Define the goals of security and specify mechanisms to achieve each goal.

 

    Information security consists of methods used to protect data or information being transmitted for preserving the integrity, confidentiality, and availability of the information.

  1. Confidentiality
  2.     Confidentiality is the protection of transmitted data from passive attacks. The two important concepts are:
    1. Data Confidentiality: Assures that private or confidential information is not disclosed to the unauthorized user.
    2. Privacy: Assures that individual control information related to them.
  3. Integrity
  4.     Integrity assures that messages are received as sent with no duplication, insertion, modification, reordering or replays. The two important concepts are:
    1. Data Integrity: Assures information is changed only in an authorized manner.
    2. System integrity: Assures that the system performs intended function property and free from unauthorized manipulation.
  5. Availability
  6.     Assures that system works correctly and service is available to authorized users.
These three concepts are termed as CIA triad and embody fundamental security objectives for data and information services.