Content deleted Content added
Reverting to last known good version to remove linkspam. |
various changes |
||
Line 8:
== Confidentiality ==
* A security measure which protects against the disclosure of information to parties other than the intended recipient is by no means the only way of ensuring the security.
== Integrity ==
Line 16:
* A measure intended to allow the receiver to determine that the information provided by a system is correct.
* Integrity schemes often use some of the same underlying technologies as confidentiality schemes, but they usually involve adding information to a communication, to form the basis of an algorithmic check, rather than the encoding all of the communication.
* To check if the correct information is transferred from one application to other.
== Authentication ==
This might involve confirming the identity of a person, tracing the origins of an artifact, ensuring that a product is what its packaging and labelling claims to be, or assuring that a [[computer program]] is a trusted one.
== Authorization ==
|