Confidentiality is the avoidance of the authorized disclosure of information.
Encryption is the transfer of information using a secret encryption key, so the info can only be read using another key (the decryption key).
Authentication is the determination of the identity that someone has to decide whether access should be provided.
Physical security is the establishment of physical barriers to limit access to protected computational resources.