GES106 Lecture Notes - Lecture 4: Symmetric-Key Algorithm, High Availability, Non-Repudiation
Document Summary
While it is true that all the components of a computer system are exposed to an attack, are data and inform ation the main subjects of protection of securitytechniques. Computer security is mainly dedicated t: protect the confidentiality, integrity and availability of information, therefore, is currently considere d that the security of the data and information includes 3 fundamentals: Generally there must be 3 described aspects to ensure safety. Depending on the environmentin which a system to work, those responsible would like them give priority to a certain aspect of security. Along with these 3 fundamental concepts are often jointly study the authentication and non-repudiation. It usually refers to group these features as cidan, name taken from the first letter of each feature. The different security services depend on each other hierarchically, so if it doesn"t exist the first cannot apply the next.