1. The principle of confidentiality specifies that only the sender and intended recipient should be able to access the content of a message.
  2. Confidentiality gets compromised if an unauthorized person is able to access message.
  3. An example of comprising the confidentiality of message is shown in figure. The user of computer A want to send message to user of computer B. another user C gets access to this message which is not intended to get this message then it defeat purpose of confidentiality.
  4. If confidential email sent by A to B is accessed by C without permission from A or B then this type of attack is known as interception.



We're not around right now. But you can send us an email and we'll get back to you, asap.


©2018 MYBSCIT.com. An initiative by some failures to make student scholars.


Log in with your credentials

Forgot your details?