Today we are living in the era of information technology where security of information is crucial matter to all of us. There are various security terms which are used in information security systems that every one should aware of this.
There are various terms that are used in information security which is shown below…
Data Confidentiality
Data confidentiality is used to protect data from ongoing attacks, unauthorized access, disclosure or theft of data etc. It leads to secure the privacy of information. According to use, sharing, and view Less Confidentiality leads to public exposure of information(example-social security number) and High Confidentiality(Example- password) leads to secrecy or confidentiality of information which should protect from unethical hacking, prevent from identity theft etc.
Security Mechanism: Encipherment and routing control
Data Integrity
Data Integrity means that the Data should be in original form. Data integrity designed to protect data from insertion, deletion, modification or replaying of data by other.Data integrity should maintain its accuracy and consistency over its entire cycle of design, implementation, process, storage and retrieval. It should protect whole or some part of message.
Security Mechanism: Encipherment, Digital Signature, Data Integrity
Authentication
Authentication is the process of verifying the user or process which means proving that the user or process is true, genuine, or valid.In connection-oriented communication, it is the process of authentication of sender or receiver and in connection-less communication it authenticates the source of data.
Security Mechanism: Encipherment, digital signature, authentication exchanges
Nonrepudiation
Nonrepudiation is the protection against the repudiation(deny) by sender or receiver. It is the assurance that someone can not deny something or it ensures that someone can not deny from the authenticity of their signature.It proof the originality of data origin in such a way that receiver of the data can proof later the identity of sender if denied. In nonrepudiation, sender can also proof the data delivery to the intended receiver.
Security Mechanism: digital signature, data integrity, notarization(trusted third party to control the communications)
Access Control
Access control is used to provide protection against the unauthorized access to data or information. Access control is the security features of the system to control the accessibility to the system to minimize the security risks.Access can include reading, writing, modification of data, executing program etc.
Security Mechanism: Access control mechanisms
You May also like…