Driving safely on the information superhighway

Author: von Solms Rossouw  

Publisher: Emerald Group Publishing Ltd

ISSN: 1017-6748

Source: Asian Libraries, Vol.6, Iss.34, 1997-12, pp. : 150-154

Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.

Previous Menu Next

Abstract

Information technology (IT) has become part and parcel of the business world today. In fact, it will continue to become an even larger factor in the future. Organizations will interlink their IT systems as a result of linking to the Internet, electronic data interchange (EDI), electronic funds transfer at point of sale (EFTPoS), etc. All of this might hold an information security risk for an organization. Organizations attempt to secure their own IT environment, but they have little control over the IT systems they link with. If those external IT environments are insecure, they might pose a threat to the IT systems in the host environment. Organizations would like to obtain some proof that the IT systems of their business partners are secure before they link with their individual systems. Such proof can only be given through some security evaluation and certification process. Shows and explains the need for such a process.