Basic principles of information security - confidentiality, Other Subject

Basic Principles

Confidentiality

Confidentiality (privacy) is the assets of preventing confession of information to illegal individuals or systems. For instance, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system effort to enforce privacy by enciphering the card number during broadcast, by preventive the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an illegal party obtains the card number in any way, a breach of privacy has occurred.

Breaches of privacy take many forms. Permitting somebody to look over your shoulder at your computer screen while you have private data present on it could be a breach of privately. If a laptop computer contain sensitive information about a company's employees is sold or stolen, it could result in a violate of privacy. Giving out confidential information over the telephone is a breach of confidentiality if the caller is not authorized to have the information.

Privacy is necessary (but not sufficient) for maintaining the privacy of the people whose personal information a system holds.

Posted Date: 10/13/2012 2:18:51 AM | Location : United States







Related Discussions:- Basic principles of information security - confidentiality, Assignment Help, Ask Question on Basic principles of information security - confidentiality, Get Answer, Expert's Help, Basic principles of information security - confidentiality Discussions

Write discussion on Basic principles of information security - confidentiality
Your posts are moderated
Related Questions
Question 1 Explain the Conservative Reaction to the idea of Enlightenment Question 2 Explain Max Weber's early life Question 3 What is the difference between repressive

QUESTION 1 (a) Explain the distinction between the State and the Government. (b) Discuss how this distinction would be calibrated under a Liberal and a Totalitarian system.

i am sandeep singh gill. i did Btech in computer science (BE). i am expert in c/c++/java/php/HTML/ other technical fields. i want to do freelancing. can i work with u?? you can sen

what is stationary and examples of stationary

Peer Acceptance refers to the social status or popularity within a large group whereas friendship represents relationships based on mutual respect, appreciation and liking. Peer ac

Reflecting on Personal Identity and Global Citizenship Review the Global Education and Global Citizenship video and read the article “A Model of Global Citizenship: Antecedents an

where does fertilization occur?

Environmental Health: According to the World Health Organization (WHO), environmental health addresses all the physical, chemical, and biological factors external to a person, and

mention the aims of education in present scenario

please compute this number 918 for the swertres lotto gam