Security policy implementation within distributed organisations confidential data transfer (CROSBI ID 484788)
Prilog sa skupa u zborniku | izvorni znanstveni rad
Podaci o odgovornosti
Hutinski, Željko ; Pavlinušić, Dobrica
engleski
Security policy implementation within distributed organisations confidential data transfer
Globalization of business systems has great influence on changes in organization and communication. Such events can also reflect on changes within structures of an information system. The most frequent form of organization of an information-communication system is distributed structure of a sub-system and its elements. Importance of the data contents defines the need of their protection which is particularly important in distributed systems, i.e. in systems that anticipate the network communication. This paper describes the implementation of different security policies when the goal of distributed organization is to communicate securely. We are considering the threats that appear when an organization wants to communicate with its geographically distributed branches using the Internet as a medium. Main goal is to demonstrate which methods should be employed in security policy to protect the data flow against potential threats. Security conscious users have two methods of defense against these problems: controls and encryption. While controls provide the way to control the access to sensitive information, they do not help us much in an organization requiering to communicate securely over the Internet (or over any other public packet-based network) as a medium. The only logical choice is the encryption.
nije evidentirano
nije evidentirano
nije evidentirano
nije evidentirano
nije evidentirano
nije evidentirano
nije evidentirano
Podaci o prilogu
616&#8211 ;-x.
2000.
objavljeno
Podaci o matičnoj publikaciji
Zbornik posvetovanja z mednarodno udeležbo
Podaci o skupu
19. Posvetovanje organizatorjev dela, Management v novem tisočletju
predavanje
29.03.2000-31.03.2000
Portorož, Slovenija