18.04.2013 Views

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

B2B Integration : A Practical Guide to Collaborative E-commerce

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

354 <strong>B2B</strong> <strong>Integration</strong> — A <strong>Practical</strong> <strong>Guide</strong> <strong>to</strong> <strong>Collaborative</strong> E-<strong>commerce</strong><br />

• The information is not known <strong>to</strong> intruders (confidentiality);<br />

• The information is not altered by unauthorized persons (integrity);<br />

and<br />

• The information is accessible <strong>to</strong> authorized users (availability).<br />

First generation systems<br />

Analog cellular systems, such as Nordic Mobile Telephone (NMT),<br />

Advanced Mobile Phone System (AMPS), and Total Access<br />

Communication System (TACS) are considered first generation (1G)<br />

technologies. These systems are nowadays considered quite insecure.<br />

Cloning of the analog terminals is possible and in some systems<br />

widespread. Terminal cloning compromises the security of charging,<br />

which leads <strong>to</strong> loss of profit and reduces the consumer's trust of mobile<br />

service. In many cases, the lack of security has been the main reason<br />

for the decision <strong>to</strong> prematurely close the 1G networks.<br />

Second generation systems<br />

Second generation (2G) systems use digital radio transmission techniques<br />

and digital speech coding. 2G systems were designed for voice, although<br />

they now also transport a limited amount of low speed data<br />

communication.<br />

The 2G systems include:<br />

• The GSM family which has been adopted world-wide;<br />

• Personal Digital Communications (PDC) used in Japan; and<br />

• Enhanced (digital) versions of the 1st generation United States<br />

Advanced Mobile Phone System (AMPS) standard; IS-136 TDMA<br />

and IS-95 CDMA (alias cdmaOne)<br />

The use of digital technology enhances security in two principal<br />

ways:<br />

• Digital technology allows the use of cryp<strong>to</strong>graphic methods for<br />

authentication and encryption; and<br />

• Moni<strong>to</strong>ring digital transmission on the radio interface requires<br />

specialized equipment, which is expensive and not freely available.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!