Difference between revisions of "Security"
Jump to navigation
Jump to search
Line 1: | Line 1: | ||
In the context of secure data, we must constraint our definition within the realm of [[ | In the context of secure data, we must constraint our definition within the realm of [[Cryptographically-secure]]. | ||
If the data can only be accessed by someone who holds a piece of [[secret]], then, data security is protected by the possession of such [[secret]]. Since people who don't have the [[secret]] simply have no access to the data content, therefore, the degree of security is determined by the strength of the [[secret]] protection. | If the data can only be accessed by someone who holds a piece of [[secret]], then, data security is protected by the possession of such [[secret]]. Since people who don't have the [[secret]] simply have no access to the data content, therefore, the degree of security is determined by the strength of the [[secret]] protection. | ||
Revision as of 09:50, 9 September 2021
In the context of secure data, we must constraint our definition within the realm of Cryptographically-secure. If the data can only be accessed by someone who holds a piece of secret, then, data security is protected by the possession of such secret. Since people who don't have the secret simply have no access to the data content, therefore, the degree of security is determined by the strength of the secret protection.
References