Policy for Accessing a System Term Paper

Total Length: 1148 words ( 4 double-spaced pages)

Total Sources: 6

Page 1 of 4

This is very important in the securing of communication taking place over the open systems like the internet. This is done by embedding hidden information in data packets that are being conveyed over the TCP/IP link. The information is embedded in audio, video or even in pictures that are being sent over the link.

Digital watermarking

Digital watermarking involves the use of steganographic techniques to effectively embed information into various documents. This is important for copywriting reasons by corporations. Digital watermarking is then used in embedding a company's copyright into the property of a company. This is then used in prosecuting pirates as well as digital thieves. The copyright or trademark information is embedded in the copyrighted image, audio or video files.

4. Name at least two different Information Assurance (IA) standards, each from a different standards organization. Summarize the standards and explain why they are important.

ETF RFC 2246.

This Information Assurance (IA) standard is used in securing web servers and is part of the TLS Protocol Version 1.0.

The TLS Protocol is employed in the encapsulation of other higher level protocols. An example of such protocols which is encapsulated is the TLS Handshake Protocol that is used in allowing the server as well as client to perform authentication of each other as well as to negotiate a special encryption algorithm as well as the use of cryptographic keys prior to transmission or receiving of data by the application protocol (Santesson, Nystrom & Polk, 2004) .

ITU-T Recommendation X.509 (2000)/ISO/IEC 9594-8:2001.

This is an Information Assurance (IA) standard used in defense messaging systems. It is used in the information technology as well as in the issuing of public and attribute certificates (ISO/IE,2002).
The importance of the ITU-T Recommendation X.509 (2000)/ISO/IEC 9594-8:2001 standard.

According to ITU (2009) the -ITU Recommendation X.509 (2000)/ISO/IEC 9594-8:2001 standard is used to define the framework for using public-key certificate. The framework includes the specifications of the data objects that are employed in the representation of the certificates that are issued as well as the revocation of these certificates. The public-key certificate framework is critical in the definition of certain critical components of the Public-key Infrastructure (PKI) as well as Privilege Management Infrastructure (PMI).


Blyth, a ., Koyacic., G (2006).Information assurance: security in the information environment. Springer Science & Business,

Department of Defense (1999). INFORMATION ASSURANCE:Legal, Regulatory, Policy and Organizational Considerations,4th Edition. Accessed on 3/15/2012 at http://www.au.af.mil/au/awc/awcgate/jcs/ia.pdf

Dunbar, B (2002). A detailed look at Steganographic Techniques and their use in an Open-Systems Environment.SANS Institute. Accessed on 3/15/2012 at http://www.sans.org/reading_room/whitepapers/covert/detailed-steganographic-techniques-open-systems-environment_677

ISO/IEC (2002). Information technology -- Security techniques -- Security information objects for access control. ISO/IEC 15816. Accessed on 3/15/2012 at http://webstore.iec.ch/preview/info_isoiec15816%7Bed1.0%7Den.pdf

Johnson, NF (1995) Steganography. Technical Report. November 1995.

Khanafer, a.,Saad, W.,Ba-ar, T., and Debbah, M., (2012) Competition in femtocell networks: strategic access policies in the uplink. Proc. IEEE International Conf. Communications (ICC 2012) - Wireless Networks Symposium ('ICC'12 WN'), Ottawa, Canada, June 10-15, 2012.

Santesson, S.,Nystrom, M., & Polk, T (2004). Internet X.509 Public Key Infrastructure:

Qualified Certificates Profile. Accessed on 3/15/2012 at http://www.ietf.org/rfc/rfc3739.txt

International Telecommunication Union (2000). ITU-T X.509: SERIES X: DATA NETWORKS and OPEN SYSTEM COMMUNICATIONS. Accessed on 3/15/2012 at http://physik.uibk.ac.at/hephy/grid/project/x509.pdf.....

Have Any Questions? Our Expert Writers Can Answer!

Need Help Writing Your Essay?