Logical

What is confidentiality of information

The importance of protecting information and data confidentiality is especially relevant in the information society in which we live. How to protect sensitive or critical information of people and organizations? What is confidentiality and how to implement security measures to ensure it? What is confidentiality of information

What is?

Confidentiality, in computing, is a fundamental principle of information security that guarantees the necessary level of secrecy of the information and its treatment, to prevent its unauthorized disclosure when it is stored or in transit.

How to ensure the confidentiality of the data?

The confidentiality of the information is achieved or ensured through the implementation of technical or organizational measures such as:

  • The encryption of the information that does not allow it to be understood by people who do not have the necessary keys / certificates (authorized persons or recipients) even if it is intercepted in transit or the repository where it is stored is reached.
  • Access controls to the facilities, repositories and systems where the information is located or to the network through which it moves, avoiding unauthorized access to it.
  • Formal procedures for classifying information based on its value, sensitivity and legal requirements, and treating it (what can and cannot be done with it).
  • Training and awareness of people about the confidentiality and protection of information.
  • Confidentiality Agreements (NDAs) formally established (signed) with employees who access and process confidential information.

Examples of information leaks What is confidentiality of information

Recently, 10 TB of information from the Portuguese electricity company EDP has been leaked, from which 10 million euros were claimed, under threat of data leakage, to return access to its files that were encrypted with a Ransomware attack. There have also been very notorious leaks those of PlayStation Network, Google+, Cambridge Analytics …

Data leaks due to incorrect handling can cause many damages to individuals and groups. Therefore, this is considered one of the fundamental pillars of security , along with its availability and integrity.

Mohammad Asif Goraya

M A Goraya has qualification of M.phil in Agricultural Sciences. He has almost 15 years of teaching Experience at college and university level. He likes to share his research based knowledge with his students and audience.

Recent Posts

Difference Between Summary and Conclusion with Proper Definition and Brief Explanation

Main Difference - Summary vs Conclusion Summary and conclusion are two terms that are often…

1 year ago

Difference between Moth and Butterfly

Difference between moth and butterfly fall into two categories: anatomical and behavioral. Most moths are…

1 year ago

Difference Between Architect and Engineer

An engineer is a person whose job is to design and build engines, machines, roads,…

3 years ago

Difference between the Internet and the World Wide Web

Internet is the term used to identify the massive interconnection of computer networks around the…

3 years ago

Difference Between CD-R and CD-RW

A CD-R is a type of disc that does not contain any data. It is blank…

3 years ago

Difference between x86 and x64

Computing technologies are constantly evolving, and if we base our predictions on Moore's Law, they…

3 years ago