Skip to Main Content
Cyber Power
book

Cyber Power

by Solange Ghernaouti-Helie
April 2016
Intermediate to advanced content levelIntermediate to advanced
220 pages
15h 17m
English
EPFL Press
Content preview from Cyber Power
Cybersecurity Governance and Security Measures 377
The capability of a system to allow data access to authorised persons
and processes only relates to the preservation of data condentiality and
integrity. These are ensured by access control procedures (identica-
tion, authentication, and authorisation with respect to certain permis-
sions or access rights) and by encryption mechanisms.
The capability of a system to allow data modication by authorised
persons and processes only evokes the integrity criterion. It is produced
by access controls, error controls, and coherency checking procedures.
The capability of a system to prove that actions and transactions have
really taken place provides traceability, proof, administration, ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Cyber Warfare

Cyber Warfare

Jason Andress, Steve Winterfeld
Cyber Minds

Cyber Minds

Shira Rubinoff
Cybercrime

Cybercrime

Todd Wade

Publisher Resources

ISBN: 9781466573048