This lecture looks at some of the technical security mechanisms used for protecting our infrastructure by providing confidentiality for information; entity authentication over distributed computer networks and the detection of alteration to information. It discusses some of the social and political problems that can result from their use and from the fact that the same technology can be used by law enforcers (to catch criminals) and law breakers (to avoid being caught), as well as by businesses (to protect their assets) and by individuals (to protect privacy and preserve confidential data).
Sys Details
eVideo access requires you to log in as a Federation University Australia library user