GES106 Lecture Notes - Lecture 4: Symmetric-Key Algorithm, High Availability, Non-Repudiation

181 views3 pages
8 Oct 2016
Department
Course
Professor

Document Summary

While it is true that all the components of a computer system are exposed to an attack, are data and inform ation the main subjects of protection of securitytechniques. Computer security is mainly dedicated t: protect the confidentiality, integrity and availability of information, therefore, is currently considere d that the security of the data and information includes 3 fundamentals: Generally there must be 3 described aspects to ensure safety. Depending on the environmentin which a system to work, those responsible would like them give priority to a certain aspect of security. Along with these 3 fundamental concepts are often jointly study the authentication and non-repudiation. It usually refers to group these features as cidan, name taken from the first letter of each feature. The different security services depend on each other hierarchically, so if it doesn"t exist the first cannot apply the next.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents