Data Security Case Study

3969 Words16 Pages

1 Critically evaluate the information security Properties and attributes

1.1 What is Data Security?

Data security is help protecting data and loss damage , and unauthorised access or modification. Data security is usually understood to availability , integrity and controlling access. Data Security generally available, honestly, and it has been revealed that access and control. Actually Data is raw form of information as columns and rows in databases or personal computers. Data security help to prevent data breaches. It’s means avoid disclosure or leakage of sensitive data mitigate the cost of a data breach. And also data security help ensure data …show more content…

CIA triads very important for the identification of data security problem areas and to give solution for that. CIA stand for central intelligence agency. So CIA we van divide three parts. Confidentiality, integrity and availability are categories of CIA. In this assignment I will identified well confidentiality, integrity and availability and real world application of the. So I will try to discuss these three component and example of real world scenario.
1.3.1 Confidentiality

In the context of information security and CIA triad , confidentiality means that information that should stay secret and only those person authorized to access it may receive access . From ancient times, mankind has known that information is power, and in our information age access to information is more important than ever. Unauthorized access to confidential information many have divesting consequences, not only in national security applications, but also in commerce and industry, main mechanism of protection of confidentiality in information systems are cryptography and access control. Examples of threats to confidentiality are malware, intruders social engineering, insecure networks and poorly administered systems. Discussing confidentiality most important thing us cryptography. In this assignment I would like to deeply discuss about cryptography and it …show more content…

Sender and receiver uses different keys for encryption and decryption namely public and private respectively. The sender and receiver obtain the same encryption and decryption programme. If someone wants to send an encrypted message the first need to generate a public key and a private key with encryption application. Then send that person the public key. Using an asymmetric algorithm and your public key, the sender scabies the message into “cipher text”. They send the cipher text. After run the cipher text through encryption programme, which decodes the message using private key. If want to send a message back, need the sender’s public

Open Document