Confidentiality ensures that data is only available to authorized users (Bottino & Hughes, 2006)
by using access control mechanism. When a user attempts to get access of data, the mechanism
verifies the rights for that individual. Confidentiality can be accomplished by hiding or
6
2.3.4 Authentication
Authentication is another parameter of information security which is used to authent icate the
identity of the user (Bottino & Hughes, 2006). It will allow the valid user to get access into the
system.
Figure 1: Information Security Factors, Source: Authors
2.4
Do'stlaringiz bilan baham: