
Another interesting consideration with respect to confidentiality is the question of how we know if a user truly is the person or system that they claim to be. This question speaks directly to the difference between identification and authentication. In generic terms, identification can be thought of as the process of proving that someone is who they say they are. By contrast, authentication is the process of proving that something is genuine, true, or authentic. In the world of information security, it is often very difficult or infeasible to truly identify a real human being or a specific system. Instead, we commonly use methods of authentication, and in so doing we assume that the credentials being used for purposes of authentication are being used only by the real-world system or human being to whom those credentials apply. This is, of course, a risky assumption, since through malicious or non-malicious means it might be very possible for another person to obtain your login credentials. If that person were then to use those credentials to login to, say, your social networking account, as far as the social networking site is concerned, that person is you. After having received appropriate credentials, the system will assume that the malicious party is, in fact, the real-world human being to whom those credentials actually belong. Confidentiality is thus difficult to ensure with 100% certainty, but it is nevertheless often the easiest security goal to assess in terms of whether or not efforts aimed at ensuring confidentiality have been successful.
0 comments :
Post a Comment