Module 22: Multi-core Computing Security
  Lecture 43: Multiprocessor Techniques
 


Information Security

  • Mechanism to ensure that none of the threats, applicable to a scenario, apply.
  • Techniques
    • Authorization
      • “Should you be doing that?”
    • Authentication
      • “Who are you?”
    • Cryptography

Threat Perception and Cost of Security

  • Securing a system has three components
    • Prevention, intrusion detection and recovery
  • Each system has its own cost.
  • Security techniques may not be easy to use
  • Cost of securing a system must match the threat perception and value of information.