Free Trial

Safari Books Online is a digital library providing on-demand subscription access to thousands of learning resources.

Share this Page URL
Help

General cryptography > Non-repudiation - Pg. 140

140 Eleventh Hour Security : Exam SY0-201 Study Guide CIA--For all your security needs Practitioners of information security rely on a number of different taxonomies in order to ensure that they cover their system's security needs entirely. One of the simplest such groupings available is "CIA" --confidentiality, integrity, and availability. A security solution should generally be assessed as to how well it fits each, and all, of these three categories. CONFIDENTIALITY Confidentiality addresses a system's ability to keep information hidden from those people, systems, and processes that are not meant to see it. Encryption is the process of taking a readable document, and producing from it a document that is unreadable unless you possess a proper key to decrypt it. INTEGRITY Integrity addresses a system's ability to ensure--and to prove--that informa- tion being processed is the result of the application of approved processes to the original data. What this means is that data cannot be modified without approval, or where it is modified, that such modifications are detected.