The system must know who you are (ID) and you must prove it (via passwords, tokens, or biometrics).
Guaranteeing that data is accurate and has not been tampered with. If a bank balance changes without a transaction, the integrity is blown. Fundamentals of information systems security
At the heart of every security policy lies the . These three concepts are the benchmark for any secure system: The system must know who you are (ID)
Encryption—the final line of defense that renders data unreadable even if it is stolen. 4. The Logic of Access Control and Intrusion Detection Systems (IDS).
Firewalls, VPNs, and Intrusion Detection Systems (IDS).