Confidentiality
Confidentiality is the best accessible principle. Acquaintance is the adeptness to ensure
secrecy: No one can appearance the advice except the advised recipients.
Armies and generals accept relied on acquaintance for centuries. In fact, in 50 B.C., even
Julius Caesar acclimated a address alleged Caesar Code to ensure the acquaintance of his
messages. He artlessly confused all the belletrist by three positions. For example, he replaced all
As in the argument with Ds, replaced all Bs with Es, and so on.
Confidentiality is usually adorable for arrangement traffic: No one should be able to examine
the Ethernet anatomy capacity beatific by adjoining workstations.
Common techniques to ensure acquaintance accommodate the following:
Confidentiality
− Adeptness to Ensure Secrecy
C
A
Security
I
Availability
− Of Service
− Of Data
Integrity
− Adeptness to Ensure Asset/Data
Is not Modified
Security Triad 7
• Protective container. Alone specific bodies who apperceive the aggregate or accept access
to the alembic can admission the adequate information, such as putting a abstruse memo
in a safe.
• Cryptographic protection. Everyone can accept admission to a abortive anatomy of the
information, but alone advised recipients can admission a advantageous anatomy of it, such as the
spies who can break encrypted messages.
Attacks adjoin acquaintance (also alleged disclosure) abide of breaking the secrecy.
Many bodies afield accept that advice beatific beyond a arrangement is adequate by
confidentiality when, in reality, it is not. Attackers (or arrangement troubleshooters) generally use
sniffers to attending at arrangement traffic, which acknowledge user accreditation (usernames and passwords)
for protocols such as Telnet or Post Office Protocol (POP) that accommodate no confidentiality.
Confidentiality is usually adorable in military, health, or government sectors.