Data Protection and Security |
||||||
I |
Introduction to Information Security |
|||||
I.II |
Common Information Security Targets |
|||||
Other Security Targets Restorability: Ensuring that no matter what happens, we can always roll-back a system into a good previous state. Intrusion Detection: Notifying automatically unusual events in a system. Steganography: Ability to communicate without revealing this activity to others. Note that steganography is a stronger requirement than confidentiality because not only you want to keep secret what you communicate but also the fact that you communicate secretly. Note: No list is ever completed, including this one. |
Animation depicts how steganography works. |
|||||
|
||||||
|
concepts » | |||||