Get Instant Help From 5000+ Experts For
Get Instant Help From 5000+ Experts For

Principles of Network Security

By HWA | Publish On: August 31, 2011 | Posted In:

Network security involves three key principles of confidentiality, integrity, and availability. Depending upon the application and context, one of these principles might be more important than the others. For example, a government agency would encrypt an electronically transmitted classified document to prevent an unauthorized person from reading its contents. Thus, the confidentiality of the information is paramount. If an individual succeeds in breaking the encryption cipher and then, retransmits a modified encrypted version, the integrity of the message is compromised. On the other hand, an organization such as would be severely damaged if its network were out of commission for an extended period of time. Thus, availability is a key concern for such e-commerce companies.


Confidentiality is concerned with preventing unauthorized disclosure of sensitive information. This disclosure could be intentional, such as breaking a cipher and reading the information, or it could be unintentional due to the carelessness or incompetence of individuals handling the information.


There are three goals of integrity.

Preventing the modification of information by unauthorized users

Preventing the unauthorized or unintentional modification of information by unauthorized users

Preserving the internal and external consistency

Internal consistency: Ensures that internal data is consistent. For example, in an organizational database, the total number of items owned by an organization must be equal to the sum of the same items shown in the database as being held by each element of the organization.

External Consistency: Ensures that the data stored in the database is consistent with the real world. Relative to the above example, the total number of items physically sitting on the shelf must equal the total number of items indicated by the database.

Why choose


Availability assures that a system’s authorized users have timely and uninterrupted access to the information in the system and to the network.

Other important terms include:

Identification: The act of a user professing an identity to the system, such as login ID

Authentication: Verification that the user’s claimed identity is valid, such as through the use of a password.

Accountability: Determination of the actions and behavior of a single individual within a system and holding the individual responsible for his/her actions.

Authorization: The privileges allocated to an individual or process that enable access to a computer resource.

Want to know how to proceed?

Fill up the assignment help request form on the right or drop us an email at Feel free to contact our customer support on the company 24/7 Live chat or call us on 312-224-1615.

Our “Solution Library” comprises accurate solutions to difficult IT Security assignment questions. It is very useful for the students who look for hints to solve a problem they are stuck with. The aim of Solution Library is to provide step-by-step, fully explained solutions to problems which could serve as high-quality reference material for inquisitive students.

For more details, you can visit our website at

Book Your Assignment

Drop files here or click to upload.
Or click here to upload

Recent Posts

101 Doctoral Dissertation Topics That Are Relevant in 2024

Read More

7 Reasons Why You Need A Professional Dissertation Writer

Read More

101 Pubilc Health Dissertation Topics & Research Titles

Read More

101 Ancient Greek Culture Essay Topics Ideas For You

Read More

101 Persuasive Speech Topics To Grab Attention

Read More

Get assignment help from subject matter experts!

4.7/5 rating | 10,000+ happy students | Great tutors 24/7