Basic principles of information security - confidentiality, Other Subject

Basic Principles

Confidentiality

Confidentiality (privacy) is the assets of preventing confession of information to illegal individuals or systems. For instance, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system effort to enforce privacy by enciphering the card number during broadcast, by preventive the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an illegal party obtains the card number in any way, a breach of privacy has occurred.

Breaches of privacy take many forms. Permitting somebody to look over your shoulder at your computer screen while you have private data present on it could be a breach of privately. If a laptop computer contain sensitive information about a company's employees is sold or stolen, it could result in a violate of privacy. Giving out confidential information over the telephone is a breach of confidentiality if the caller is not authorized to have the information.

Privacy is necessary (but not sufficient) for maintaining the privacy of the people whose personal information a system holds.

Posted Date: 10/13/2012 2:18:51 AM | Location : United States







Related Discussions:- Basic principles of information security - confidentiality, Assignment Help, Ask Question on Basic principles of information security - confidentiality, Get Answer, Expert's Help, Basic principles of information security - confidentiality Discussions

Write discussion on Basic principles of information security - confidentiality
Your posts are moderated
Related Questions
Question 1 Explain the Conservative Reaction to the idea of Enlightenment Question 2 Explain Max Weber's early life Question 3 What is the difference between repressive

Question 1: Although the Ministry of Education as a public institution has shown "remarkable resilience to a succession of policy changes" (The World Bank), yet policy formulat

There are two or more continuous dependent variables in MANOVA. The initial test assumes that there is a linear combination of the dependent variables. Hypothesis: The independe

Now suppose that we want to test the hypothesis that both the effect of prenatal visits and the intercept differ for whites and blacks. Write down this model and explain in detail

Question 1 What do you mean by barriers of communication? Explain different types of barriers to communication Question 2 Explain the different types of listening Questio

A Biomedical Scientist made a blood film and stained it.  She then examined the blood film and reported the following:- Red cells showed varying cell shapes and sizes.  Occasion

The assessment provides the student with the opportunity to critically evaluate effectiveness of clinical nursing leadership (CNL) and discuss how they may apply effective CNL as a

Integrated Library Systems: An integrated library system (ILS), also known as a library management system (LMS), is an enterprise resource planning system for a library, employed

Sociological Perspectives on Gender and Sexuality: Sociology of gender is a prominent subfield of sociology. Since 1950 an increasing part of the academic literature and of the pu

Applications- Data encryption (cryptography) is utilized in a variety of environments and applications. The exact utilization of encryption and the implementation of the DES w