Policy For Accessing A System Term Paper

PAGES
3
WORDS
1148
Cite

This is done by embedding hidden information in data packets that are being conveyed over the TCP/IP link. The information is embedded in audio, video or even in pictures that are being sent over the link. Digital watermarking

Digital watermarking involves the use of steganographic techniques to effectively embed information into various documents. This is important for copywriting reasons by corporations. Digital watermarking is then used in embedding a company's copyright into the property of a company. This is then used in prosecuting pirates as well as digital thieves. The copyright or trademark information is embedded in the copyrighted image, audio or video files.

4. Name at least two different Information Assurance (IA) standards, each from a different standards organization. Summarize the standards and explain why they are important.

ETF RFC 2246.

This Information Assurance (IA) standard is used in securing web servers and is part of the TLS Protocol Version 1.0.

The TLS Protocol is employed in the encapsulation of other higher level protocols. An example of such protocols which is encapsulated is the TLS Handshake Protocol that is used in allowing the server as well as client to perform authentication of each other as well as to negotiate a special encryption algorithm as well as the use of cryptographic keys prior to transmission or receiving of data by the application protocol (Santesson, Nystrom & Polk, 2004) .

ITU-T Recommendation X.509 (2000)/ISO/IEC 9594-8:2001.

This is an Information Assurance (IA) standard used in defense messaging systems. It is used in the information technology as well as in the issuing of public and attribute certificates (ISO/IE,2002).

The importance of the ITU-T Recommendation X.509 (2000)/ISO/IEC 9594-8:2001 standard.

According to ITU (2009) the -ITU Recommendation X.509 (2000)/ISO/IEC 9594-8:2001 standard is used to define the framework for using public-key...

...

The framework includes the specifications of the data objects that are employed in the representation of the certificates that are issued as well as the revocation of these certificates. The public-key certificate framework is critical in the definition of certain critical components of the Public-key Infrastructure (PKI) as well as Privilege Management Infrastructure (PMI).

Sources Used in Documents:

References

Blyth, a ., Koyacic., G (2006).Information assurance: security in the information environment. Springer Science & Business,

Department of Defense (1999). INFORMATION ASSURANCE:Legal, Regulatory, Policy and Organizational Considerations,4th Edition. Accessed on 3/15/2012 at http://www.au.af.mil/au/awc/awcgate/jcs/ia.pdf

Dunbar, B (2002). A detailed look at Steganographic Techniques and their use in an Open-Systems Environment.SANS Institute. Accessed on 3/15/2012 at http://www.sans.org/reading_room/whitepapers/covert/detailed-steganographic-techniques-open-systems-environment_677

ISO/IEC (2002). Information technology -- Security techniques -- Security information objects for access control. ISO/IEC 15816. Accessed on 3/15/2012 at http://webstore.iec.ch/preview/info_isoiec15816%7Bed1.0%7Den.pdf
Qualified Certificates Profile. Accessed on 3/15/2012 at http://www.ietf.org/rfc/rfc3739.txt
International Telecommunication Union (2000). ITU-T X.509: SERIES X: DATA NETWORKS and OPEN SYSTEM COMMUNICATIONS. Accessed on 3/15/2012 at http://physik.uibk.ac.at/hephy/grid/project/x509.pdf


Cite this Document:

"Policy For Accessing A System" (2012, March 14) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/policy-for-accessing-a-system-55040

"Policy For Accessing A System" 14 March 2012. Web.19 April. 2024. <
https://www.paperdue.com/essay/policy-for-accessing-a-system-55040>

"Policy For Accessing A System", 14 March 2012, Accessed.19 April. 2024,
https://www.paperdue.com/essay/policy-for-accessing-a-system-55040

Related Documents

Access to Healthcare: For the last two decades, access to healthcare is an issue that has played a crucial role in leading the charge for health care reforms. Access to quality and comprehensive health care services is a crucial aspect for the realization of health equity and for enhancing the quality of health for every individual. Generally, the access to these services means the timely use of individual health services in

" (Tolone, Ahn, Pai, et al. 2005 P. 37). Table 1 provides the summary of the evaluation of various criteria mentioned in the paper. The table uses comparative terminology such as High, Medium and Low and, descriptive terminology such as Active, Passive, and Simple, and the standard Yes (Y) and No (N). The research provides the solutions based in the problems identified with the access controls evaluated. Table I: Evaluation of Access

Access to Health Care in USA This research paper focuses on the degree of accessibility to the health care services in the U.S.A. Accessibility refers to the ability of an individual to meet health care needs and to acquire the needed medical services on time. It then discusses the findings of the research. The suggestions for the elimination of the prevailing problems in the health care system are also given in

Policy Process: on LONG-TERM CARE Part II Policy Process 3292 Health care and nursing is more complex today than ever before. New technologies and ever-growing population demands a much more disciplined and organized health care industry (Abood, 2007). This is possible when there are policies, rules and regulations about medical procedures. The medical industry involves some policies today that a person could never imagine few centuries ago. For example there are policies

Policy Analysis Critique Rationale for the chosen policy Avian influenza is a virus causing lethal infection in human beings (Sims et al., 2003). It can be transmitted from patients to other human beings. It is a deadly virus with track record of 6 deaths in Hong Kong in 1997. That incident was just the start of this health issue. The virus spread enormously and caused H5N1 infection numerous times in Hong Kong.

Policy Analysis Critique - Hong Kong Health Care System Policy Analysis Critique: Hong Kong Health Care System The health care system in Hong Kong is believed to be one of the best in the world. The majority of people there live longer than people in many other developed nations, and the infant mortality rate is also very low. Those things show that people in Hong Kong are committed to their health and