paint-brush
Understanding IIC: Identity, Integrity, and Confidentialityby@vali.shah7

Understanding IIC: Identity, Integrity, and Confidentiality

by Vali Shah4mDecember 16th, 2019
Read on Terminal Reader
Read this story w/o Javascript
tldt arrow

Too Long; Didn't Read

Encoding, Encryption, and Hashing are the fundamentals of Software Engineering and why am I over pitching these? I just wanted to talk about these techniques in terms of privacy and security. There is a lot of confusion around these terminologies. Identity, Integrity, and Confidentiality are the keys to building software software. We use an encoding/decoding technique to communicate with computers. Any form of data we store/transform on(through) computer is encoded. We are not for securing the information, it is used to optimize the size of data transmitted and to be consumed by a different type of system.

Company Mentioned

Mention Thumbnail
featured image - Understanding IIC: Identity, Integrity, and Confidentiality
Vali Shah HackerNoon profile picture
Vali Shah

Vali Shah

@vali.shah7

Software Engineer

About @vali.shah7
LEARN MORE ABOUT @VALI.SHAH7'S
EXPERTISE AND PLACE ON THE INTERNET.
L O A D I N G
. . . comments & more!

About Author

Vali Shah HackerNoon profile picture
Vali Shah@vali.shah7
Software Engineer

TOPICS

THIS ARTICLE WAS FEATURED IN...

Permanent on Arweave
Read on Terminal Reader
Read this story in a terminal
 Terminal
Read this story w/o Javascript
Read this story w/o Javascript
 Lite
Learnrepo