The 9th International Conference for Internet Technology and Secured Transactions (ICITST-2014) 2014
DOI: 10.1109/icitst.2014.7038813
|View full text |Cite
|
Sign up to set email alerts
|

Security audit of data flows across enterprise systems and networks

Abstract: Enterprise IT environments are heterogeneous and complex with dozens of important software components running on each server and exchanging data with other servers, point of sale terminals, kiosks, door locks, workstations, and other systems. It is necessary to identify and document critical data flows across these systems and networks and create and verify corresponding security perimeters. Thus, newly adopted payment card industry data security standard version 3 requires data flows documentation across syst… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
0
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
1
1

Relationship

0
2

Authors

Journals

citations
Cited by 2 publications
(1 citation statement)
references
References 19 publications
(15 reference statements)
0
0
0
Order By: Relevance
“…Security and privacy features of e-banking must be improved quickly to continue its growth. The use of electronic banking services has raised many concerns from different perspectives: government, businesses [3], banks [4], individuals and technology. It will therefore be interesting to set up security for data protection.…”
Section: Introductionmentioning
confidence: 99%
“…Security and privacy features of e-banking must be improved quickly to continue its growth. The use of electronic banking services has raised many concerns from different perspectives: government, businesses [3], banks [4], individuals and technology. It will therefore be interesting to set up security for data protection.…”
Section: Introductionmentioning
confidence: 99%