Planning for Secure Transactions
How to maintain the confidentiality of information as it travels across the network? That is the question being asked by many who see how networking technology is making confidential data stored in institutional databases more and more accessible.
Equally important is how to verify that the individual receiving the information is really who they claim to be.
To ensure secure network transactions, many networking technologies (e.g., Kerberos, Single-Sign-On, and One Time Passwords) are being integrated into campus systems. I.T.'s Distributed Computing, Analysis and Support group is developing security programs for Banner, DaFIS, the Web and other campus projects.
|