NCJ Number
194853
Journal
Law Enforcement Technology Volume: 29 Issue: 4 Dated: April 2002 Pages: 116,118,119
Date Published
April 2002
Length
3 pages
Annotation
This article considers security requirements on the Internet.
Abstract
Any Internet transaction with information that has any degree of sensitivity needs: (1) Identification--knowledge of who is on the other end of the electronic transaction; (2) Entitlements--knowledge of what the person is allowed to see; (3) Verification--a binding record of a transaction using technology such as digital certificates and digital receipts; (4) Privacy--a combination of technology and policy identifying who is allowed to see the information and under what conditions; and (5) Security management--administration for the above four. In addition to conventional security arrangements, the Internet has the benefits of enhanced Internet security. That system encrypts the data itself and applies a digital signature, which is tamper resistant and applied at the browser. Data encrypted by Entrust (of Dallas, TX) enhanced Internet security is persistent encryption so it stays encrypted when it is on the Web server. The Government of Canada has adopted Entrust’s technology as the standard for all Federal departments, including the Royal Canadian Mounted Police.