The followings are the three components of the security.
To conserve the secrecy of the contents. The contents should not be shown to an unauthorized user. Ex> Encryption
To prevent the contents of data from being modified or deleted by an unauthorized user. Ex> checksum
Data should be read or used only by the authorized users with the owner’s intention. In other words, the data should be available to an unauthorized users only when the owner allows it.
Trusted Computing focuses on the first two.