Three components of the security: Confidentiality, Integrity, and Availability
The followings are the three components of the security.
- Confidentiality
To conserve the secrecy of the contents. The contents should not be shown to an unauthorized user. Ex> Encryption
- Integrity
To prevent the contents of data from being modified or deleted by an unauthorized user. Ex> checksum
- Availability
Data should be read or used only by the authorized users with the owner’s intention. In other words, the data should be available to an unauthorized users only when the owner allows it.
Trusted Computing focuses on the first two.