ITM 820 Lecture Notes - Lecture 1: Base64, Non-Repudiation, Data Integrity

118 views5 pages

Document Summary

Cia triad: confidentiality, integrity, and availability are the three security concepts that form the. Confidentiality preserving authorized restriction on info access and disclosure, including means for protecting personal privacy and proprietary information. Integrity guarding against improper info modification/destruction, including ensuring information non-repudiation and authenticity. Availability ensuring timely and reliable access to and use of information: authenticity and accountability are the additional concepts that present the complete picture. Authenticity property of being genuine and being able to be verified/trusted. Accountability security goal that generates the requirements for actions of an entity to be traced uniquely to that entity. Encoding and encryption: encoding t(cid:396)a(cid:374)sfo(cid:396)(cid:373)s data i(cid:374)to a(cid:374)othe(cid:396) fo(cid:396)(cid:373)at usi(cid:374)g a s(cid:272)he(cid:373)e that"s pu(cid:271)li(cid:272)l(cid:455) a(cid:448)aila(cid:271)le so that it can be easily reversed. Its purpose is to transform data so that it can be properly/safely consumed: e(cid:454)a(cid:373)ples of e(cid:374)(cid:272)odi(cid:374)g a(cid:396)e: ascii, u(cid:374)i(cid:272)ode, url e(cid:374)(cid:272)odi(cid:374)g, base6(cid:1008) . Ascii takes one byte (8 bits) to store one letter and can hold 256 symbols.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents