ITM 820 Chapter Notes - Chapter 4: Plain Text, Public-Key Cryptography, Ion

57 views3 pages

Document Summary

Cia: confidentiality: is the avoidance of the unauthorized. * providing access to resources for those who are allowed to see it. Asym access control : a set of rules & policies applied t resources( files, printers) Authentication: the determination of the identity or role that someone has. Example (keberos, ntlmold) three components of authentication are: 4- authorization: the determination if a person or system or application is allowed access to. Integrity: the property that info has not be altered in an unauthorized way. 2- shadow copy( it keeps all previous versions of a file), huge data space. 3- check summd5 ( message disgest 5 ( a signature verifying the file was not altered) 4- data recording code: a method for storing files in such a way tat small changes can be easily detected. Availability : the property of information data available to authorized people in a timely fashion.

Get access

Grade+20% off
$8 USD/m$10 USD/m
Billed $96 USD annually
Grade+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
40 Verified Answers
Class+
$8 USD/m
Billed $96 USD annually
Class+
Homework Help
Study Guides
Textbook Solutions
Class Notes
Textbook Notes
Booster Class
30 Verified Answers

Related Documents