Understanding IIC: Identity, Integrity, and Confidentiality

Written by vali.shah7 | Published 2019/12/16
Tech Story Tags: security | software-engineering | compliance-and-performance | information-security | data-workflow-management | software-development | cybersecurity | privacy | web-monetization

TLDR Encoding, Encryption, and Hashing are the fundamentals of Software Engineering and why am I over pitching these? I just wanted to talk about these techniques in terms of privacy and security. There is a lot of confusion around these terminologies. Identity, Integrity, and Confidentiality are the keys to building software software. We use an encoding/decoding technique to communicate with computers. Any form of data we store/transform on(through) computer is encoded. We are not for securing the information, it is used to optimize the size of data transmitted and to be consumed by a different type of system.via the TL;DR App

no story

Written by vali.shah7 | Software Engineer
Published by HackerNoon on 2019/12/16