Paper title:

Securing the Digital Economy

Published in: Issue 1, (Vol. 4) / 2010
Publishing date: 2010-03-30
Pages: 44-48
Author(s): Valentin P. Mazareanu, Alina Marin
Abstract. The Digital economy has naturally led to the reconfiguration of communication and information processes. These processes are depending on the computer, starting from the personal one and reaching to computer networks, whether local, metropolitan or global. These led to the development of such information systems able to communicate information, systems that must also ensure the security of communications between computers within the company, but also between computers of different parties, outside the company. As the communication between computers in the network has evolved to electronic funds transfer (EFT), digital money and communication of personal data, internet banking, etc., the importance of security issues of data transmitted over the network also has increased. Even more as the network has evolved into a “wireless” one.
Keywords: Information Security, Cybercrime.
References:



1. Wespi, A., Securing your e-business by managing the inherent IT security risks in Abderrahim, L. (editor), Handbook of integrated risk management for ebusiness: measuring, modelling and managing risk, Ed. Ross Publishing, Boca Raton, 2003, pp.116-118

2. Tulloch, M., Microsoft Encyclopedia of Security, Ed. Microsoft Press, Redmond, 2003, p.296

3. ***, Action steps for improving information security, Cisco Systems, Inc., at http://www.cisco.com, accesd in 20.11.2004

4. Oprea, D., Protecţia şi securitatea informaţiilor, Ediţia a II-a, Ed. Polirom, 2007, p.116

5. There are two types of smart cards: contact cards and contactless cards

6. ***, Autentificarea utilizatorului folosind smartcardul, at http://www.ici.ro/ici/revista/ria2003_4/ art4.html, accessed in 13.03.2008

7. See Montgomery process at Motorola chips, Waleffe and Quisquater algorithms at Philips chips, Barrett method at Amtec chips.

8. ***, NEC Touch Pass - Network Access Control with Biometrics, Biometric Datasheet, at http://www.nec.co.uk, accessed in 29.05.2008

9. ***, The Biometric Consortium, at http://www.biometrics.org, accesed in 07.08.2008

10. ***, Here comes „behaviometric”, at http://www.sap.info, accessed in 23.07.2008

11. See legea nr. 676 din 21 noiembrie 2001 privind prelucrarea datelor cu caracter personal şi protecţia vieţii private în sectorul telecomunicaţiilor.

12. ***, Viitorul Digital, PC Magazine, noiembrie 2000

13. Muller, N. J., Wi-Fi for the Enterprise (McGraw-Hill Professional Publishing, Blacklick, 2003)

14. ***, The Wi-Fi Alliance, at http://www.wi-fi.org, accessed in 05.11.2006

15. Conti, J.P., The long road to WiMAX - wireless MAN standard, IEE Review, Volume 51, Issue 10, Oct. 2005

16. Constantinescu, R., „Telefonul fără fir” nu mai e de mult doar un joc al copilăriei. În cursa wireless câştigă utilizatorul, eFinance, aprilie 2005

17. Jindal, S., Jindal, A., Gupta, N., Grouping WI-MAX, 3G and WI-FI for wireless broadband, The First IEEE and IFIP International Conference in Central Asia on Internet, 2005, 26-29 Sept. 2005

18. Liangshan, M, Dongyan, J., The Competition and Cooperation of WiMAX, WLAN and 3G, The 2nd International Conference on Mobile Technology, Applications and Systems, 15-17 Nov. 2005

19. Behmann, F., Impact of Wireless (Wi-Fi, WiMAX) on 3G and Next Generation — An Initial Assessment, The IEEE International Conference on Electro Information Technology, 22-25 May 2005

20. Evans-Pughe, C., Bzzzz zzz - ZigBee wireless standard, IEE Review, Volume 49, Issue 3, March 2003

21. Shorey, R., Ananda, A., Chan, M. C, Wei, T. O. (editors), Mobile, Wireless, and Sensor Networks Technology, Applications, and Future Directions (John Wiley & Sons, Inc., New jersey, 2006)

22. Schoenberger, C. R., The Internet of Things, at www.forbes.com/global/2002/0318/092.html, accessed in 18.03.2002

23. Lai, F., Hutchinson, J., Zhang, G., Radio frequency identification (RFID) in China: opportunities and challenges, International Journal of Retail & Distribution Management, Year: 2005 Volume: 33 Issue: 12, Emerald Group Publishing Limited

24. ***, What the mousetrap said, A special report on telecom, The Economist, no. 17, 2007

25. ***, Wireless incorporated, A special report on telecom, The Economist, no. 17, 2007

26. Centrul de Expertiză şi Răspuns pentru Incidente de Securitate (CERIS), at http://www.ceris.ro, accessed in 26.05.2007

27. GECAD Group, at http://www.gecad.ro, accessed in 09.05.2005

28. ***, Integrated Concept for Security, from Security Policy to Physical Security - Siemens Business Services, Gartner Symposium - Florence March 10, 2003, corespondenţă e-mail

29.***, NIST Special Publication 800-27, Computer Security, at http://csrc.nist.gov/publications/nistpubs/800- 27/sp800-27.pdf, accessed in 06.09.2008

30. Oprea, D., Munteanu, A., Rusu, D., Probleme actuale ale securităţii în sistemele informaţionale, în Sisteme Informaţionale pentru Afaceri, Ed. Polirom, Iaşi, 2002, p.163

31. ***,Recomandări privind securitatea sistemelor TI pentru companii, Revista Start-Microsoft TechNet, Nr.7, Aprilie 2004, p.41

Back to the journal content
Creative Commons License
This article is licensed under a
Creative Commons Attribution-ShareAlike 4.0 International License.
Home | Editorial Board | Author info | Archive | Contact
Copyright JACSM 2007-2024