Basic principles of information security - confidentiality, Other Subject

Basic Principles


Confidentiality (privacy) is the assets of preventing confession of information to illegal individuals or systems. For instance, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system effort to enforce privacy by enciphering the card number during broadcast, by preventive the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an illegal party obtains the card number in any way, a breach of privacy has occurred.

Breaches of privacy take many forms. Permitting somebody to look over your shoulder at your computer screen while you have private data present on it could be a breach of privately. If a laptop computer contain sensitive information about a company's employees is sold or stolen, it could result in a violate of privacy. Giving out confidential information over the telephone is a breach of confidentiality if the caller is not authorized to have the information.

Privacy is necessary (but not sufficient) for maintaining the privacy of the people whose personal information a system holds.

Posted Date: 10/13/2012 2:18:51 AM | Location : United States

Related Discussions:- Basic principles of information security - confidentiality, Assignment Help, Ask Question on Basic principles of information security - confidentiality, Get Answer, Expert's Help, Basic principles of information security - confidentiality Discussions

Write discussion on Basic principles of information security - confidentiality
Your posts are moderated
Related Questions
please tell me something on the role of communication in social affairs

I have a homeworks to be done from a safety textbook. All that needs to be done is to read the chapter and answer the questions at the end of the book usually 20 questions per chap

"virtual team success in project management" please follow the assignment sheet its very simple assignment...all the articles from only Information Systems (IS) journals...we do no

how do you carry health and safety act at your work place

Public Key Cryptography and Digital Certificates This element of the chapter presents background technical information on cryptographic systems. This includes Public Key Crypto

Project Name : Intranet Solution-Portal/EC M Role : Client interaction on day to day basis. Presales Proposal, presentation etc. Project Plan, Scope, Estimation. Requiremen

How do I get stared? Do I start from the beginning of chapter 1?

I NEED SWOT analysis on 24*7 business operations

Project Name : Portal -Engine Business Unit, Role : Team Management. Estimation and Plan. Involved in Requirement Gathering, System Architecture & Design. Presentation & Docum

Give a detailed account of antedon of the phylum echinodermata