Basic principles of information security - confidentiality, Other Subject

Assignment Help:

Basic Principles

Confidentiality

Confidentiality (privacy) is the assets of preventing confession of information to illegal individuals or systems. For instance, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system effort to enforce privacy by enciphering the card number during broadcast, by preventive the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an illegal party obtains the card number in any way, a breach of privacy has occurred.

Breaches of privacy take many forms. Permitting somebody to look over your shoulder at your computer screen while you have private data present on it could be a breach of privately. If a laptop computer contain sensitive information about a company's employees is sold or stolen, it could result in a violate of privacy. Giving out confidential information over the telephone is a breach of confidentiality if the caller is not authorized to have the information.

Privacy is necessary (but not sufficient) for maintaining the privacy of the people whose personal information a system holds.


Related Discussions:- Basic principles of information security - confidentiality

marketing, little control over macro-environmen

little control over macro-environment

New assighnment, is your website down I''m trying to post a new assignment ...

is your website down I''m trying to post a new assignment its not going through

Explain the term tripartism, QUESTION (a) You have just been appointed ...

QUESTION (a) You have just been appointed as the Human Resource Manager in a parastatal body and the Chief Executive Officer has requested you to submit proposals for enhancing

Goal theory of achievement, Problem 1: a. Explain the 4 identity status...

Problem 1: a. Explain the 4 identity statuses put forward by James Marcia. b. What are the major characteristics that distinguish adolescence thinking from mature thinking?

Principles of archaeology, Principles of Archaeology: Archaeology is the s...

Principles of Archaeology: Archaeology is the study of past cultural behavior, from the beginnings of the human species to events that happened yesterday, through the material rem

Issues in political theory, Issues in political theory: The nature of this...

Issues in political theory: The nature of this theory can also be understood from the kind of matter it has been grappling along with during the long span of more than 2300 years.

Explain what is meant by the term polymorphism in java, Question 1: (a)...

Question 1: (a) Write the definition of a class called ‘Point' in Java. The class should contain the following:- (i) Two integer variables x and y declared protected. (i

Women studies, HOW DO YOU WRITE A CRITICAL ESSAY

HOW DO YOU WRITE A CRITICAL ESSAY

Microsoft proxy server, Microsoft Proxy Server The ISA Server product l...

Microsoft Proxy Server The ISA Server product line initiate with Microsoft Proxy Server. Microsoft Proxy Server v1.0 was initial launched in January 1997, and was deliberate to

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd