SOA Security – Part 1 – Intro to SOA

SOA Security Model has been doing rounds in recent past in many forums. This prompted me to write on SOA security aspects through a 3 part article. Through this ‘Part 1’, let me introduce you to SOA. A Service Oriented Architecture (SOA) is a framework for integrating business process and supporting IT infrastructure as secure, standardized components services that can be reused and combined to address changing business priorities.

 

Continue reading “SOA Security – Part 1 – Intro to SOA”

MPLS Architecture – An Overview

As soon as the word ‘MPLS’ (Multi Layered Protocol Switching) is mentioned the term ‘MPLS VPN’ comes to everybody’s mind. This is soon followed by the thought of corporate offices spread across different cities being connected through an ‘MPLS VPN’. Your subconscious mind has also associated ‘confidentiality of my data probably using encryption’ to this whole concept as it is a VPN and VPNs are supposed to provide confidentiality and integrity of my data. Why else should they say ‘private’ in Virtual Private Networks?

 

Continue reading “MPLS Architecture – An Overview”

Information Rights Management – An Introduction

Information rights management is a technology which aims to protect sensitive and critical documents and information while at the same time ensuring that it is made available for genuine needs. For example, two companies may negotiate to trade a patent during which the patent details would be made available to the buying company. Despite signing an NDA, if the deal doesn’t happen, the company which was supposed to buy the patent can come out with a new product based on that patent (whose details were made available to it during negotiation stage) with some modifications. Continue reading “Information Rights Management – An Introduction”

Working of a digital signature

The Information Technology Act gives legal validity to internet based communications / transactions like email and EDI etc, i.e. e-commerce in short.In these internet based transactions, a digital signature serves the purpose of identifying the originator of the transaction and ensuring that the communication has happened without any intermediary disturbance like data tampering or modification. Continue reading “Working of a digital signature”

Smart Phones – Convenience or Threat?

The use of smart phones to access sensitive corporate information away from the office is creating huge security gaps for enterprises. Smart phones are being used to access company mails and applications. Atleast one major breach involving theft of application code has been attributed to malware from smart phones. So how do we benefit from the technology while addressing the risks Continue reading “Smart Phones – Convenience or Threat?”