Basic principles of information security - confidentiality, Other Subject

Assignment Help:

Basic Principles

Confidentiality

Confidentiality (privacy) is the assets of preventing confession of information to illegal individuals or systems. For instance, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system effort to enforce privacy by enciphering the card number during broadcast, by preventive the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an illegal party obtains the card number in any way, a breach of privacy has occurred.

Breaches of privacy take many forms. Permitting somebody to look over your shoulder at your computer screen while you have private data present on it could be a breach of privately. If a laptop computer contain sensitive information about a company's employees is sold or stolen, it could result in a violate of privacy. Giving out confidential information over the telephone is a breach of confidentiality if the caller is not authorized to have the information.

Privacy is necessary (but not sufficient) for maintaining the privacy of the people whose personal information a system holds.


Related Discussions:- Basic principles of information security - confidentiality

Environmental issues, Environmental Issues: These are harmful aspects of h...

Environmental Issues: These are harmful aspects of human activity on the biophysical environment. Environmentalism, a social & environmental movement that started in the year of 1

Environmental management systems, Do your experts should provide Environmen...

Do your experts should provide Environmental Management Systems Questions assignment help? I get a new assignment and I m stuck in my assignment I need urgent help in my college as

Business resources, Describe the full range of recruitment documents that a...

Describe the full range of recruitment documents that are used by BSiX in the recruitment and selection of a Learning Centre (Library) Administrator. What documents do you need

Server hardware, Serve r Hardware Hardware necessities for servers dif...

Serve r Hardware Hardware necessities for servers differ, depending on the server application. complete CPU speed is not typically as serious to a server as it is to a desktop

Connect Fractions to Divison, 12 friends share 4 pizza equally. What fracti...

12 friends share 4 pizza equally. What fraction of a pizza will each friend get

Law, what is law?

what is law?

Famines, places where famines mostly occur

places where famines mostly occur

M-commerce, WHAT IS M-COMMERCE? M-commerce or mobile commerce is the bu...

WHAT IS M-COMMERCE? M-commerce or mobile commerce is the buying and selling of services and goods through wireless technology- i.e. handheld devices such as and personal digita

Managerial Analysis, 1.Define APV. How does it differ from NPV? 2.Identify ...

1.Define APV. How does it differ from NPV? 2.Identify and discuss at least two other business valuation models that are popular. Use the template provided. Follow APA format, incl

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd