What are the disadvantage of EDI?

Disadvantage of EDI

Disadvantages of EDI:-“Electronic data interchange (EDI) Is the electronic exchange of business documents in standard, computer-processable, universally accepted format between the business partners.” Following are the disadvantages of EDI:- Too many standards:- There are too many standard bodies developing standard documents formats for EDI. For example, one company may be following the x12 standard format, … Read more

How to Get Started with Bitcoin Mining – BTC

Bitcoin is the world’s leading digital currency and continues to grow as people learn about its breakthrough potential as a peer-to-peer digital payment system. For a refresher on what Bitcoin is and other things you need to know about Bitcoin, check out the Getting Started page—a collection of essential Bitcoin information, guides, and reviews. How … Read more

Internet as Global Information Infrastructure

Internet as Global Information Infrastructure

The Internet is a networking infrastructure; it connects millions of computers together globally, forming a network in which any computer can communicate with any other computer connected to the network. Internet as Global Information Infrastructure It is an ever-growing wide area network of millions of computers and computer networks across the globe, which can exchange … Read more

What do you mean by EDI security?

EDI security

An important aspect of EDI is the security of messages during the exchange. It should be ensured that the interchange of messages is reliable. Further aspects of security are: Controls in the EDI standards:- EDI standards include controls designed to protect against errors in the message and the corruption of message during the interchange. Controls … Read more

What is Critical Infrastructure? (CII)

Critical Infrastructure

Critical Infrastructure refers to the process, systems, facilities, technologies, networks, assets and services essential to the health, safety, security or economic well-being of society and the effective functioning of government. Critical Infrastructures is the basic facility that is required for the proper functioning of a community or society. It includes the assets or services or … Read more

Business to Business e-commerce

business to business e-commerce

Business to Business e-commerce is the largest form of e-commerce. It is e-commerce between two organizations. It is also known as e-business and is experiencing an explosive growth rate on the internet. Companies are now mutually buying and selling products and services on the internet. Business to Business e-commerce (B2B) B2B e-commerce is more than a mechanism … Read more

Threats to Information Security

Threats to Information Security

Threats to Information Security:- “The term information security refers to the way of protecting information systems and the information stored in it from the unauthorized access, use, modification, disclosure, or disruption.” Information security is the process of ensuring and maintaining confidentiality, availability, and integrity of data. Confidentiality refers to the protection of information from unauthorized … Read more

What is Penetration Testing? Types of Penetration Testing

Penetration Testing

Penetration testing is a great way to identify the vulnerabilities that exist in a system or network that has existing security measures in place. It usually involves the use of attacking methods conducted by trusted individuals that are similarly used by hostile intruders or hackers. Depending on the type of test that is conducted, this … Read more

The Concept of Information Security and Its Principles

information security

“The term information security can be defined as the way of protecting information systems and the information stored in it from the unauthorized access, use, modification, disclosure, or disruption.” Information security refers to the process of ensuring and maintaining confidentiality, availability, and integrity of data. Confidentiality refers to the protection of information from unauthorized access. … Read more

Need of Cyber Disaster Planning

Need of Cyber Disaster Planning

Cyber Disaster Planning:- All the sectors of critical infrastructure are connected to the Internet. So, any cyber attack launched via the Internet can cause disaster as all the sectors of critical infrastructure are connected via the Internet. Disaster is an emergency situation; it includes cyber attacks, cyber terrorism, acts of information warfare and natural disasters. In … Read more