Difference between revisions of "Security"

From PKC
Jump to navigation Jump to search
 
(4 intermediate revisions by the same user not shown)
Line 1: Line 1:
If the data can only be accessed by someone who holds a piece of [[secret]], then, data security is protected by the possession of such [[secret]]. Since people who don't have the [[secret]] simply have no access to the data content, therefore, the degree of security is determined by the strength of the [[secret]] protection.
In the context of [[data science]], one should confine the definition of the word [[secure]] or [[security]] within the realm of [[Cryptographically-secure]]. If the data can only be accessed by someone who holds a piece of [[secret]], then, data security is protected by the possession of such [[secret]]. Since people who don't have the [[secret]] simply have no access to the data content, therefore, the degree of security is determined by the strength of the [[secret]] protection.


<noinclude>
<noinclude>
Line 7: Line 7:
==Related Pages==
==Related Pages==
* [[logically related::Trustworthy]]
* [[logically related::Trustworthy]]
* [[logically related::Irrefutability]]
* [[logically related::Irrefutable]]
* [[logically related::Availability]]
* [[logically related::Available]]
</noinclude>
</noinclude>

Latest revision as of 09:57, 9 September 2021

In the context of data science, one should confine the definition of the word secure or security within the realm of Cryptographically-secure. If the data can only be accessed by someone who holds a piece of secret, then, data security is protected by the possession of such secret. Since people who don't have the secret simply have no access to the data content, therefore, the degree of security is determined by the strength of the secret protection.


References


Related Pages