Abstract: This chapter focuses on security and the role played by cryptographic technology in data security. Securing data while it is in storage or in transition from an unauthorized access is a critical function of information technology. All forms of e-commerce activities such as online credit card processing, purchasing stocks, and banking data processing would, if compromised, lead to businesses losing billions of dollars in revenues, as well as customer confidence lost in e-commerce. Data security is not limited to wired networks but is equally critical for wireless communications such as in Wi-Fi and cellular. A very recent case was highlighted when the Indian government requested to Research In Motion (RIM) to share the encryption algorithm used in the BlackBerry cellular device. RIM refused to share the encryption algorithm. This should demonstrate that encryption is an important technology in all forms of communication. Data encryption prevents data from being exposed to unauthorized access and makes it unusable. Detection enables monitoring of the activities of network users, provides a means to differentiate levels of activities, and offers a possible clue to network violations. Since a network violation should be repeated, response is equally important. Thus the three-pronged approach is evolutionary, and therefore systems analysis and design principles must be taken into account when one designs a secured data network.
Publication Year: 2009
Publication Date: 2009-01-01
Language: en
Type: book-chapter
Indexed In: ['crossref']
Access and Citation
AI Researcher Chatbot
Get quick answers to your questions about the article from our AI researcher chatbot