End user perception is about how people view and experience the network in day-to-day life. Most people don’t think about technical things about the network but they care about how well the network works for them.
So End users always want a Fast, Secure, and Available network this is the basic requirement.
If I think about the network from an End user lens we must think about three things.
- Is My network providing Confidentiality?
- Is My Network Providing Integrity?
- Is my network providing availability?
Confidentiality
Confidentiality ensures that information is only accessible to authorized individuals or entities. This means that unauthorized users should not be able to access sensitive data. Measures such as encryption, access controls, and user authentication are implemented to maintain confidentiality.
Example: Email Encryption When you send an email using a secure email service like Gmail with end-to-end encryption enabled, the content of your email is encrypted before it leaves your device. Only the intended recipient, who possesses the decryption key, can access and read the message. This ensures that even if the email is intercepted during transmission, unauthorized individuals cannot read its contents.
There are mainly Two types of DATA.
- Static Data – The data that is present inside the database or any other storage system is called Static Data and if you want to access this you must need access or permission.
- Floating Data – Data that we are sending over the Network or Internet is called Floating Data. E.g. – WhatsApp messages.
For Static Data as well as for Floating Data we need confidentiality:
- Confidentiality for Static Data: This ensures that only the authorized person or user can access this data. Multiple ways provide confidentiality of data like Access Control, Encryption, user Authentication, and many more. By implementing this method we can avoid tampering with our Data.
- Confidentiality for Floating (Dynamic) Data: Similar to Static Data, Floating data is also very crucial for us. Nowadays whatever we are exchanging over the internet is called floating data. So to secure these data we have multiple methods like VPN, Encryption, and many more.
Integrity
Integrity ensures that our Data Remains accurate, complete, and unchanged during its lifecycle. It means that our Data can not be modified or tampered with by any unauthorized person. Its main motive is Trustworthiness and reliability. As end users, we always want our data not to be tampered with in any case over the internet and this is the end user’s right.
Availability
Availability ensures that we can access the internet as well as our Data present on the server every time. It means the system should be operational and responsive 24*7. There are multiple techniques by which multiple ISPs or Multinational companies provide the Availability.
For example Amazon, We know Amazon is a popular e-commerce website that experiences a very huge amount of traffic in a Seccod during holiday sales. To ensure the availability of the website and prevent it from a huge load on the server company uses the Load balancing feature. It means there are multiple Servers of Amazon on which traffic is distributed so one server load will be less and avoid any type of disruption during the holiday sales.