ITM 820 Chapter Notes - Chapter 4: Plain Text, Public-Key Cryptography, Ion

60 views3 pages

Document Summary

Cia: confidentiality: is the avoidance of the unauthorized. * providing access to resources for those who are allowed to see it. Asym access control : a set of rules & policies applied t resources( files, printers) Authentication: the determination of the identity or role that someone has. Example (keberos, ntlmold) three components of authentication are: 4- authorization: the determination if a person or system or application is allowed access to. Integrity: the property that info has not be altered in an unauthorized way. 2- shadow copy( it keeps all previous versions of a file), huge data space. 3- check summd5 ( message disgest 5 ( a signature verifying the file was not altered) 4- data recording code: a method for storing files in such a way tat small changes can be easily detected. Availability : the property of information data available to authorized people in a timely fashion.

Get access

Grade+
$40 USD/m
Billed monthly
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
10 Verified Answers
Class+
$30 USD/m
Billed monthly
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
7 Verified Answers

Related Documents