So far we have been informally presenting problems that need to be addressed when dealing with data transmission over a computer network, such as the Internet. Now, we give more precise definitions of concepts related to security of data.
The problem of data confidentiality is that of protecting sensitive data from being eavesdropped (taken over) by a third party that has no legitimate use of it.
In case of communication, the confidentiality deals with:
By integrity of transmitted data one understands such condition that, upon receiving the data, the receiving party can:
Note that integrity of data can be broken by corruption resulting from other causes than malicious behaviour of other users, i.e. can have its roots not related to security. This is the case of transmission errors, lost packets, etc. that have physical causes. We will focus on preventing corruption resulting from malicious abuse, and let other mechanisms deal with physical errors (see section on ISO-OSI model).
Alternatively called source authentication, data authenticity is a concept by which the receiving party can determine the identity and legitimity of the source.
According to this idea, each entity in a network should (must) have its own identity, i.e. a set of unique properties that can be verified beyond doubt as pertaining to this and only this entity. To that end, certificates are widely used, bringing along the concept of hierarchical tree of certificates. Namely, a given set of features uniquely identifying given entity must be confirmed by some other entity, who must be