EDI Security

Matthew K. McGowan, Bradley University

Introduction

The Business Role of EDI

The EDI Process

EDI Vulnerabilities

Interception

Interruption

Modification

Fabrication

EDI Security Mechanisms

Access Control

Authentication

Nonrepudiation

Data Integrity

Auditable History

Communications Network Alternatives

Value-Added Network Services (VANs)

Internet-Based EDI

Security Threats of Internet-Based EDI

EDI Standards

The ANSI X12 Standard

EDIFACT

Security Features of EDI Standards

Secure EDI Application Examples

Navy Exchange Service Command (NEXCOM)

Mayo Clinic

Bank of America (BA)

Guidelines for Managing EDI Systems Risks

Establish Security Requirements by Data Class

Assess Risks

Conclusions and Recommendations

Glossary

Cross References

References

INTRODUCTION

Electronic data interchange (EDI) is the computer-to-computer exchange of business transactions in standardized formats. It is used for business-to-business (B2B) electronic commerce, the largest and fastest growing type of electronic commerce. EDI involves electronic links from one organization to another, classifying it as a type of interorganizational information system (IOIS). EDI includes support for a variety of business transactions. For example, Bell Helicopter (2002) uses EDI for invoices, payments, shipping schedules, and requests for quotes in conducting business with its suppliers. EDI uses standard formats for the electronic exchange of business transactions.

There are over 100,000 companies using EDI in ...

Get Handbook of Information Security, Volume 1, Key Concepts, Infrastructure, Standards, and Protocols now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.