Explain the difference between the terms security, privacy and integrity of data
6.1 Data Protection – Security, Privacy and Integrity
Learning Objectives (AO1‑AO3)
AO1 – Knowledge: Define the three fundamental concepts of data protection and use the exact syllabus terminology (confidentiality, integrity, availability, non‑repudiation, privacy).
AO2 – Application: Identify technical and legal measures that support each concept, citing the relevant standards and legislation.
AO3 – Analysis & Design: Evaluate how security, privacy and integrity interact when designing a data‑handling system, using a short case‑study.
Technical and procedural safeguards that protect data from unauthorised access, disclosure, alteration, destruction or loss, and that provide proof of origin and receipt.
The right of individuals (or organisations) to control how their personal or sensitive information is collected, stored, processed, shared and destroyed.
GDPR (EU), Data Protection Act 2018 (UK), CCPA (California)
Integrity
Assurance that data is accurate, complete, and has not been altered in an unauthorised manner throughout its lifecycle.
Audit Trails & Logging – record who accessed/changed data, timestamps and source IP; essential for accountability, privacy compliance and integrity verification.
Backup & Recovery – regular, immutable backups stored off‑site to ensure availability and protect against ransomware.
Physical Controls – locked server rooms, CCTV, secure disposal of media.
Privacy Controls (AO2)
Informed Consent – explicit, freely given permission before collection or sharing (GDPR Art. 6).
Data Minimisation – collect only data necessary for the stated purpose.
Anonymisation & Pseudonymisation – remove or replace identifying attributes to reduce risk.
Rights of Access, Rectification & Erasure – mechanisms for data subjects to view, correct or delete their data (GDPR Art. 15, 17).
Privacy‑by‑Design & Privacy Impact Assessments (PIA) – embed privacy considerations from the earliest design stage and assess risks before deployment.
Integrity Mechanisms (AO2)
Validation Checks – range, format, length and presence checks at input time.
Checksums & Hashes – cryptographic hash functions (e.g., SHA‑256) to detect accidental or malicious alteration.
Digital Signatures – hash encrypted with the sender’s private key; receiver verifies with the public key, providing integrity and non‑repudiation.
Version Control & Auditing – maintain a history of changes and who made them.
storeHash(file, salt, hash) // keep both salt and hash
return hash
// Verify the integrity of a file
function verifyHash(file):
storedSalt, storedHash = retrieveStoredHash(file)
data = readBytes(file)
salted = concat(storedSalt, data)
currentHash = SHA256(salted)
if currentHash == storedHash:
return "Integrity OK"
else:
return "Data has been altered"
Note: SHA‑256 is preferred over MD5 or SHA‑1 because it offers far greater collision resistance. Adding a unique salt prevents pre‑computed rainbow‑table attacks.
Checksums, digital signatures, input validation, version control.
Key Standard / Law
ISO 27001, ISO 27002, NIST CSF.
GDPR, Data Protection Act 2018, CCPA.
PCI‑DSS, ISO 27002 (integrity controls).
Failure Consequence
Unauthorised disclosure, financial loss, reputational damage, service outage.
Regulatory fines, loss of trust, legal action.
Wrong decisions, system malfunction, loss of credibility.
Inter‑relationship of Security, Privacy & Integrity (AO3)
Security ↔ Privacy: Encryption (a security control) enforces privacy by ensuring only authorised parties can read personal data (confidentiality).
Security ↔ Integrity: Hashing and digital signatures are security mechanisms that detect unauthorised modification, thereby preserving integrity.
Privacy ↔ Integrity: Privacy regulations (e.g., GDPR Art. 5) require that personal data be accurate and unaltered, mandating integrity checks as part of compliance.
All three together – case study:
A multinational e‑commerce site uses TLS 1.3 (security) for all client‑server communications. TLS provides:
Confidentiality – data is encrypted, protecting personal details (privacy).
Integrity – MAC (Message Authentication Code) ensures the payload has not been tampered with.
Non‑repudiation – server presents a certificate signed by a trusted CA, proving its identity.
The site also runs a Privacy Impact Assessment, stores only the necessary fields (data minimisation), and logs every access to the database for audit (integrity & accountability). This single control set simultaneously satisfies the three concepts, illustrating the layered, defence‑in‑depth approach expected in the syllabus.
Real‑World Illustrations
Security example: A bank uses hardware security modules (HSMs) to protect encryption keys, MFA for online banking, firewalls at the network perimeter, and daily immutable backups.
Privacy example: A health‑tracking app obtains explicit consent before sharing step‑count data, offers a “Delete my data” button (GDPR Art. 17), and stores data in a pseudonymised form.
Integrity example: A firmware update server publishes a SHA‑256 hash and a digital signature; devices verify both before installing the update.
Network‑level example: A corporate LAN is protected by a stateful firewall and a site‑to‑site VPN. The firewall enforces confidentiality (blocks unauthorised traffic), the VPN provides integrity (IPsec ESP with authentication), and both support privacy by ensuring only authorised remote offices can access internal data.
Suggested Diagram
Venn diagram showing the overlap of Security, Privacy and Integrity.
Examples in each region:
Security ∩ Privacy – “Encrypted personal health record”.
Security ∩ Integrity – “Signed software update”.
Privacy ∩ Integrity – “Audit‑logged data correction with consent”.
All three – “TLS‑protected online banking transaction”.
Summary (Key Take‑aways)
Security provides confidentiality, integrity, availability and non‑repudiation through technical and procedural safeguards.
Privacy defines the legal and ethical rights of data subjects over personal information.
Integrity guarantees that data remains accurate, complete and unaltered.
Effective data‑protection design integrates all three: security mechanisms enforce privacy, integrity checks support security, and privacy legislation mandates integrity and confidentiality.
Use the exact syllabus terminology and cite the appropriate standards (ISO 27001/27002, NIST CSF, GDPR, DPA 2018, PCI‑DSS) to maximise marks across AO1‑AO3.
Support e-Consult Kenya
Your generous donation helps us continue providing free Cambridge IGCSE & A-Level resources,
past papers, syllabus notes, revision questions, and high-quality online tutoring to students across Kenya.