ITM 820 Lecture Notes - Lecture 4: Mandatory Access Control, Smart Key, Uninterruptible Power Supply

97 views4 pages
Week 4 ITM 820
Confidentiality is the avoidance of the unauthorized, disclosure of info involves
-protection of data
-providing access to resources for those who are allowed to see it
1) Encryption
-symmetric and Asymmetric
2) Access Control
-a set of rules and polices applied to resources
3) Authentication (Kerbros, NTLM)
-determination of the identity or role that someone has
Note 3 components of authentication are:
1. Something the person has (smart key, smart card, radio signal)
2. Something the person knows (pin, password, pattern)
3. Something the person is (eye scan, finger print … etc)
4) Authorization: the determination if a person or system or application is allowed access to resources,
based on access control policy.
5) Physical security: locked rooms, cameras … etc
Integrity: the property that information has not been altered in an unauthorized way
1) Backup
2) shadow copy (keeps all previous versions of files) – huge storages needs/slows system down
3) Check sum (a signature showing the file was not altered
4) Data recording code – method for storing files in such a way that the small changes can be easily
Availability: the property of information available to authorized people in a timely fashion.
1) Physical protection (clustering of servers for data and load balancing)
find more resources at
find more resources at
Unlock document

This preview shows page 1 of the document.
Unlock all 4 pages and 3 million more documents.

Already have an account? Log in

Get access

$10 USD/m
Billed $120 USD annually
Homework Help
Class Notes
Textbook Notes
40 Verified Answers
Study Guides
1 Booster Class
$8 USD/m
Billed $96 USD annually
Homework Help
Class Notes
Textbook Notes
30 Verified Answers
Study Guides
1 Booster Class