Mission: Encrypted
Securing information technology is a complex task. Internet security, online transaction privacy, e-mail encryption, corporate Intranet integrity and data loss prevention are the most common IT security thrusts. The many facets of each of these issues complicated the tasks associated with securing related information.
Some industry experts opine that government should lead the embrace of IT security validity. Others argue that industries should be left alone to set their own IT security standards, fearing that government interference will over-regulate businesses.
The Internet Alliance urged G8 countries to adopt what it calls "proper roles of law enforcement, industry and consumers." An IA spokesperson identified "the most crucial task" regarding IT security -- enhancing lawful cooperation between industry and law enforcement when addressing online crime.
The Global Internet Project, however, warned against government regulation. Instead, it suggests that businesses and organizations improve their physical security, institute company policies, frequently update anti-virus software, and audit computer system security.
Despite popular opinions against government interference, the U. S. government has taken a step to ensure widespread confidence in information technology. Last month, the House passed legislation that would give electronic signatures the same legal status as handwritten signatures on paper. House Commerce Chairman Tom Bliley, R-Va., told the Associated Press that the bill "will further move us from the paper age to the digital age," allowing people to conduct business online. At press time, the Senate had passed the bill and it was waiting for the president's signature
Editorial associate publisher and Washington correspondent de facto Ralph Jensen explains the law in "Legislative Report" on page 26. According to the Associated Press, "the measure is the result of months of negotiations among the House, Senate and the administration on how best to move business transactions into the electronic age without sacrificing consumer protections."
The idea behind the legislation is simple: This law should pave the way for business to make more money. Online transactions are becoming fairly commonplace in consumer markets, but consumers are mostly sticking with travel reservations, books, CDs, and computer hardware and software. To allow consumers to purchase high-dollar items such as houses, businesses and cars over the Internet, the transactions must be legally binding.
Larger, legally binding business-to-consumer transactions online will ultimately benefit businesses whose clientele is mostly other businesses. The law also benefits those businesses, as John Garber mentions in his article, "Data Defense" on page 38. According to Garber, B2B transactions are projected to reach $1.8 trillion by 2003. Similarly, AP reported that "The bill would set national legal standards for e-commerce that is expected to triple from $500 billion last year to some $1.6 trillion by 2003."
In anticipation of businesses' security needs, a communication and information technology company, and a network security software manufacturer have entered into a partnership agreement to "offer solutions for network security and data protection of Internet transactions." The Amsterdam-based effort is aimed at security management of B2B e-commerce data protection from snoopers, hacker attacks and industrial espionage. This partnership is only one example of countless such partnerships that are forming as you read.
Other companies are cashing in on the need for secure transactions by providing other means of secure communications. For example, a recent AP report titled "Don't Write Off the Fax Yet" cites soaring fax machine sales to understand why we do not yet live in a paperless society. The report states that more than 6.6 million fax machines were sold last year -- up 16.5 percent from the year before.
"By 2004, the number of sheet-fed fax machines sold is anticipated to rise to more than 8.4 million, during which time the average cost of a fax machine is expected to fall by more than a third, to $240 from $364," the report states.
The steady growth of facsimile popularity raises another security issue: preventing transmission interception and eavesdropping. Secure facsimile products are readily available for business and field applications. I came across one such product recently, described as a "rugged secure fax designed from the ground up to operate in harsh military environments while providing photographic-quality imagery."
For uses not requiring the armored car of fax machines, business fax machines can use encryption products similar to phone line protection. Fax operation utilizes a security code that provides receiver authentication before any message is sent. According to one manufacturer, "Encryption of the fax signal ensures both privacy and integrity of the transmission. Any eavesdropping attempt using another encryption unit will stop the fax handshaking process."
Communication-securing devices and other IT security technologies promise to remain in high demand. Consumers will continue to conduct their lives online, and businesses will continue to follow their lead. The security industry stands to make a profit -- and a difference -- in the way people and organizations do business.
This article originally appeared in the August 2000 issue. Copyright Stevens Publishing. View magazine archive.