Basic principles of information security - confidentiality, Other Subject

Assignment Help:

Basic Principles

Confidentiality

Confidentiality (privacy) is the assets of preventing confession of information to illegal individuals or systems. For instance, a credit card transaction on the Internet requires the credit card number to be transmitted from the buyer to the merchant and from the merchant to a transaction processing network. The system effort to enforce privacy by enciphering the card number during broadcast, by preventive the places where it might appear (in databases, log files, backups, printed receipts, and so on), and by restricting access to the places where it is stored. If an illegal party obtains the card number in any way, a breach of privacy has occurred.

Breaches of privacy take many forms. Permitting somebody to look over your shoulder at your computer screen while you have private data present on it could be a breach of privately. If a laptop computer contain sensitive information about a company's employees is sold or stolen, it could result in a violate of privacy. Giving out confidential information over the telephone is a breach of confidentiality if the caller is not authorized to have the information.

Privacy is necessary (but not sufficient) for maintaining the privacy of the people whose personal information a system holds.


Related Discussions:- Basic principles of information security - confidentiality

Explain the principle of particle playground, Question 1: (a) Given tha...

Question 1: (a) Given that you have 2 square objects, Object 1 and Object 2, in a scene and that you are required to make the position property of the Object 1 dependent on th

Writing, how do you make a cursive "a"

how do you make a cursive "a"

ACADEMIC WRITING, HOW TO PRESENT A PIECE OF WRITING USING THE APA REFERENCI...

HOW TO PRESENT A PIECE OF WRITING USING THE APA REFERENCING STYLE

Presentation ideas!, I am doing a presentation on study titled "How and why...

I am doing a presentation on study titled "How and why women become and remain engaged in community leadership". I am supposed to tie this all back to the women who have worked rea

Describe drug addiction, Problem 1: (a) Critically show the following ...

Problem 1: (a) Critically show the following concepts: drug addict, dependency and tolerance. Use relevant examples to support your answer. (b) Critically discuss the d

Early anthropological theory, Early Anthropological Theory- exemplified by...

Early Anthropological Theory- exemplified by Edward Tylor (1832 - 1917). Tylor was a Quaker, with no formal university training, who traveled Mexico from 1855-56, began publishing

Interactive web, Interactive Web Web has a client/server structural...

Interactive Web Web has a client/server structural design, where a browser runs on the client such as Microsoft Explorer or Netscape and a Web server like Apache server run

Population geography, What are the merit and demerit of fertility measures?...

What are the merit and demerit of fertility measures?

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd