Skip to content
Related Articles

Related Articles

Information Security | Confidentiality

View Discussion
Improve Article
Save Article
  • Last Updated : 30 Sep, 2022
View Discussion
Improve Article
Save Article

Confidentiality is the protection of information in the system so that an unauthorized person cannot access it. This type of protection is most important in military and government organizations that need to keep plans and capabilities secret from enemies. However, it can also be useful to businesses that need to protect their proprietary trade secrets from competitors or prevent unauthorized persons from accessing the company’s sensitive information (e.g., legal, personal, or medical information). Privacy issues have gained an increasing amount of attention in the past few years, place the importance of confidentiality on protecting personal information maintained in automated systems by both government agencies and private-sector organizations. Confidentiality must be well defined, and procedures for maintaining confidentiality must be carefully implemented.
A crucial aspect of confidentiality is user identification and authentication. Positive identification of each system user is essential in order to ensure the effectiveness of policies that specify who is allowed access to which data items.

Threats to Confidentiality:

Confidentiality can be compromised in several ways. The following are some of the commonly encountered threats to information confidentiality –

  • Hackers
  • Masqueraders
  • Unauthorized user activity
  • Unprotected downloaded files
  • Local area networks (LANs)
  • Trojan Horses

Confidentiality Models:

Confidentiality models are used to describe what actions must be taken to ensure the confidentiality of information. These models can specify how security tools are used to achieve the desired level of confidentiality. The most commonly used model for describing the enforcement of confidentiality is the Bell-LaPadula model.

  • In this model the relationship between objects (i.e, the files, records, programs and equipment that contain or receive information) and subjects (i.e, the person, processes, or devices that cause the information to flow between the objects).
  • The relationships are described in terms of the subject’s assigned level of access or privilege and the object’s level of sensitivity. In military terms, these would be described as the security clearance of the subject and security classification of the object.

Another type of model that is commonly used is Access control model.

  • It organizes the system into objects (i.e, resources being acted on), subjects (i.e, the person or program doing the action), and operations (i.e, the process of interaction).
  • A set of rules specifies which operation can be performed on a object by which subject.
My Personal Notes arrow_drop_up
Recommended Articles
Page :

Start Your Coding Journey Now!