KIM COMPUTER


Confidentiality in Information Security

Confidentiality is the first pillar of the CIA Triad. It ensures that only authorized users, entities, or processes are granted access to sensitive information and resources.


1. Goal of Confidentiality

The primary goal is to prevent unauthorized disclosure of information. This includes preventing exposure due to hacking, accidental leaks, eavesdropping, or physical loss.

2. Key Technologies and Measures for Confidentiality

Confidentiality measures are generally categorized into data protection and access limitation.

① Data Protection: Encryption

Encryption is the most robust way to ensure confidentiality, as it renders the data unusable even if it is stolen.

② Access Control

Validating the identity of the user (subject) accessing the information and limiting their permissions.

③ Physical and Procedural Protection