In addition, the incorporation of Common Access Cards and Email security technologies will further provide a boost to information security. Theses added security technologies will result in investors’ confidence, better productivity and more efficient identify management.
CRYPTOGRAPHY 12 References Chandramouli, R., & Lee, P. (2007). Infrastructure Standards for Smart ID Card Deployment. IEEE Security and Privacy Magazine , 5 (2), 92–96. Cosgrove, A. (2018, May 21). Five steps to building your email security strategy. Retrieved March 7, 2019, from Information Protection vs. Information Assurance: Differentiating Between Two Critical IT Functions. (2018, September 11). Retrieved March 4, 2019, from - differentiating-between-two-critical-it King, C. (2003, October 14). The Role of Identity Management in Information Security: Part 1 - The Planning View. Retrieved March 3, 2019, from - role-of-identity-management-in-information-security-part-1-the-planning-view/ Martin, J. A. (2018, February 5). What is access control? A key component of data security. Retrieved March 3, 2019, from - access-control-a-key-component-of-data-security.html Scholl, K. (2010). E-mail Security: An Overview of Threats and Safeguards. Journal of AHIMA , 81 (4), 28–30. Retrieved from tutorialspoint.com. (2019). Cryptography Benefits and Drawbacks. Retrieved March 8, 2019, from What is Cryptography? | Synopsys. (2019). Retrieved March 4, 2019, from - database/cryptography.html
CRYPTOGRAPHY 13 What is common access card (CAC)? - Definition from WhatIs.com. (2019). Retrieved March 5, 2019, from
You've reached the end of your free preview.
Want to read all 13 pages?
- Fall '19
- Public key infrastructure, Public-key cryptography, Pretty Good Privacy, IT Systems, GNU Privacy Guard