Security Goals

Security Goals in Cryptography and Network Security

The main Goal of  Security is to protect data or information which is being transmitted and achieve the Confidentiality Integrity & Availability of the data.

  • Following are the main goal of information security.
  1. Confidentiality
  2. Integrity
  3. Availability 


Security Goals
  • Confidentiality refers to limiting information access and disclosure to authorized users and preventing access by or disclosure to unauthorized ones.
  • Sensitive information should be kept secret from individuals who are not authorized to see the information.
  • The goal of confidentiality is authentication methods like user-IDs and passwords that uniquely identify a data system’s users, and supporting control methods that limit each identified user’s access to the data system’s resources.
  • Confidentiality is not only applied to storage of data but also applies to the transmission of information.
  • Confidentiality means that people cannot read sensitive information, either while it is on a computer or while it is travelling across a network.


  • Integrity refers to the trustworthiness of information resources.
  • Integrity should not be altered without detection.
  • It includes the concept of “data integrity” namely, that data have not been changed inappropriately, whether by accident or deliberately malign activity.
  • It also includes “origin” or “source integrity” that is, that the data actually came from the person or entity you think it did, rather than an imposter.
  • Integrity ensures that information is not changed or altered in transit. Under certain attack models, an adversary may not have to power to impersonate an authenticated party or understand a confidential communication but may have the ability to change the information being transmitted.
  • On a more restrictive view, however, the integrity of an information system includes only preservation without corruption of whatever was transmitted or entered into the system, right or wrong.


  • Availability refers, to the availability of information resources. An information system that is not available when you need it is at least as bad as none at all.
  • Availability means that people who are authorized to use information are not prevented from doing so. It may be much worse, depending on how reliant the organization has become on a functioning computer and communications infrastructure.
  • Almost all modern organizations are highly dependent on functioning information systems. Many literally could not operate without them.
  • Availability, like other aspects of security, may be affected by purely technical issues (e.g. a malfunctioning part of a computer or communications device), natural phenomena (e.g. wind or %voter), or human causes (accidental or deliberate).

For example, an object or service is thought to be available if

  1.   It is present in a usable form.
  2. It has capacity enough to meet the services needs.
  3. The service is completed an acceptable period of time.
  • By combining these goals, we can construct the availability. The data item, service or system is available if
  1. There is a timely response to our request.
  2. The service and system can be used easily.
  3. Concurrency is Controlled.
  4. It follows the fault tolerance.
  5. Resources are allocated fairly.


Akhil Trivedi