Information Security, What to protect ? (Part-2) September 17, 2008Posted by Abdurahman in technology.
Tags: key concept, security
After three key concept in my previous post. Now I will describe what the others concept to securing information.
in computing areas, you have to make sure that people who have access to certain information are eligible to access it. Username and Password are the basic things from this concept.
This is mean, you can’t denied any transaction written on the computer. For example, if you has bought something from popular E-commerce site, in the future you denied that you ever bought something from there. and this problem goes into the law, the court will ask for the log-file of your transaction as a proof. Log files can be used as a proof <– this is mean of non-repudiation. Nowadays, digital signatures are commonly used as part of non-repudiation.
6. Logical Security
Wider area to securing information. Like username and password before you login to your computer.
8. Physical Security
Commonly use of biometrics for authentication (e.g. Fingerprint reading, Voice Recognition etc..)