Information Technology Reference
In-Depth Information
you that when you do come across it as users and try to buy something on the Internet,
the first thing that will come up is a request for you to register so that you can use the
more secure, visa-secure system. It is against your interest as a user to register as it is in
the interest of Visa; it is in the interest of the merchant against your interest as a user. At
the minute that you register and perform transactions using the visa-secure system, Visa
considers this as a card-present transaction. This is similar to you going to a shop and
using your card. If you want to deny the transaction it is a lot more complicated than
making a phone call, giving your Visa number and then calling Visa and denying the
transaction. If it is not a card-present transaction you can always say deny it and in that
minute the transaction is cancelled. As soon as you have a card-present transaction, you
are actually libel in the same manner as when you go to the shop and use your credit
card. So I am expanding a little bit on what you ask, but it is just an example of
sometimes having security that is not always to the benefit of everyone. But I certainly
believe that things are improving at a very rapid pace. How do you actually manage
privacy in a proper way? I think that you can look at the digital signature solution that I
gave you which also provides the same encryption solutions. When people ask me about
it I say I am trying to focus now on the digital signature, but I do believe that by dividing
and conquering and looking at the problems separately, it is possible to solve the
problems one at a time. And it is possible to provide an encryption system and a digital
signature system that is properly PKI-based and eventually manageable.
Erez : I do not understand all the technologies. First of all security is always a
question whatever field we are discussing. People responsible in any organisation always
question whether the investment in security is worthwhile and what the outcome will be
from preventing any event due to these security measures. So security is not a profitable
investment. We have discussed vulnerability, let us say, in the infrastructure assets of a
nation, its electricity management, its water management and its air traffic control. Are
these solutions not specifically Co-sign? This trend of technology needs to make any
authentication or any signing by connecting yourself to any of these infrastructures in a
way that protects national infrastructures and prevents any unauthorised penetration of
the infrastructures. I remember Microsoft in the US decided not to allow “chatting”
without giving personal details in order to prevent people disguising themselves as
someone else; the idea was especially to prevent children from abuse and the use of the
Internet for criminality. This is why we are in the trend of protecting your assets from
criminal penetration.
Aharoni : I was referring to the general question of organisations. This includes
military organisations, infrastructure, electricity and water supplies, etc. From the
technical point of view, all organisations look the same. From a financial point of view
unfortunately, the financial organisations are always more attractive than the
infrastructure as they have more money to spend. And they are more protective of their
assets and this is why lots of financial organisations were and still are prepared to spend
more money on more complex solutions. I think that by making security solutions
simpler it actually makes it easier for various government organisations and various
infrastructure organisations to deploy these solutions. What I was trying to say is that
when people design and deploy security solutions today, if they are responsible for
deploying security solutions in their enterprises, if they are vendors and produce security
solutions for their customers, if people are responsible for standards, I think that it is
Search WWH ::




Custom Search