{"id":56,"date":"2005-12-14T19:41:00","date_gmt":"2005-12-14T19:41:00","guid":{"rendered":"http:\/\/blog.trungson.com\/?p=56"},"modified":"2005-12-14T19:41:00","modified_gmt":"2005-12-14T19:41:00","slug":"information-security","status":"publish","type":"post","link":"http:\/\/blog.trungson.com\/?p=56","title":{"rendered":"Information Security"},"content":{"rendered":"<p>Eight fundamental concepts in security:<br \/>\n&#8211; Identification (user ID, application ID, or system ID. IDs are used to indicate to a system who or what is trying to gain access)<br \/>\n&#8211; Authentication (validate the claimed identity of a user or resource)<br \/>\n&#8211; Authorization (determine if an entity is permitted access to a particular resource)<br \/>\n&#8211; Confidentiality (ensure that only authorized parties have access to sensitive data. Privacy is a concept related to personal information, whereas confidentiality is a mechanism or a goal)<br \/>\n&#8211; Integrity (verification that data has not been garbled, modified, or lost inadvertently, system has not been tampered with)<br \/>\n&#8211; Availability (DDOS, performance)<br \/>\n&#8211; Non-Repudiation (legally admissible proof that a transaction occurred, such that neither participant in a transaction can later deny having participated)<br \/>\n&#8211; Accountability (processes and technologies necessary to track system usage, identify inappropriate actions, and address the problem)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Eight fundamental concepts in security: &#8211; Identification (user ID, application ID, or system ID. IDs are used to indicate to a system who or what is trying to gain access) &#8211; Authentication (validate the claimed identity of a user or resource) &#8211; Authorization (determine if an entity is permitted access to a particular resource) &#8211; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[],"_links":{"self":[{"href":"http:\/\/blog.trungson.com\/index.php?rest_route=\/wp\/v2\/posts\/56"}],"collection":[{"href":"http:\/\/blog.trungson.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/blog.trungson.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/blog.trungson.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/blog.trungson.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=56"}],"version-history":[{"count":0,"href":"http:\/\/blog.trungson.com\/index.php?rest_route=\/wp\/v2\/posts\/56\/revisions"}],"wp:attachment":[{"href":"http:\/\/blog.trungson.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=56"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/blog.trungson.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=56"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/blog.trungson.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=56"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}