We are increasingly reliant on the use of IT systems in our normal day- to-day business and personal activities. It is of paramount importance that these systems are sufficiently secure to protect sensitive, valuable and private data, and associated storage, communications and transactions. Therefore, the design and use of such systems should be in accordance with best practices for information security that have been developed by industry, government and the worldwide expert community. This chapter emphasises the need for system security and goes on to explain technical choices such as algorithms, key size and trust management, and concludes with a real-world case study.
CITATION STYLE
Mayes, K., & Markantonakis, K. (2014). Information security best practices. In Secure Smart Embedded Devices, Platforms and Applications (Vol. 9781461479154, pp. 119–144). Springer New York. https://doi.org/10.1007/978-1-4614-7915-4_6
Mendeley helps you to discover research relevant for your work.