Basic principles of information security - confidentiality, Other Subject

Assignment Help:

Basic Principles

Confidentiality

Confidentiality (privacy) is the assets of preventing confession of information to illegal individuals or systems. For instance, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system effort to enforce privacy by enciphering the card number during broadcast, by preventive the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an illegal party obtains the card number in any way, a breach of privacy has occurred.

Breaches of privacy take many forms. Permitting somebody to look over your shoulder at your computer screen while you have private data present on it could be a breach of privately. If a laptop computer contain sensitive information about a company's employees is sold or stolen, it could result in a violate of privacy. Giving out confidential information over the telephone is a breach of confidentiality if the caller is not authorized to have the information.

Privacy is necessary (but not sufficient) for maintaining the privacy of the people whose personal information a system holds.


Related Discussions:- Basic principles of information security - confidentiality

Management information system, evaluate the past and present state of manag...

evaluate the past and present state of management information system in logistec industry.

#title., Weber could see the advantages of industrial capitalism, and he...

Weber could see the advantages of industrial capitalism, and he was optimistic about the future. but he thought it would never actually develop. but he thought workers wou

Describe the treatment options available, In the laboratory, we produce tho...

In the laboratory, we produce thousands of test results every day. It can be easy to forget that each sample has a patient's story behind it, in which the Haematology result that w

Environmental management, Environmental Management: It is the procedure by...

Environmental Management: It is the procedure by which environmental health is regulated. It does not include managing the environment itself; however it is the procedure of takin

Internet exchange point, INTERNE T EXCHANGE POINT An Internet exchange...

INTERNE T EXCHANGE POINT An Internet exchange point (IX or IXP) is a physical transportation that allows dissimilar Internet service providers (ISPs) to exchange Internet traf

Mechatronics, Do you offer Mechatronics assignment help? I need questions s...

Do you offer Mechatronics assignment help? I need questions solved by expert in Mechatronics engineering assignment. Please let me know soon...

Gender as culturally learned, Gender as Culturally Learned: The cultural o...

Gender as Culturally Learned: The cultural origin of gender becomes especially apparent when we look at other cultures. In Western industrialized societies such as the United Stat

Discuss the politicization of land reforms, Question 1 Explain any five m...

Question 1 Explain any five main features of Indian economy Question 2 Write short note on                         a) Gross domestic product (GDP)

Reimbursement Methodologies, Review each of the four components of the reve...

Review each of the four components of the revenue cycle (Pre claims, Claims, Accounts Receivable, and Claims, reconciliation and collections) and identify a key staff member involv

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd