Basic principles of information security - confidentiality, Other Subject

Assignment Help:

Basic Principles

Confidentiality

Confidentiality (privacy) is the assets of preventing confession of information to illegal individuals or systems. For instance, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system effort to enforce privacy by enciphering the card number during broadcast, by preventive the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an illegal party obtains the card number in any way, a breach of privacy has occurred.

Breaches of privacy take many forms. Permitting somebody to look over your shoulder at your computer screen while you have private data present on it could be a breach of privately. If a laptop computer contain sensitive information about a company's employees is sold or stolen, it could result in a violate of privacy. Giving out confidential information over the telephone is a breach of confidentiality if the caller is not authorized to have the information.

Privacy is necessary (but not sufficient) for maintaining the privacy of the people whose personal information a system holds.


Related Discussions:- Basic principles of information security - confidentiality

Stem modification, Common name: carrot Scientific name: Purpose of modific...

Common name: carrot Scientific name: Purpose of modification: Common name: ginger Scientific name: Purpose of modification: Common name: onion Scientific name: Purpose of modi

Marketing, . control overthe macro-environment

. control overthe macro-environment

Legal issues in the environment, Legal Issues in the Environment: Environm...

Legal Issues in the Environment: Environment are surrounds or environs; surrounding conditions, forces or influences, by which living forms are influenced & modified in their deve

Project Doumentation, how to write about the database as a science ERD

how to write about the database as a science ERD

Role of selective attention and working memory , Role of selective attentio...

Role of selective attention and working memory in executive functions The concepts of selective attention and working memory, introduced in Chapters 6 and 7, respectively, are cen

Histology of digestive organs, what are glands present in the tunica mucosa...

what are glands present in the tunica mucosa of the stomach, small intestine and large intestine ?

#title., Weber could see the advantages of industrial capitalism, and he...

Weber could see the advantages of industrial capitalism, and he was optimistic about the future. but he thought it would never actually develop. but he thought workers wou

Lp and simulation, On their farm, the Friendly family grows apples that the...

On their farm, the Friendly family grows apples that they harvest each fall and make into three products apple butter, applesauce, and apple jelly. They sell these three items at s

American History, some historians believe that the founding fathers missed ...

some historians believe that the founding fathers missed an opportunity to abolish slavery in the united states was phasing out and establishing and preserving the union took prior

Positive political theory, Positive Political Theory: The task of Positive...

Positive Political Theory: The task of Positive Political Theory which is sometimes instead labeled "Modern Political Theory" is to provide general theoretical tools for empirical

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd