jump to navigation

Information Security, What to protect ? (Part-2) September 17, 2008

Posted by Abdurahman in technology.
Tags: ,
trackback

After three key concept in my previous post. Now I will describe what the others concept to securing information.

4. Authenticity

in computing areas, you have to make sure that people who have access to certain information are eligible to access it. Username and Password are the basic things from this concept.

5. Non-repudiation

This is mean, you can’t denied any transaction written on the computer. For example, if you has bought something from popular E-commerce site, in the future you denied that you ever bought something from there. and this problem goes into the law, the court will ask for the log-file of your transaction as a proof. Log files can be used as a proof <– this is mean of non-repudiation. Nowadays, digital signatures are commonly used as part of non-repudiation.

6. Logical Security

Wider area to securing information. Like username and password before you login to your computer.

8. Physical Security

Commonly use of biometrics for authentication (e.g. Fingerprint reading, Voice Recognition etc..)

Comments»

1. shierlynikodemus - September 22, 2008

ngerti ga ngerti tetep baca man!!!🙂

bole pertamax ga disini??


Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s

%d bloggers like this: