Cryptographic Principles, Concepts, and Terminology
Security objectives are many and varied; therefore, it is important to understand how they work together and how they oppose one another. One of the best summaries of these objectives is found in the Handbook of Applied Cryptography. These objectives represent most of the goals of security initiatives, including cryptography. TABLE 7-1 contains a summary of security objectives. When you try to solve a business security problem, you need to understand these terms. Then you can tell if you could use a cryptographic solution.
TABLE 7-1 Information security objectives.
OBJECTIVE | STEPS TO TAKE |
---|---|
Privacy or confidentiality | Keep information secret from all unauthorized users. |
Integrity | Ensure ... |
Get Fundamentals of Information Systems Security, 4th Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.