Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Protect vital information while still allowing access to those who need it
Trade secrets, medical records, etc.
Provide authentication and access control for resources
7
COMMON SECURITY ATTACKS
AND THEIR COUNTERMEASURES
Confidentiality (privacy)
Authentication (who created or sent the data)
Integrity (has not been altered)
Non-repudiation (the order is final)
Access control (prevent misuse of resources)
Availability (permanence, non-erasure)
METHODS OF DEFENCE
Encryption
Software Controls (access limitations in a data base, in operating
system protect each user from other users)
•IPsec
•Firewalls
•Virtual Private Networks
•Wireless Security
SECURITY ATTACKS