The IT Law Wiki
No edit summary
(Adding categories)
 
(3 intermediate revisions by the same user not shown)
Line 1: Line 1:
== Online transactions ==
+
== Definition ==
   
  +
=== E-commerce ===
{{Quote|[[Online transaction]]s are '''secure''' if the [[implementation]] mechanisms meet their predefined [[security objective]]s of correctly [[authenticating]] the parties to the [[transaction]], prevent [[unauthorized access]] and release of [[data]], assure [[availability]], faithfully conduct and record any negotiation, and preserve [[confidentiality]] and [[integrity]] of [[information]]. Pre-defined [[security objective]]s vary widely depending on the need.<ref>The White House, (Draft) National Strategy for Trusted Identities in Cyberspace: Creating Options for Enhanced Online Security and Privacy 34 (June 25, 2010).[http://www.nstic.ideascale.com]</ref>}}
 
  +
 
{{Quote|[[Online transaction]]s are '''secure''' if the [[implementation]] mechanisms meet their predefined [[security objective]]s of correctly [[authenticating]] the parties to the [[transaction]], prevent [[unauthorized access]] and release of [[data]], assure [[availability]], faithfully conduct and record any negotiation, and preserve [[confidentiality]] and [[integrity]] of [[information]]. Pre-defined [[security objective]]s vary widely depending on the need.<ref>[[National Strategy for Trusted Identities in Cyberspace]], at 34.</ref>}}
   
 
== Telecommunications ==
 
== Telecommunications ==
Line 10: Line 12:
 
<references />
 
<references />
 
[[Category:Security]]
 
[[Category:Security]]
  +
[[Category:Definition]]

Latest revision as of 21:21, 6 April 2018

Definition[]

E-commerce[]

Online transactions are secure if the implementation mechanisms meet their predefined security objectives of correctly authenticating the parties to the transaction, prevent unauthorized access and release of data, assure availability, faithfully conduct and record any negotiation, and preserve confidentiality and integrity of information. Pre-defined security objectives vary widely depending on the need.[1]

Telecommunications[]

Secure is “a relative term that refers to how difficult and costly it is to gain unauthorized access to a communication. The more difficult and costly it is, the more secure a communication is.”[2]

References[]

  1. National Strategy for Trusted Identities in Cyberspace, at 34.
  2. I. Trotter Hardy, Project Looking Forward: Sketching the Future of Copyright in a Networked World 61 (May 1998).