DFIR Blog
  • Infosec
    • Blog
    • Threat Landscape
  • Digital Forensics
    • Windows Forensics
    • Mac Forensics
    • Memory Forensics
    • Forensic Resources
  • Incident Response
  • CISSP
    • Domain-1
    • Domain-2
    • Domain-3
    • Domain-4
    • Domain-5
    • Domain-6
    • Domain-7
    • Domain-8
  • Contact
  • HTB
  • Productivity

Confidentiality

12/18/2022

0 Comments

 
Confidentiality: It's a pretty straightforward concept - Just like your phone, wallet, or bank account, only authorized entities have access to the data. Think about your Bank account to remember this concept.
Your bank credentials are exclusive to your account and must not be shared with anyone else. 
 
What if the bank starts sharing your data with another customer - will you trust the back?
I guess "No." Therefore, authorized entities should only access information to build trust between the organization and the customer.
​
0 Comments



Leave a Reply.

    Author

    Write something about yourself. No need to be fancy, just an overview.

    Archives

    No Archives

    Categories

    All

    RSS Feed

  • Infosec
    • Blog
    • Threat Landscape
  • Digital Forensics
    • Windows Forensics
    • Mac Forensics
    • Memory Forensics
    • Forensic Resources
  • Incident Response
  • CISSP
    • Domain-1
    • Domain-2
    • Domain-3
    • Domain-4
    • Domain-5
    • Domain-6
    • Domain-7
    • Domain-8
  • Contact
  • HTB
  • Productivity