1 |
Protection components:
-
Confidentiality - hiding data to all but the intended viewers typically involves encryption, where data are scrambled and unscrambled using some common algorithm (DES, RC4, RC5, IDEA) and common cryptographic keys
-
Integrity - keeping information unchanged by applying tools to detect any alterations (algorithms: MD5, SHA)- they use strong cryptographic data checksums generated at the source, sent with data and checked at the destination
-
Authentication - identifying of the origin of information (typically associated with logon procedures). Public key technologies (RSA, DSA) are used to create digital signatures
-
Authorization - providing authenticated users with access services through access rights
|