| |
Information Security
- Mechanism to ensure that none of the threats, applicable to a scenario, apply.
- Techniques
- Authorization
- “Should you be doing that?”
- Authentication
- Cryptography
Threat Perception and Cost of Security
- Securing a system has three components
- Prevention, intrusion detection and recovery
- Each system has its own cost.
- Security techniques may not be easy to use
- Cost of securing a system must match the threat perception and value of information.
|