Basic principles of information security - confidentiality, Other Subject

Assignment Help:

Basic Principles

Confidentiality

Confidentiality (privacy) is the assets of preventing confession of information to illegal individuals or systems. For instance, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system effort to enforce privacy by enciphering the card number during broadcast, by preventive the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an illegal party obtains the card number in any way, a breach of privacy has occurred.

Breaches of privacy take many forms. Permitting somebody to look over your shoulder at your computer screen while you have private data present on it could be a breach of privately. If a laptop computer contain sensitive information about a company's employees is sold or stolen, it could result in a violate of privacy. Giving out confidential information over the telephone is a breach of confidentiality if the caller is not authorized to have the information.

Privacy is necessary (but not sufficient) for maintaining the privacy of the people whose personal information a system holds.


Related Discussions:- Basic principles of information security - confidentiality

Milgrams and aschs experiments, 1) How would your orientations to life (you...

1) How would your orientations to life (your ideas, attitudes, values, goals) be different if you had been reared in an agricultural society? the patterns of human society diffe

Rules of the auction - bidding object, There are now a number of sellers fr...

There are now a number of sellers from set M, and buyers from set N. Each seller j can deliver one unit of the good at some price c j ≥ 0whichisonly known to him, and each buyer i

Implementations of cryptographic modules, Implementations- Cryptograph...

Implementations- Cryptographic modules which realize this standard shall conform to the necessities of FIPS 140-1. The algorithm specific in this standard may be implemented i

Managing software project, Designation : Project Leader Job Profile :...

Designation : Project Leader Job Profile : The work included People management, Delivery, Presales, RFP, Architecture & System design, Requirement gathering, Documenting b

Lifestyle, Lifestyle: Lifestyle is a way of living of individuals, familie...

Lifestyle: Lifestyle is a way of living of individuals, families (households), and societies, which they manifest in coping with their physical, psychological, social, and economi

Geography, can you help me with my homework please im in 7th grade and im h...

can you help me with my homework please im in 7th grade and im having a hard time with my homework

Native title and property law - research assignment, The research assignmen...

The research assignment aims to enable students to practice, develop and demonstrate their research and legal analysis skills. These skills will become more highly tuned throughout

Healthcare Finance, Here are the budgets of Brandon Surgery Center for the ...

Here are the budgets of Brandon Surgery Center for the most recent historical quarter (in thousands of dollars): Static Flexible Actual Number of surgeries 1,200 1,300 1,300 Patie

Hydrogen ions, what is the hydroxide ion concentration in a solution if the...

what is the hydroxide ion concentration in a solution if the hydronium ion concetration is 3.004 x 10-9 mol l-1

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd