Difference between revisions of "Confidentiality"

From CIPedia
Jump to navigation Jump to search
m (IETF)
Line 33: Line 33:
 
==== [[Turkey]] ====
 
==== [[Turkey]] ====
 
{{definition|Information systems and data can be accessed by authorized persons or systems only, and the confidential information pertaining to information systems or confidential information in the system will not be disclosed by unauthorized persons or systems. <ref> [http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/TUR_NCSS.pdf Turkey's National Cyber Security Strategy and 2013-2014 Action Plan]</ref><br /><br />Gizlilik: Bilişim sistem ve verilerine sadece yetkili kişi veya sistemlerce erişilebilmesini; bilişim sistemlerine ait veya sistemdeki gizli verinin yetkisiz kişi veya sistemlerce ifşa edilmemesini. <ref>[http://www.resmigazete.gov.tr/eskiler/2013/06/20130620-1-1.pdf UlUSAL SİBER GÜVENLİk STRATEJİSİ VE]</ref>}}<br />
 
{{definition|Information systems and data can be accessed by authorized persons or systems only, and the confidential information pertaining to information systems or confidential information in the system will not be disclosed by unauthorized persons or systems. <ref> [http://www.enisa.europa.eu/activities/Resilience-and-CIIP/national-cyber-security-strategies-ncsss/TUR_NCSS.pdf Turkey's National Cyber Security Strategy and 2013-2014 Action Plan]</ref><br /><br />Gizlilik: Bilişim sistem ve verilerine sadece yetkili kişi veya sistemlerce erişilebilmesini; bilişim sistemlerine ait veya sistemdeki gizli verinin yetkisiz kişi veya sistemlerce ifşa edilmemesini. <ref>[http://www.resmigazete.gov.tr/eskiler/2013/06/20130620-1-1.pdf UlUSAL SİBER GÜVENLİk STRATEJİSİ VE]</ref>}}<br />
 +
 +
==== [[United States]]====
 +
===== [[NIST]]=====
 +
{{definition|Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. <ref>[http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST Special Publication 800-53 Rev 4: Security and Privacy Controls for Federal Information Systems
 +
and Organizations (April 2013) / 44 U.S.C., Sec. 3542]</ref>}}<br/><br/>
  
 
=== Standard Definition ===
 
=== Standard Definition ===
Line 55: Line 60:
  
 
[[Category:Information]][[Category:Security]]
 
[[Category:Information]][[Category:Security]]
{{#set:defined by=ITU-T|defined by=Brazil|defined by=Cameroon|defined by=Czech Republic|defined by=India|defined by=Japan|defined by=Luxembourg|defined by=Netherlands|defined by=Norway|defined by=Turkey|defined by=ISO|defined by=IETF}}
+
{{#set:defined by=ITU-T|defined by=Brazil|defined by=Cameroon|defined by=Czech Republic|defined by=India|defined by=Japan|defined by=Luxembourg|defined by=Netherlands|defined by=Norway|defined by=Turkey|defined by=United States|defined by=NIST|defined by=ISO|defined by=IETF}}

Revision as of 21:30, 14 March 2016


Definitions

International definitions

ITU-T

The property that information is not made available or disclosed to unauthorized individuals, entities, or processes. [1]


Confidentialité: Propriété d'une information qui n'est ni disponible, ni divulguée aux personnes, entités ou processus non autorisés. [2]


Confidencialidad: Propiedad que garantiza que la información no se pone a disposición ni se divulga a personas, entidades o procesos no utorizados. [3]


机密性: 防止信息提供或泄露给未经授权的个人、实体或过程的特性. [4]


National Definitions

Brazil

Confidencialidade: propriedade de que a informação não esteja disponível ou revelada a pessoa física, sistema, órgão ou entidade não autorizado e credenciado. [5]
Confidentiality is the property that information is not available or disclosed to an unauthorized and non-accredited individual, system, agency or entity.


Cameroon (Cameroun)

Confidentialité: maintien du secret des informations et des transactions afin de prévenir la divulgation non autorisée d’informations aux non destinataires permettant la lecture, l’écoute, la copie illicite d’origine intentionnelle ou accidentelle durant leur stockage, traitement ou transfert. [6]


Czech Republic

Vlastnost, že informace není dostupná nebo není odhalena neautorizovaným jednotlivcům, entitám nebo procesům. [7]

Characteristic that information is not available or is not disclosed to unauthorized individuals, entities or processes. [8]


India

The condition in which sensitive data is kept secret and disclosed only to authorized parties. [9]


Japan

データの守秘性: (例えば、権限のない任意のシステム主体に対して)情報が利用されない、または権限のない個人、主体、またはプロセスに開示されない特性.

The property that information is not made available or disclosed to unauthorized individuals, entities, or processes. [10]


Luxembourg

Confidentialité: propriété d’une information qui n’est ni disponible, ni divulguée aux personnes, entités ou processus non autorisés. [11]


Netherlands

Vertrouwelijkheid is de mate waarin toegang tot informatie beperkt is tot degenen die daartoe bevoegd zijn. [12]


Norway

Assurance that specific information is not disclosed to unauthorised persons, and that only authorised persons have access. [13]
Konfidensialitet: Sikkerhet for at nærmere angitt informasjon ikke avsløres for uvedkommende, og at kun autoriserte personer får tilgang til denne. [14]


Turkey

Information systems and data can be accessed by authorized persons or systems only, and the confidential information pertaining to information systems or confidential information in the system will not be disclosed by unauthorized persons or systems. [15]

Gizlilik: Bilişim sistem ve verilerine sadece yetkili kişi veya sistemlerce erişilebilmesini; bilişim sistemlerine ait veya sistemdeki gizli verinin yetkisiz kişi veya sistemlerce ifşa edilmemesini. [16]


United States

NIST
Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. [17]



Standard Definition

IETF

(Data) The property that data is not disclosed to system entities unless they have been authorized to know the data. [18]


ISO/IEC 27000:2014

Property that information is not made available or disclosed to unauthorized individuals, entities, or processes. [19]


See also

Notes

  1. ITU Security in Telecommunications and Information Technology: An overview of issues and the deployment of existing ITU-T Recommendations for secure telecommunications, ITU-T, Geneva (2012) - ITU-T X-800.
  2. Sécurité dans les télécommunications et les technologies de l’information: Aperçu des problèmes et présentation des Recommandations UIT-T existantes sur la sécurité dans les télécommunications, ITU-T, Geneva (2012) - ITU-T X.800.
  3. Seguridad de las telecomunicaciones y las tecnologías de la información: Exposición general de asuntos relacionados con la seguridad de las telecomunicaciones y la aplicación de las Recomendaciones vigentes del UIT-T, ITU-T, Geneva (2012) - ITU-T X.800.
  4. 关于电信安全的若干议题综述 及相关ITU-T建议书应用简介, ITU-T, Geneva (2012) - ITU-T H.235.
  5. GUIA DE REFERÊNCIA PARA A SEGURANÇA DAS INFRAESTRUTURAS CRÍTICAS DA INFORMAÇÃO Versão 01 (Nov. 2010)/ Instrução Normativa Nº 1, de 13 de junho de 2008. Gabinete de Segurança Institucional da Presidência da República.
  6. LOI N°2010/012 DU 21 DECEMBRE 2010 RELATIVE A LA CYBERSECURITE ET LA CYBERCRIMINALITE AU CAMEROUN
  7. http://www.govcert.cz/download/nodeid-561 Výkladový slovník kybernetické bezpečnosti (2013)
  8. Cyber Security Explanatory Glossary (2013)
  9. India's DGQA Cyber Security Policy (2015)
  10. http://www.ipa.go.jp/security/rfc/RFC2828EN.html RFC2828 (Japanese translation)
  11. [From French Glossary]
  12. Zakboekje Preventie Cybercrime (2008
  13. Cyber Security Strategy for Norway (2012)
  14. Nasjonal strategi for informasjonssikkerhet (2012)
  15. Turkey's National Cyber Security Strategy and 2013-2014 Action Plan
  16. UlUSAL SİBER GÜVENLİk STRATEJİSİ VE
  17. [http://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-53r4.pdf NIST Special Publication 800-53 Rev 4: Security and Privacy Controls for Federal Information Systems and Organizations (April 2013) / 44 U.S.C., Sec. 3542]
  18. IETF RFC449 Internet Security Glossary 2
  19. ISO/IEC 27000:2014, Information technology -- Security techniques -- Information security management systems -- Overview and vocabulary