ISYS111 Lecture Notes - Lecture 16: Virtual Private Network, Whitelist, Public Key Certificate

15 views4 pages
Encryption
c. Digital certificates
d. Virtual private network
e. Whitelisting and blacklisting
Whitelisting is a process in which a company identifies the software that
it will allow to run. It does not try to recognise malware. Whitelisting
find more resources at oneclass.com
find more resources at oneclass.com
Unlock document

This preview shows page 1 of the document.
Unlock all 4 pages and 3 million more documents.

Already have an account? Log in

Document Summary

Encryption, digital certificates, virtual private network, whitelisting and blacklisting, whitelisting is a process in which a company identifies the software that it will allow to run. Independent and unbiased observers are called in to answer questions related to the security of a company during an information system audit. In an is environment, an adult is an examination of information systems, their inputs, outputs and processing. Business/employer: e-government: the use of the internet to disseminate information and public services to citizens, business partners and suppliers. Online direct marketing: manufacturers or retailers sell directly to customers, very efficient for digital products and. Product customisation: customers use the internet to self- configure products or services, sellers then price them and fulfil them quickly (build-to-order) Electronic marketplaces and exchanges: transactions are conducted efficiently (more information to buyers and sellers, lower transaction costs) in electronic marketplaces (private or public)

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents