See utility program
Usefulness; fitness for a particular use. Utility is one of the six fundamental components of information security (see Parkerian Hexad
). For example, if data are encrypted and the decryption key is unavailable, the breach of security is in the lack of utility of the data (they are still confidential, possessed, integral, authentic and available).