178k views
4 votes
What technology is not used to implement confidentiality?

a) encryption
b) access controls
c) auditing
d) authentication

User Wakjah
by
8.8k points

1 Answer

5 votes

Final answer:

Auditing is the technology that is not used to implement confidentiality. It is a process that reviews the effectiveness of security controls rather than actively protecting data confidentiality.

Step-by-step explanation:

To answer which technology is not used to implement confidentiality, we need to understand the role of each technology listed.

  • Encryption is a method to protect the confidentiality of data by transforming it into a non-readable format for unauthorized users.
  • Access controls are used to ensure that only authorized individuals can access certain information, thus maintaining its confidentiality.
  • Authentication is a process to verify that somebody is who they claim to be, which is crucial in maintaining the confidentiality of data by ensuring that only authorized users can access sensitive information.

However, auditing is not primarily used to implement confidentiality. Instead, auditing is a process of reviewing and analyzing the effectiveness of other security controls, ensuring that access to data is managed correctly, and identifying any possible breaches that may have occurred.

User Rick Grundy
by
8.1k points