Page 213 - DCAP309_INFORMATION_SECURITY_AND_PRIVACY
P. 213

Unit 14: Web Services and Privacy




          Another area of issue is the idea of non-repudiation of origin and content, a term you will locate  Notes
          in many EDI documents. Non-repudiation is a grand title for the idea that at some point in the
          coming days one of the parties to a transaction might deny having accomplished the transaction.
          On the other hand, one of the parties to a transaction might recognize that the  transaction
          occurred but dispute a particular detail of that transaction.


                 Example: Having purchased 100,000 shares of a stock that consequently lost value, party
          A might effort to declare that the transaction was for only 100 shares.
          In many industries and geographies there are governmental regulations that need the keeping
          of records for lengthy periods to adjudicate such disputes.
          In this view the auditing issue we introduced earlier should offer the required capabilities to
          accumulate messages. While auditing alone does not essentially suffice for the purposes of non-
          repudiation, auditing of the message exchange (proof of content) along with validation (proof
          of origin) usually does offer the necessary level of proof.

          Self Assessment


          Fill in the blanks:
          11.  ........................ is a method of designing software to offer  services to  applications, or to
               other services, via published and discoverable interfaces.

          12.  System architects employ either domain-particular languages or profiles for ........................
               to model the issues of the service domain.
          13.  Business stakeholders are based on the  IT organization to offer  ........................ to their
               business needs.
          14.  The ........................ domain frequently appears to be an afterthought in the development of
               many IT applications.
          15.  A message or document that has data integrity is considered to be ......................... .
          16.  ........................ is a grand title for the idea that at some point in the coming days one of the
               parties to a transaction might deny having accomplished the transaction.

             


             Caselet     Cloud Computing for Banking

                   omputing through the cloud offers new ways of doing business. Choosing a private,
                   public, or a hybrid of private, public and community clouds should create new
             Cbusiness models to conduct  business in a highly competitive finance industry.
             Internet-based cloud IT solutions provide not only enormous cost reduction in infrastructure
             and operating expenditure, but also enable flexibility, agility and ability to scale up or
             down as per the needs of a business and its affordability.
             Banking Sector

             Emerging cloud services for banks aim at enhancing productivity by facilitating real time
             collaboration, being omnipresent and providing virtualisation. Cloud-based services help
             in knowing  the customers’ preference by  social networking  interfaces and  focussing
             on better customer relations, human relations and finance management, helping the banks
                                                                                 Contd...



                                           LOVELY PROFESSIONAL UNIVERSITY                                   207
   208   209   210   211   212   213   214   215   216   217