

Author: von Solms Rossouw
Publisher: Emerald Group Publishing Ltd
ISSN: 1017-6748
Source: Asian Libraries, Vol.6, Iss.34, 1997-12, pp. : 150-154
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Information technology (IT) has become part and parcel of the business world today. In fact, it will continue to become an even larger factor in the future. Organizations will interlink their IT systems as a result of linking to the Internet, electronic data interchange (EDI), electronic funds transfer at point of sale (EFTPoS), etc. All of this might hold an information security risk for an organization. Organizations attempt to secure their own IT environment, but they have little control over the IT systems they link with. If those external IT environments are insecure, they might pose a threat to the IT systems in the host environment. Organizations would like to obtain some proof that the IT systems of their business partners are secure before they link with their individual systems. Such proof can only be given through some security evaluation and certification process. Shows and explains the need for such a process.
Related content


Driving safely on the information superhighway
Asian Libraries, Vol. 6, Iss. 3-4, 1997-03 ,pp. :


On the threshold of the information superhighway
New Library World, Vol. 96, Iss. 6, 1995-06 ,pp. :


Potential Liability on the Information Superhighway
Technical Communication, Vol. 43, Iss. 2, 1996-05 ,pp. :




US information superhighway: an in-depth analysis
By Wodzisz Christopher Lee Sooun Yen David C
New Library World, Vol. 97, Iss. 6, 1996-06 ,pp. :