ENVS 1200 Lecture Notes - Lecture 7: Data Integrity
ENVS 1200 Tutorial 7 Notes – Resources Intact
Introduction
• Network-related security issues are often placed into one or more of five categories,
with specific types of measures required for each category
• Intrusion—keeping
• Network and system resources intact and free from the results of intrusion
• Intrusion includes the ability of an intruder to modify the system for future access,
destroying system data and program files, injecting viruses, and more.
• The primary measures required are physical and circuit protection of the network to the
extent possible
• Firewalls on individual components, including routers, where appropriate
• Protection of passwords that traverse the network with encryption
• Confidentiality—keeping
• The content of data traversing the network and information about the communication
taking place private
• Encryption measures are required for this purpose.
• Authentication—verifying
• The identity of a source of data being received
• This is similar to the concept of electronic signatures.
• Special encryption features are used for this purpose.
• Data integrity and nonrepudiation—protecting
• The content of data communication against changes and verifying the source of a
message
• Special encryption features are also used for this purpose.
• Assuring network availability and access control—restricting
• Access to network resources to those permitted to use them and keeping network
resources operational and available.
find more resources at oneclass.com
find more resources at oneclass.com