From the course: ISC2 Certified Information Systems Security Professional (CISSP) (2024) Cert Prep

Unlock this course with a free trial

Join today to access over 23,200 courses taught by industry experts.

Confidentiality

Confidentiality

- [Instructor] Throughout this course, you'll learn about many different controls that information security professionals use to achieve their goals. Each of these controls is aligned with at least one of the three key objectives of information security: confidentiality, integrity, or availability. Let's take a look at some of the controls that security professionals use to enhance confidentiality. One way we protect the confidentiality of information is preventing people from accessing sensitive information in the first place. Access controls are the primary mechanism for restricting people from seeing data that they shouldn't see. Access controls protect confidentiality by limiting users to accessing only those files where they've been granted permission. Encryption is also an important security control for enforcing confidentiality. Attackers may try to steal information without going through normal channels. For example, they might attempt to eavesdrop on network communications…

Contents