What security protocol or protocols will be in place to protect a user or QICP?
The provider should implement security technology such as server digital certificate technology (such as X.509) and Secure Sockets Layer protocol consistent with current accepted Internet standards if using the hypertext transfer protocol, and equally secure technology if using an alternative Internet application protocol. In addition, the provider should establish and implement security practices to prevent unauthorized access to or modification of provider data, software and hardware.
Related Questions
- I understand SOAP, XML and UDDI as foundation protocol for web services, but how about web services security and other advanced protocols?
- Do cellular networks maintain security protocols strong enough to protect the integrity of the smart grid?
- What security protocol or protocols will be in place to protect a user or QICP?