- Confidentiality – Prevents unauthorized disclosure of data. Steganography provides this by hiding data within data.
- Encryption – scramble data to make it unreadable
- Access Controls – Identification, Authentication, Authorization combined provide access controls help ensure only authorized personnel can access the data.
- Identification – Users claim identity with unique user name
- Authentication – Users prove their identity with authentication.
- Authorization – Grant or restrict access to resources based on user permissions.
- Security Triad – Confidentiality, Integrity, Availability
***TEST*** Get Certified Get Ahead, Darril GIbson
Remember this – Confidentiality ensures that data is only viewable by authorized users. The best way to do this is by encrypting. PII, DB data , mobile data. Access controls help protect confidentiality by restricting access. Steganography example: Hiding text files within image files.
You must be logged in to post a comment.