Basic principles of information security - confidentiality, Other Subject

Assignment Help:

Basic Principles

Confidentiality

Confidentiality (privacy) is the assets of preventing confession of information to illegal individuals or systems. For instance, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system effort to enforce privacy by enciphering the card number during broadcast, by preventive the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an illegal party obtains the card number in any way, a breach of privacy has occurred.

Breaches of privacy take many forms. Permitting somebody to look over your shoulder at your computer screen while you have private data present on it could be a breach of privately. If a laptop computer contain sensitive information about a company's employees is sold or stolen, it could result in a violate of privacy. Giving out confidential information over the telephone is a breach of confidentiality if the caller is not authorized to have the information.

Privacy is necessary (but not sufficient) for maintaining the privacy of the people whose personal information a system holds.


Related Discussions:- Basic principles of information security - confidentiality

Feedback mechanism in the context of climate, 1. What is a feedback mechani...

1. What is a feedback mechanism in the context of climate? 2. Provide and explain one example of a positive feedback that begins with air temperature. 3. Provide and explain

Evaluate the efficacy of different media sources, Question 1: Criticall...

Question 1: Critically examine how Media construct reality. Question 2: Evaluate the efficacy of different media sources in terms of their ability to provide political

Refusing letter, I am responding to your letter of about six weeks ago aski...

I am responding to your letter of about six weeks ago asking for an adjustment on your wireless hub, model WM39Z. We test all our products before they leave the factory; therefore,

Library management, what factors will you keep in mind while planning for a...

what factors will you keep in mind while planning for a library building? explain in detail.

How should poverty be defined, "Whilst recognizing the need for standardiza...

"Whilst recognizing the need for standardization in discussing poverty across time and space and between different social categories, it sometimes becomes necessary to use more tha

Describe structural functionalist theory, 1) Describe Symbolic Interaction ...

1) Describe Symbolic Interaction Theory. Explain and discuss how it views a) religion, b) politics/economics, and c) medicine. 2) Describe Structural Functionalist Theory. Expla

Explain safe use of the mobile tower scaffold, Question: A 15 years old...

Question: A 15 years old, two story building, used as a warehouse, has its corrugated roofing sheets damaged and needs replacement. A mobile tower scaffold is made available to

Unix, 1. Write a script called “myls” that will perform similarly to how th...

1. Write a script called “myls” that will perform similarly to how the ls command does. Start by making myls print out all files in the present directory. 2. Next, make the script

Definition of museology, Definition of Museology : It is the study of museu...

Definition of Museology : It is the study of museums and how they have developed and established in their role as an educational mechanism under social and political pressures.

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd