ACF2400 Lecture Notes - Lecture 6: Information Technology Management, Fault Tolerance, Data Center
Document Summary
Chpater 9;10: confidentiality, privacy, processing integrity and availability. Controls can be used to protect the confidentiality of sensitive information. Types of encryption systems & hoe digital signatures provide the means for creating legally- enforceable contracts. Explain the input, processing, and output controls desgined to ensure processing integrity and availability. Concerns relating to privacy: spam: unknow, advertising o offensive emails, identity theft. Organisations have the role in preventing identity theft as ethical and moral obligation. Types of encryption: symmetric vs asymmetric: symmetric: Uses one key to encrypt and decrypt. Both parties need to know the key. Need to securely communicate the shared key. Cannot share key with multiple parties, they get their own (different) key from the organization: asymmetric. Private used to decrypt (only known by you) Public key can be used by all your trading partners. Hashi(cid:374)g is co(cid:374)verti(cid:374)g i(cid:374)for(cid:373)atio(cid:374) i(cid:374)to a (cid:858)hashed(cid:859) code of fixed le(cid:374)gth. And the code cannot be re-converted into infromation.