Data Protection and Security

   

I

Introduction to Information Security

   

I.II

Common Information Security Targets

   

   
 

Other Security Targets

Restorability: Ensuring that no matter what happens, we can always roll-back a system into a good previous state.

Intrusion Detection: Notifying automatically unusual events in a system.

Steganography: Ability to communicate without revealing this activity to others.

Note that steganography is a stronger requirement than confidentiality because not only you want to keep secret what you communicate but also the fact that you communicate secretly.

Note: No list is ever completed, including this one.

 


Animation I.II-II

Animation depicts how steganography works.
[click to enlarge]

   
       
 
«previous session [1] [2] [3] [4] [5] [6] next session »
   
       
 
«return to previous section proceed to next section »
  concepts »