ACF2400 Lecture Notes - Lecture 6: Information Technology Management, Fault Tolerance, Data Center

58 views3 pages
6 Aug 2018
Department
Course
Professor

Document Summary

Chpater 9;10: confidentiality, privacy, processing integrity and availability. Controls can be used to protect the confidentiality of sensitive information. Types of encryption systems & hoe digital signatures provide the means for creating legally- enforceable contracts. Explain the input, processing, and output controls desgined to ensure processing integrity and availability. Concerns relating to privacy: spam: unknow, advertising o offensive emails, identity theft. Organisations have the role in preventing identity theft as ethical and moral obligation. Types of encryption: symmetric vs asymmetric: symmetric: Uses one key to encrypt and decrypt. Both parties need to know the key. Need to securely communicate the shared key. Cannot share key with multiple parties, they get their own (different) key from the organization: asymmetric. Private used to decrypt (only known by you) Public key can be used by all your trading partners. Hashi(cid:374)g is co(cid:374)verti(cid:374)g i(cid:374)for(cid:373)atio(cid:374) i(cid:374)to a (cid:858)hashed(cid:859) code of fixed le(cid:374)gth. And the code cannot be re-converted into infromation.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents