Paper title: |
Securing the Digital Economy |
Published in: | Issue 1, (Vol. 4) / 2010 |
Publishing date: | 2010-03-30 |
Pages: | 44-48 |
Author(s): | Valentin P. Mazareanu, Alina Marin |
Abstract. | The Digital economy has naturally led to the reconfiguration of communication and information processes. These processes are depending on the computer, starting from the personal one and reaching to computer networks, whether local, metropolitan or global. These led to the development of such information systems able to communicate information, systems that must also ensure the security of communications between computers within the company, but also between computers of different parties, outside the company. As the communication between computers in the network has evolved to electronic funds transfer (EFT), digital money and communication of personal data, internet banking, etc., the importance of security issues of data transmitted over the network also has increased. Even more as the network has evolved into a “wireless” one. |
Keywords: | Information Security, Cybercrime. |
References: | 1. Wespi, A., Securing your e-business by managing the inherent IT security risks in Abderrahim, L. (editor), Handbook of integrated risk management for ebusiness: measuring, modelling and managing risk, Ed. Ross Publishing, Boca Raton, 2003, pp.116-118 2. Tulloch, M., Microsoft Encyclopedia of Security, Ed. Microsoft Press, Redmond, 2003, p.296 3. ***, Action steps for improving information security, Cisco Systems, Inc., at http://www.cisco.com, accesd in 20.11.2004 4. Oprea, D., Protecţia şi securitatea informaţiilor, Ediţia a II-a, Ed. Polirom, 2007, p.116 5. There are two types of smart cards: contact cards and contactless cards 6. ***, Autentificarea utilizatorului folosind smartcardul, at http://www.ici.ro/ici/revista/ria2003_4/ art4.html, accessed in 13.03.2008 7. See Montgomery process at Motorola chips, Waleffe and Quisquater algorithms at Philips chips, Barrett method at Amtec chips. 8. ***, NEC Touch Pass - Network Access Control with Biometrics, Biometric Datasheet, at http://www.nec.co.uk, accessed in 29.05.2008 9. ***, The Biometric Consortium, at http://www.biometrics.org, accesed in 07.08.2008 10. ***, Here comes „behaviometric”, at http://www.sap.info, accessed in 23.07.2008 11. See legea nr. 676 din 21 noiembrie 2001 privind prelucrarea datelor cu caracter personal şi protecţia vieţii private în sectorul telecomunicaţiilor. 12. ***, Viitorul Digital, PC Magazine, noiembrie 2000 13. Muller, N. J., Wi-Fi for the Enterprise (McGraw-Hill Professional Publishing, Blacklick, 2003) 14. ***, The Wi-Fi Alliance, at http://www.wi-fi.org, accessed in 05.11.2006 15. Conti, J.P., The long road to WiMAX - wireless MAN standard, IEE Review, Volume 51, Issue 10, Oct. 2005 16. Constantinescu, R., „Telefonul fără fir” nu mai e de mult doar un joc al copilăriei. În cursa wireless câştigă utilizatorul, eFinance, aprilie 2005 17. Jindal, S., Jindal, A., Gupta, N., Grouping WI-MAX, 3G and WI-FI for wireless broadband, The First IEEE and IFIP International Conference in Central Asia on Internet, 2005, 26-29 Sept. 2005 18. Liangshan, M, Dongyan, J., The Competition and Cooperation of WiMAX, WLAN and 3G, The 2nd International Conference on Mobile Technology, Applications and Systems, 15-17 Nov. 2005 19. Behmann, F., Impact of Wireless (Wi-Fi, WiMAX) on 3G and Next Generation — An Initial Assessment, The IEEE International Conference on Electro Information Technology, 22-25 May 2005 20. Evans-Pughe, C., Bzzzz zzz - ZigBee wireless standard, IEE Review, Volume 49, Issue 3, March 2003 21. Shorey, R., Ananda, A., Chan, M. C, Wei, T. O. (editors), Mobile, Wireless, and Sensor Networks Technology, Applications, and Future Directions (John Wiley & Sons, Inc., New jersey, 2006) 22. Schoenberger, C. R., The Internet of Things, at www.forbes.com/global/2002/0318/092.html, accessed in 18.03.2002 23. Lai, F., Hutchinson, J., Zhang, G., Radio frequency identification (RFID) in China: opportunities and challenges, International Journal of Retail & Distribution Management, Year: 2005 Volume: 33 Issue: 12, Emerald Group Publishing Limited 24. ***, What the mousetrap said, A special report on telecom, The Economist, no. 17, 2007 25. ***, Wireless incorporated, A special report on telecom, The Economist, no. 17, 2007 26. Centrul de Expertiză şi Răspuns pentru Incidente de Securitate (CERIS), at http://www.ceris.ro, accessed in 26.05.2007 27. GECAD Group, at http://www.gecad.ro, accessed in 09.05.2005 28. ***, Integrated Concept for Security, from Security Policy to Physical Security - Siemens Business Services, Gartner Symposium - Florence March 10, 2003, corespondenţă e-mail 29.***, NIST Special Publication 800-27, Computer Security, at http://csrc.nist.gov/publications/nistpubs/800- 27/sp800-27.pdf, accessed in 06.09.2008 30. Oprea, D., Munteanu, A., Rusu, D., Probleme actuale ale securităţii în sistemele informaţionale, în Sisteme Informaţionale pentru Afaceri, Ed. Polirom, Iaşi, 2002, p.163 31. ***,Recomandări privind securitatea sistemelor TI pentru companii, Revista Start-Microsoft TechNet, Nr.7, Aprilie 2004, p.41 |
Back to the journal content |