Security Vulnerabilities

  • Badrinarayanan Lakshmiraghavan

Summary

We saw in Chapter 1 that the term information security means protecting information and information systems from unauthorized access, use, disclosure, disruption, modification, or destruction to ensure confidentiality, integrity, and availability. Related to this, we have seen how an application can identify and authenticate entities using the three factors based on knowledge, ownership, and inherence to control the access of protected application resources from unauthorized entities. Also, we examined how cryptography can help ensure the two important aspects of message security: confidentiality through encryption and integrity through digital signing techniques. We also looked at transport security achieved through TLS over HTTP (HTTPS).

Keywords

Defend Folk Dick 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Badrinarayanan Lakshmiraghavan 2013

Authors and Affiliations

  • Badrinarayanan Lakshmiraghavan

There are no affiliations available

Personalised recommendations