The Mechanisms Of Data Security

Working with the above elements, an effective data security system works with the following key mechanisms to
answer:
1) Has My Data Arrived Intact? (Data Integrity) This mechanism ensures that data was not lost or corrupted when it was sent to you
2) Is The Data Correct And Does It Come From The Right Person? (Authentication) This proves user or system identities
3) Can I Confirm Receipt Of The Data And Sender Identity Back To The Sender? (Non-Repudiation)
4) Can I Keep This Data Private? (Confidentiality) - Ensures only senders and receivers access the data. This is typically done by employing one or more encryption techniques to secure your data
5) Can I Safely Share This Data If I Choose? (Authorization and Delegation) You can set and manage access privileges for additional users and groups
6) Can I Verify The That The System Is Working? (Auditing and Logging) Provides a constant monitor and troubleshooting of security system function
7) Can I Actively Manage The System? (Management) Allows administration of your security system
8) Pervasive encryption . Protecting data with cryptography helps prevent unauthorized access or misuse of data, even if other layers of security are compromised. This type of protection is highly desirable in cloud environments where information continually moves over network connections and among servers. Traditionally, the processing overhead associated with repeatedly encrypting and decrypting data led to performance trade-offs that made pervasive encryption untenable or undesirable. Intel AES-NI, which is available on the Intel Xeon processor, provides hardware acceleration to key parts of the widely used aeS encryption algorithm, making pervasive encryption viable without compromising performance.