Difference between revisions of "Security"
Jump to navigation
Jump to search
(5 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
If the data can only be accessed by someone who holds a piece of [[secret]], then, data security is protected by the possession of such [[secret]]. Since people who don't have the [[secret]] simply have no access to the data content, therefore, the degree of security is determined by the strength of the [[secret]] protection. | In the context of [[data science]], one should confine the definition of the word [[secure]] or [[security]] within the realm of [[Cryptographically-secure]]. If the data can only be accessed by someone who holds a piece of [[secret]], then, data security is protected by the possession of such [[secret]]. Since people who don't have the [[secret]] simply have no access to the data content, therefore, the degree of security is determined by the strength of the [[secret]] protection. | ||
<noinclude> | <noinclude> | ||
Line 7: | Line 7: | ||
==Related Pages== | ==Related Pages== | ||
* [[logically related::Trustworthy]] | * [[logically related::Trustworthy]] | ||
* [[logically related:: | * [[logically related::Irrefutable]] | ||
* [[logically related:: | * [[logically related::Available]] | ||
</noinclude> | </noinclude> |
Latest revision as of 09:57, 9 September 2021
In the context of data science, one should confine the definition of the word secure or security within the realm of Cryptographically-secure. If the data can only be accessed by someone who holds a piece of secret, then, data security is protected by the possession of such secret. Since people who don't have the secret simply have no access to the data content, therefore, the degree of security is determined by the strength of the secret protection.
References