ABSTRACT

For example, when we place a valuable into a safe, we can check the contents of the safe to see if the valuable is still there. If a valuable jewel, say a diamond, is stolen by a master thief who bypasses all of the security controls, the theft is noticeable when the owner opens the safe-the diamond is missing. But, if a valuable piece of information, say a secret password written on a piece of paper, is “stolen” the original paper might still be in the safe but the information is gone unbeknownst to the owner. Likewise, if the information is electronic in nature, say a USB thumb drive, its contents can be copied but the original data bits are still in the USB stick. Conversely, if the master thief left a man-made carbon duplicate of the diamond in place of the real jewel, its theft might also go undetected for a very long time.