a transaction removed
from the public network and all intermediary records eliminated (risks (b) and (c)
above)?
3
Integrity – checks that the message sent is complete, i.e. that it is not corrupted.
4
Non- repudiability – ensures sender cannot deny sending message.
Firewall
A specialised software
application typically
mounted on a server
at the point where the
company is connected to
the Internet. Its purpose
is to prevent unauthorised
access into the company.
Ethical hacker
Hacker employed
legitimately to test the
quality of system security.
M11_CHAF6542_06_SE_C11.indd 588
7/23/14 1:27 PM
589
Do'stlaringiz bilan baham: |