Historically, information surety has involved four areas of
consideration relating to the properties of information that we would
like to control.
Integrity is commonly considered in any of four different forms:
The opposite of integrity is commonly called corruption.
- Protection from unauthorized modification.
- Reflective of reality.
- Suitable to the purpose.
- From a reliable source.
The opposite of availability is commonly called denial of services, denial of use, denial of information, or simply denial.
Confidentiality goes under many different names, including privacy and
secrecy. Most people want privacy, but many dislike secrecy - even though -
at some level - they are the same thing.
The opposite of confidentiality is commonly called leakage.
Use control is the combination of preventing unauthorized use and
assuring authorized use. The opposite of use control is unauthorized
use or to prevention of authorized use (i.e. denial of use).