Verified Document

Policy For Accessing A System Term Paper

This is done by embedding hidden information in data packets that are being conveyed over the TCP/IP link. The information is embedded in audio, video or even in pictures that are being sent over the link. Digital watermarking

Digital watermarking involves the use of steganographic techniques to effectively embed information into various documents. This is important for copywriting reasons by corporations. Digital watermarking is then used in embedding a company's copyright into the property of a company. This is then used in prosecuting pirates as well as digital thieves. The copyright or trademark information is embedded in the copyrighted image, audio or video files.

4. Name at least two different Information Assurance (IA) standards, each from a different standards organization. Summarize the standards and explain why they are important.

ETF RFC 2246.

This Information Assurance (IA) standard is used in securing web servers and is part of the TLS Protocol Version 1.0.

The TLS Protocol is employed in the encapsulation of other higher level protocols. An example of such protocols which is encapsulated is the TLS Handshake Protocol that is used in allowing the server as well as client to perform authentication of each other as well as to negotiate a special encryption algorithm as well as the use of cryptographic keys prior to transmission or receiving of data by the application protocol (Santesson, Nystrom & Polk, 2004) .

ITU-T Recommendation X.509 (2000)/ISO/IEC 9594-8:2001.

This is an Information Assurance (IA) standard used in defense messaging systems. It is used in the information technology as well as in the issuing of public and attribute certificates (ISO/IE,2002).

The importance of the ITU-T Recommendation X.509 (2000)/ISO/IEC 9594-8:2001 standard.

According to ITU (2009) the -ITU Recommendation X.509 (2000)/ISO/IEC 9594-8:2001 standard is used to define the framework for using public-key...

The framework includes the specifications of the data objects that are employed in the representation of the certificates that are issued as well as the revocation of these certificates. The public-key certificate framework is critical in the definition of certain critical components of the Public-key Infrastructure (PKI) as well as Privilege Management Infrastructure (PMI).
References

Blyth, a ., Koyacic., G (2006).Information assurance: security in the information environment. Springer Science & Business,

Department of Defense (1999). INFORMATION ASSURANCE:Legal, Regulatory, Policy and Organizational Considerations,4th Edition. Accessed on 3/15/2012 at http://www.au.af.mil/au/awc/awcgate/jcs/ia.pdf

Dunbar, B (2002). A detailed look at Steganographic Techniques and their use in an Open-Systems Environment.SANS Institute. Accessed on 3/15/2012 at http://www.sans.org/reading_room/whitepapers/covert/detailed-steganographic-techniques-open-systems-environment_677

ISO/IEC (2002). Information technology -- Security techniques -- Security information objects for access control. ISO/IEC 15816. Accessed on 3/15/2012 at http://webstore.iec.ch/preview/info_isoiec15816%7Bed1.0%7Den.pdf

Johnson, NF (1995) Steganography. Technical Report. November 1995.

Khanafer, a.,Saad, W.,Ba-ar, T., and Debbah, M., (2012) Competition in femtocell networks: strategic access policies in the uplink. Proc. IEEE International Conf. Communications (ICC 2012) - Wireless Networks Symposium ('ICC'12 WN'), Ottawa, Canada, June 10-15, 2012.

Santesson, S.,Nystrom, M., & Polk, T (2004). Internet X.509 Public Key Infrastructure:

Qualified Certificates Profile. Accessed on 3/15/2012 at http://www.ietf.org/rfc/rfc3739.txt

International Telecommunication Union (2000). ITU-T X.509: SERIES X: DATA NETWORKS and OPEN SYSTEM COMMUNICATIONS. Accessed on 3/15/2012 at http://physik.uibk.ac.at/hephy/grid/project/x509.pdf

Sources used in this document:
References

Blyth, a ., Koyacic., G (2006).Information assurance: security in the information environment. Springer Science & Business,

Department of Defense (1999). INFORMATION ASSURANCE:Legal, Regulatory, Policy and Organizational Considerations,4th Edition. Accessed on 3/15/2012 at http://www.au.af.mil/au/awc/awcgate/jcs/ia.pdf

Dunbar, B (2002). A detailed look at Steganographic Techniques and their use in an Open-Systems Environment.SANS Institute. Accessed on 3/15/2012 at http://www.sans.org/reading_room/whitepapers/covert/detailed-steganographic-techniques-open-systems-environment_677

ISO/IEC (2002). Information technology -- Security techniques -- Security information objects for access control. ISO/IEC 15816. Accessed on 3/15/2012 at http://webstore.iec.ch/preview/info_isoiec15816%7Bed1.0%7Den.pdf
Qualified Certificates Profile. Accessed on 3/15/2012 at http://www.ietf.org/rfc/rfc3739.txt
International Telecommunication Union (2000). ITU-T X.509: SERIES X: DATA NETWORKS and OPEN SYSTEM COMMUNICATIONS. Accessed on 3/15/2012 at http://physik.uibk.ac.at/hephy/grid/project/x509.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

System Security Every Organization Which
Words: 2884 Length: 9 Document Type: Thesis

Attacks on the system security include password theft, back doors and bugs, social engineering, protocol failures, authentication failures, Denial of Service attacks, active attacks, botnets, exponential attacks including worms and viruses, and information leakage. (Fortify Software Inc., 2008); (Fortify Software, n. d.) Servers are targets of security attacks due to the fact that servers contain valuable data and services. For instance, if a server contains personal information about employees, it

Policy Formulation in a World
Words: 5010 Length: 12 Document Type: Term Paper

This balkanization is partially driven by the lack of integration between various segments of itself, and this is primarily a technological limitation. Yet the far broader and more difficult challenge in this regard is the segregating of knowledge not just for profit, but for lasting competitive advantage between nations. On the one hand there is the need for competitive differentiation in company's offerings, yet in others including the sharing

Policy Evaluation in Forgotten Australians:
Words: 1794 Length: 6 Document Type: Essay

One of the important elements of those recommendations is that care leavers be given open and free access to their own records (Australian Senate, 2004). They also suggest that the government establish counseling for care leavers and their families to deal with the impact of life in care, including specialized education for mental health professionals so that they are in a position for dealing with this problem (Australian Senate,

Policy Making and Stakeholders
Words: 1549 Length: 5 Document Type: Term Paper

Root Cause Analysis PolicyPOLICYIn the furtherance of achieving the goal of improvement in patient safety and its quality, it is the policy of Pikeville Medical Center (PMC) to make use of the Patient Safety Evaluation System (PSES) to collect, analyze, and submitting information about patient safety events to a Patient Safety Organization (PSO). The specific patient safety event for addressing the sentinel event of discharge of an infant to the

Accessing Basic Public Services
Words: 1596 Length: 5 Document Type: Essay

Accessing Government Services in Africa: House hold services (piped water, electricity telephone), public education public health. Hospitals with nurses; classes with teachers; functioning toilets and running taps: these things are all distant delusions for a huge population of individuals living in the developing nations across the world. These essential public services (water, good hygiene, health, and education) are the solutions to changing the lives of those individuals dwelling in poverty.

Global Health Trends and Policy and Politics
Words: 4532 Length: 13 Document Type: Essay

Policy, Politics and Global Trends in Health Sector Why the Public Policy Issue Was Chosen? According to the report released by National Priorities and Goals -- aligning efforts meant to transform America's Health care (NQF, 2009; Partnership, 2008). NPP (National Priorities Partnership) came up with 6 priorities. If the priorities are addressed, it could improve the quality of health care delivered to the U.S. citizens. NPP consists of 48 major U.S. health

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now