Security objectives

data

The security objectives of information are confidentiality, integrity, and availability. These three functions are known as the CIA triad: C for Confidentiality, I for Integrity, and A for Availability.

Confidentiality

Information should not be disclosed to unauthorized persons, unauthorized persons or unauthorized processes; this is information confidentiality in information security (as well as in software security). Stealing passwords or sending sensitive emails to the wrong person jeopardizes confidentiality. Confidentiality is a component of privacy that protects information from unauthorized persons, unauthorized organizations, or unauthorized processes.

Integrity

Information or data has a life cycle. In other words, information or data has a start time and an end time. In some cases, at the end of its life cycle, information (or data) must be erased (legally). Integrity consists of two attributes, namely:
1) maintaining and ensuring the accuracy of the information (or data) throughout its life cycle, and
2) completeness of information (or data) throughout its life cycle. Thus, information (or data) should not be reduced or altered in an unauthorized or undetected manner.

Availability

For any computer system to serve its purpose, the information (or data) must be available when it is needed. This means that the computer system and its storage media must work properly. Availability can be jeopardized by system upgrades, hardware failures, and power outages. Availability can also be compromised by denial of service attacks.

Non-repudiation

When someone uses your identity and your signature to sign a contract that they never honored, repudiation is when you cannot successfully argue in court that you did not author the contract.

To understand how repudiation applies to digital communication, you must first know the meaning of a key and the meaning of a digital signature. A key is a piece of code. A digital signature is an algorithm that uses the key to create another code that is similar to the sender’s written signature.

In digital security, a disclaimer is provided (not necessarily guaranteed) by a digital signature. In the field of software (or information security), the disclaimer refers to the integrity of the data. Data encryption (which you may have heard of) in combination with a digital signature also contributes to confidentiality.

The goals of security in information are confidentiality, integrity, and availability. However, disclaimers are another feature that needs to be considered when dealing with information security (or software security).