Saturday, December 8, 2018

Understanding Confidentiality, Integrity, Availability, Authentication and Accountability

1. Confidentiality - Protects data against unauthorized disclosed. For example, someone looking at files they should not be. To protect against this we use encryption.

2. Integrity - Ensures data has not been changed, destroyed or lost in an unauthorized or accidental manner. To preserve integrity we use a hash function.

3. Accountability - Accountability directly supports non-repudiation and provides protection against false denial of involvement in a communication. With this, we can use a digital signature.

4. Authentication - Confirm the identity of a system entity using a Message Authentication Code or MAC. 

5. Availability - is where services are accessible and available to authorized users or processes in an information infrastructure. This is difficult to protect because a denial of service attack can compromise availability.

Out of the five services, four of them can be achieved by using encryption and that is why cryptography and network security go hand in hand. 

Click here and scroll down to page 155 for more information


Post a Comment