• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Syllabus
  • Schedule
    • Section 1
      • Week 1: Course Introduction
      • Week 2: Access Controls
      • Week 3: Systems Software Security
      • Week 4: Applications Software Security
      • Week 5: Cryptography Protocols
      • Week 6: Practical Cryptography
      • Week 7: Midterm Exam
    • Section 2
      • Week 8: Business Continuity & Disaster Recovery
      • Week 9: Security Operations
      • Week 10: Physical & Environmental Security
      • Week 11: Security Architecture & Design
      • Week 12: – Network Protocols
      • Week 13: Telecommunications and Network Security
      • Week 14: Risk Management and Compliance
      • Week 15: Final Exam
  • Course Material
    • Case Studies
      • C2.1 (9/11)
      • C4.1 (9/25)
      • C6.1 (10/9)
      • C8.1 (10/23)
      • C9.1 (10/30)
      • C10.1 (11/6)
      • C11.1 (11/13)
    • Practical Assignments
      • PA1.1 (Due 9/11)
      • PA2.1 (Due 9/18)
      • PA4.1 (Due 10/2)
      • PA5 (Due 10/9)
        • PA5.1
        • PA5.2
        • PA5.3
      • PA8.1 (Due 10/30)
      • PA9.1 (Due 11/6)
      • PA10.1 (Due 11/13)
      • PA11.1 ( Due 11/20)
      • PA12.1 (Due 11/27)
      • PA13 (Due 12/4)
        • PA13.1
        • PA13.2
        • PA13.3
    • Written Assignments
      • WA2.1 (Due 9/18)
      • WA3.1 (Due 9/25)
      • WA4.1 (Due 10/2)
      • WA6.1 (Due 10/16)
      • WA8.1 (Due 10/30)
      • WA9.1 (Due 11/6)
      • WA10.1 (Due 11/13)
      • WA12.1 (Due 11/27)
      • WA13.1 (Due 12/4)
  • Webex
  • Gradebook

ITACS 5209 F17

Temple University

Week 6 Case Study

E-Signatures are becoming more commonplace, and quickly displacing “wet signatures” (a term I recently learned, when referring to the primitive practice of using a pen and paper to sign a contract), even in transactions that involve contracts and large amounts of money.  I was recently involved in a real estate transaction – for most of us, there is no purchase we will make in our lifetimes on the scale and importance of a real estate transaction – and I was surprised to learn that almost every contract can be signed electronically, and has become commonly accepted for nearly every phase of a real estate transaction.

Read the following article on the SANS website, which discusses this issue: http://www.sans.edu/research/security-laboratory/article/electronic-signature

As my real estate agent told me, “everything is electronic, except foreclosures, short sales, and clients of a certain age”.  But what legal concerns might there be in signing all these documents electronically?  Are they admissible in court?  As IT security experts, what could we look for to help protect our organization’s interest?  Also – What are some concepts we learned about in this section of the course that can be used to ensure the integrity of signatures, and where might these protocols and practices fall short?  Can you find examples of how these shortcomings are dealt with in systems currently in use since the publication of this article?

Primary Sidebar

Weekly Discussions

  • Uncategorized (12)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in