Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    ISBN: 9789264025516
    Language: English
    Pages: Online-Ressource (132 p.)
    Series Statement: OECD Reviews of Risk Management Policies
    Parallel Title: Erscheint auch als Norway
    RVK:
    RVK:
    Keywords: Datensicherheit ; Norwegen ; Science and Technology ; Norway ; Norwegen ; Computersicherheit ; Internet ; Datenschutz ; Innere Sicherheit
    Abstract: The development of information and communication technologies and networks, and in particular that of the Internet, has gone hand in hand with the emergence of new types of malevolent actions called cyber-crime: viruses, worms, Trojan horses, and the like. While a number of factors make a strong case for governmental action in the area of information security, there are also important limits to what governments can achieve. This review, the first in a series of risk management policy reviews being conducted by the OECD, identifies areas of good practice in Norway's policies for information security, as well as areas where improvements could be made. For areas that could benefit from improvement, it proposes opportunities for action and, when possible, suggests alternatives.
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
  • 2
    ISBN: 9789264162426
    Language: English
    Pages: Online-Ressource (40 p)
    Parallel Title: Druckausg.
    Parallel Title: Parallelausg. La politique de cryptographie ; les lignes directrices et les questions actuelles ; Les lignes directrices régissant la politique de cryptographie de l'OCDE et le rapport sur la politique de cryptographie ; contexte et questions actuelles
    Parallel Title: Druckausg. Organisation for Economic Co-Operation and Development Cryptography policy
    RVK:
    Keywords: Datensicherheit ; OECD-Staaten ; Science and Technology
    Abstract: Cryptography is one of the technological means to provide security for data on information and communications systems. It can be used to protect the confidentiality of data, such as financial or personal data, whether that data is in storage or in transit. Cryptography can also be used to verify the integrity of data by revealing whether data has been altered and identifying the person or device that sent it. These techniques are critical to the development and use of national and global information and communications networks and technologies, as well as the development of electronic commerce. This book includes the Recommendation of the OECD Council concerning Guidelines for Cryptography Policy, the text of the Guidelines itself, and a report which explains the context for the guidelines and the basic issues involved in the cryptography policy debate.
    Note: Franz. Ausg. u.d.T.: La politique de cryptographie
    Library Location Call Number Volume/Issue/Year Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...