Driving safely on the information superhighway
Information technology (IT) has become part and parcel of the business world today. In fact, it will continue to become an even larger factor in the future. Organizations will interlink their IT systems as a result of linking to the Internet, electronic data interchange (EDI), electronic funds transfer at point of sale (EFTPoS), etc. All of this might hold an information security risk for an organization. Organizations attempt to secure their own IT environment, but they have little control over the IT systems they link with. If those external IT environments are insecure, they might pose a threat to the IT systems in the host environment. Organizations would like to obtain some proof that the IT systems of their business partners are secure before they link with their individual systems. Such a proof can only be given through some security evaluation and certification process. Shows and explains the need for such a process.
No Reference information available - sign in for access.
No Citation information available - sign in for access.
No Supplementary Data.