Security management of electronic data interchange
Butler, Jon T.
MetadataShow full item record
This thesis considers the security management issue of electronic data interchange (EDI) and the security tools that are used for secure EDI implementation. Management considerations of EDI are considered to be an integration of EDI and security services. The background of EDI is surveyed along with EDI implementation procedures and Digital Signature (DS) techniques. The security services that are being used today are discussed in Chapter 5 including the EDI-related security standards. Finally, a security management model is presented that may be used to improve the security of an EDI implementation. The model is based on the perceived threats and vulnerabilities to the EDI, and the availability of security services and mechanisms. Included in the model are the setting of security goals, the determination of security policies, the determination of priorities for EDI security, and the construction of security architecture and management activities. This thesis was written to survey the concepts of EDI and DS. ne survey of EDI related security standards may provide an opportunity to understand security services and security mechanisms available when designing an EDI system. Also, the security management model may help to improve the security of an organization
Approved for public release; distribution is unlimited
Showing items related by title, author, creator and subject.
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2007-09);September 2007. Six years after the attacks of 9/11, the practice and discipline of homeland defense and security have evolved and matured, moving into an era of self-evaluation. The essays and articles in Volume III, Issue ...
Naval Postgraduate School Center for Homeland Defense and Security (CHDS) (Monterey, California. Naval Postgraduate SchoolCenter for Homeland Defense and Security, 2005-09);September 2005. Welcome to the second issue of Homeland Security Affairs. The central theme is Hurricane Katrina. We also offer articles about critical infrastructure protection and capabilities based planning. One of ...
Denning, Peter J.; Lipner, Steve (Association for Computing Machinery (ACM), 2012-05);Editor's Introduction: Protecting computing systems and networks from attackers and data theft is an enormously complicated problem. The individual operating systems are complex (typically more than 40 million lines of ...