Data Confidentiality, Integrity and Availability
Essay by kibet7 • December 8, 2015 • Essay • 325 Words (2 Pages) • 1,292 Views
`Name:
Tutor:
Course:
Date:
Data Confidentiality, Integrity, and Availability
The concepts of confidentiality, integrity, and availability of information should be familiar with the professionals in security. These concepts are meant to safeguard against information.
Confidentiality.
Confidentiality of information is the protection of information from access or disclosure to unauthorized persons. In the current world, information is very valuable. Some of the information that requires confidentiality are credit card numbers, government documents, trade secrets, personal information, and bank account statements. Protecting information of this nature in the central part in information security. The ability of the system to protect data from access to unintended people is a measure of data confidentiality.
Integrity.
Integrity of data/ information refers to the protection of information from any kind of modification or compromise by unauthorized person. It also means the assurance that information is only accessed by the authorized people. Information that is tampered with could be costly.
Availability.
Availability of information means that only the authorized persons have access to the information when needed. A common attack that happens nowadays denies access to information. If the right persons access the information, it becomes of value. Accidents like power outages or breakages of data storage devices could result in in loss of important information.
To ensure the security of information, several measures should be put in place so that the confidentiality, integrity and availability of information is guaranteed. Information can be safeguarded through encryption. This will ensure that information will only be accessed by those who have the key or password. Access control list and enforcing file permissions helps to restrict against accessing sensitive information especially information over the internet. Data can also be protected by hashing the received data by comparing with the hash of the genuine information. Also, information should be backed up by storing in the off-site backups like external hard discs.
...
...