Data security is help protecting data and loss damage , and unauthorised access or modification. Data security is usually understood to availability , integrity and controlling access. Data Security generally available, honestly, and it has been revealed that access and control. Actually Data is raw form of information as columns and rows in databases or personal computers. Data security help to prevent data breaches. It’s means avoid disclosure or leakage of sensitive data mitigate the cost of a data breach. And also data security help ensure data integrity. Data structures, prevent unauthorized changes data, configuration files and logs to ensure complete visibility into data access patterns and trends. Data security help reduce compliance …show more content…
CIA triads very important for the identification of data security problem areas and to give solution for that. CIA stand for central intelligence agency. So CIA we van divide three parts. Confidentiality, integrity and availability are categories of CIA. In this assignment I will identified well confidentiality, integrity and availability and real world application of the. So I will try to discuss these three component and example of real world scenario.
1.3.1 Confidentiality
In the context of information security and CIA triad , confidentiality means that information that should stay secret and only those person authorized to access it may receive access . From ancient times, mankind has known that information is power, and in our information age access to information is more important than ever. Unauthorized access to confidential information many have divesting consequences, not only in national security applications, but also in commerce and industry, main mechanism of protection of confidentiality in information systems are cryptography and access control. Examples of threats to confidentiality are malware, intruders social engineering, insecure networks and poorly administered systems. Discussing confidentiality most important thing us cryptography. In this assignment I would like to deeply discuss about cryptography and it
…show more content…
Sender and receiver use same key and an encryption decryption algorithm to encrypt/decrypt data. i.e. the key is shared. In the symmetric encryption the sender and receiver obtain the same encryption/decryption program. Firstly to send an encrypted message and compose the message and then create an encryption key will use scramble it. After send the key (which can take the form of a password or a file) to the recipient via a route different from the one will use to send the message. Using an algorithm and the key, the encryption application turns your plain text into “cipher text”. After send the cipher text message to the recipient. The recipient runs the cipher text through the same application which uses the algorithm and the key to decrypt and read