Overview

security


Show Summary Details

Quick Reference

1. An asset or assets to which a lender can have recourse if the borrower defaults on the loan repayments. In the case of loans by banks and other moneylenders the security is sometimes referred to as collateral.

2. A financial asset, including shares, government stocks, debentures, bonds, unit trusts, and rights to money lent or deposited. It does not, however, include insurance policies. See also bearer security; dated security; fixed-interest security; gilt-edged security; listed security; marketable security.

3. In computing, measures used to prevent or protect against (a) access to information by unauthorized users or (b) unauthorized destruction or alteration of that information. Most security policies involve the use of both administrative controls (e.g. passwords) and dedicated software (e.g. firewalls and anti-virus programs). See also cyberliabilities.

4. Precautions taken in e-commerce to ensure that the following attributes are safeguarded:Authentication. Are parties to a transaction who they claim to be? This is achieved by using digital signatures.Privacy and confidentiality. Is transaction data protected? The consumer may want an anonymous purchase. Are all non-essential traces of a transaction removed from the public network and have all intermediary records been eliminated?Integrity. Are the messages sent complete? Checks are needed to ensure that messages have not been corrupted.Non-repudiability. Could the sender deny sending the message? It is essential measures are in place to protect against repudiation.Availability. How can threats to the continuity and performance of the system be eliminated?

Authentication. Are parties to a transaction who they claim to be? This is achieved by using digital signatures.

Privacy and confidentiality. Is transaction data protected? The consumer may want an anonymous purchase. Are all non-essential traces of a transaction removed from the public network and have all intermediary records been eliminated?

Integrity. Are the messages sent complete? Checks are needed to ensure that messages have not been corrupted.

Non-repudiability. Could the sender deny sending the message? It is essential measures are in place to protect against repudiation.

Availability. How can threats to the continuity and performance of the system be eliminated?

Subjects: Business and Management.


Reference entries

See all related reference entries in Oxford Index »


Users without a subscription are not able to see the full content. Please, subscribe or login to access all content.