ISYS111 Lecture Notes - Lecture 16: Virtual Private Network, Whitelist, Public Key Certificate
![](https://new-preview-html.oneclass.com/eGYVy4kJOE1BNEbxqYDAQ3MD7ngbxPrW/bg1.png)
• Encryption
c. Digital certificates
d. Virtual private network
e. Whitelisting and blacklisting
• Whitelisting is a process in which a company identifies the software that
it will allow to run. It does not try to recognise malware. Whitelisting
find more resources at oneclass.com
find more resources at oneclass.com
Document Summary
Encryption, digital certificates, virtual private network, whitelisting and blacklisting, whitelisting is a process in which a company identifies the software that it will allow to run. Independent and unbiased observers are called in to answer questions related to the security of a company during an information system audit. In an is environment, an adult is an examination of information systems, their inputs, outputs and processing. Business/employer: e-government: the use of the internet to disseminate information and public services to citizens, business partners and suppliers. Online direct marketing: manufacturers or retailers sell directly to customers, very efficient for digital products and. Product customisation: customers use the internet to self- configure products or services, sellers then price them and fulfil them quickly (build-to-order) Electronic marketplaces and exchanges: transactions are conducted efficiently (more information to buyers and sellers, lower transaction costs) in electronic marketplaces (private or public)