The lesson covers the importance of securing your data. Business value is increasingly tied to data. Also explains some security properties such as Identity, Authentication, Confidentiality, Availability, Integrity, and Non-repudiation.
The thesis of this talk, the most important
thing I want all of you to take away is that the security of your data is
important and if it weren’t why would you be using a database in the first
place importantly most or a lot I should say or increasingly business value is
tied directly to the data that you have in some businesses this is very readily
apparent in financial sectors for example information you have on past
trades may inform how you bid in a certain auction, in a self-driving
platform information that you have on past pedestrian behavior may inform your
model for how you navigate an intersection and lots of other
industries have these kinds of connections and indirect
associations as well and so when we talk about the security of our data I want to
shy away from maybe what you think of as security like an alarm system on your
house and more broadly towards this idea that the data you have is important and
you derive value from it and you need to make sure that it has
integrity that your data is correct and untampered with and you know where
it came from and how it got to be the way it did. So I’ve established, I hope
that the security of the systems that you have is important and
how do we think about these things? how do we talk about them? One way that
we can do that is we can define a common vocabulary for thinking about and
describing properties of secure systems and we’re gonna do this through security
properties or principals, as a way to frame our discussion and there are
lots of different collections of these properties and principles, there’s one I
believe called the CIA, there are others the ones I’m going to talk about today
are these six the identity, availability, authentication, integrity
confidentiality and non-repudiation and what I hope to do is to describe ScyllaDB’s
security features and discuss how they relate to these properties so that we’re
gonna use the same common language that security engineers use to describe
systems in describing these security features of ScyllaDB