Confidentiality
Advertisement
Techopedia Explains Confidentiality
Confidentiality is one of the five pillars of Information Assurance (IA). The other four are authentication, availability, integrity and nonrepudiation.Sensitive information or data should be disclosed to authorized users only. In IA, confidentiality is enforced in a classification system. For example, a U.S. government or military worker must obtain a certain clearance level, depending on a position's data requirements, such as, classified, secret or top secret. Those with secret clearances cannot access top secret information.
Best practices used to ensure confidentiality are as follows:
- An authentication process, which ensures that authorized users are assigned confidential user identification and passwords. Another type of authentication is biometrics.
- Role-based security methods may be employed to ensure user or viewer authorization. For example, data access levels may be assigned to specified department staff.
- Access controls ensure that user actions remain within their roles. For example, if a user is authorized to read but not write data, defined system controls may be integrated.
Advertisement
Related Reading
- 10 Tips for Avoiding Key Software Flaws
- 3 Identity and Access Management Trends for 2020
- Experts Share 5 AI Predictions for 2023
- Artificial Intelligence: Debunking the Top 10 AI Myths
- WooCommerce vs. Magento: Best Ecommerce Platform in 2023
- The Ultimate Guide to Applying AI in Business