The familiar confidentiality, integrity, and availability (CIA) triad is primarily concerned with the ideal characteristics that make information secure which, in turn, makes it reliable and useful to the end user. The McCumber Cube merges information security theory with practical implementation by including policy, education, and technology in its security model. Of course, information must be secure at all times. In light of that fact, this security model also acknowledges the three states in which digital information may be found; i.e., information being stored, information being processed, or information being transmitted. By broadening focus from just the CIA triangle to all three dimensions of information security, the McCumber Cube achieves a holistic scope of the industry.
Policy, Education and Training define the the guidelines in which the CIA triad must be achieved for a given state of data. However, policy, education, nor technology could sufficiently play a role in the enforcement of information security if any of the three did not play a significant role in said enforcement. For this reason, there is an inherent influence among them.
Technology influences education and policy, in that, the information technology (IT) field is ever-evolving and does it so at an impressive pace. By the time new technologies such as cloud computing and solid state drive (SSD) storage become mainstream, the information security field should already be publishing updated academic resources and operating instructions that define how these technologies are implemented securely to achieve and sustain confidentiality, integrity, and availability (CIA triad).
Education influences technology and policy, in that, without education there would be no research in the “research and development” of new technologies, nor would there be an academic foundation that teaches information security policy writers how to implement current and future technologies securely to achieve and sustain confidentiality, integrity, and availability.
Policy influences education and technology, in that, it outlines the requirements to implement technologies in such a way that confidentiality, integrity, and availability can be achieved and sustained for data at rest, data in transit, and data processing. If the available technologies and academic resources are not available to adequately achieve information security for a given state of data, new technologies and academic resources must be developed to meet the requirements of the CIA triad.
Here is an explanation of how three cells relate to online education.
Processing Availability Policy - This policy should define standards and implementation procedures to ensure that authenticated access to the systems that provide the processing power which allows users of the online classroom to achieve a desired objective, such as submitting assignments or participating in discussion boards, should be consistently available without interference. The policy should include administrative controls that allow only authenticated user access to the processing power, a preventative maintenance schedule that ensures minimal impact to the user and defined minimum processing requirements to support authenticated user traffic.
Processing Integrity Policy - This policy should define standards and implementation procedures to ensure that user data being altered, organized or processed by the systems which allow users of the online classroom to achieve a desired objective, such as submitting assignments or participating in discussion boards, should not corrupt user data or disrupt its authenticity. The policy should include administrative controls that detect, deter, and disrupt known malicious tactics, techniques, and procedures or programs which could potentially corrupt data while it is being processed. The policy should also safeguard against non-malicious factors that may result in data corruption such as programming errors by way of coding-error safeguards such as checksums and cyclic redundancy checks.
Transmission Integrity Policy - This policy should define standards and implementation procedures to ensure that user data in transit between information systems should not corrupt user data or disrupt its authenticity. The policy should include administrative controls that detect, deter, and disrupt known malicious tactics, techniques and procedures or programs which could potentially corrupt data while it is being transmitted. The policy should also safeguard against non-malicious factors that may result in data corruption such as suboptimal transmission channels by way regular information transmission assurance inspections to minimize noise during transmission.
The familiar confidentiality, integrity, and availability (CIA) triad is primarily concerned with the ideal characteristics that make information secure which, in turn, makes it reliable and useful to the end user. The McCumber Cube merges information security theory with practical implementation by including policy, education, and technology in its security model. Of course, information must be secure at all times. In light of that fact, this security model also acknowledges the three states in which digital information may be found; i.e., information being stored, information being processed, or information being transmitted. By broadening focus from just the CIA triangle to all three dimensions of information security, the McCumber Cube achieves a holistic scope of the industry.Policy, Education and Training define the the guidelines in which the CIA triad must be achieved for a given state of data. However, policy, education, nor technology could sufficiently play a role in the enforcement of information security if any of the three did not play a significant role in said enforcement. For this reason, there is an inherent influence among them.Technology influences education and policy, in that, the information technology (IT) field is ever-evolving and does it so at an impressive pace. By the time new technologies such as cloud computing and solid state drive (SSD) storage become mainstream, the information security field should already be publishing updated academic resources and operating instructions that define how these technologies are implemented securely to achieve and sustain confidentiality, integrity, and availability (CIA triad).Education influences technology and policy, in that, without education there would be no research in the “research and development” of new technologies, nor would there be an academic foundation that teaches information security policy writers how to implement current and future technologies securely to achieve and sustain confidentiality, integrity, and availability.Policy influences education and technology, in that, it outlines the requirements to implement technologies in such a way that confidentiality, integrity, and availability can be achieved and sustained for data at rest, data in transit, and data processing. If the available technologies and academic resources are not available to adequately achieve information security for a given state of data, new technologies and academic resources must be developed to meet the requirements of the CIA triad.Here is an explanation of how three cells relate to online education.Processing Availability Policy - This policy should define standards and implementation procedures to ensure that authenticated access to the systems that provide the processing power which allows users of the online classroom to achieve a desired objective, such as submitting assignments or participating in discussion boards, should be consistently available without interference. The policy should include administrative controls that allow only authenticated user access to the processing power, a preventative maintenance schedule that ensures minimal impact to the user and defined minimum processing requirements to support authenticated user traffic.Processing Integrity Policy - This policy should define standards and implementation procedures to ensure that user data being altered, organized or processed by the systems which allow users of the online classroom to achieve a desired objective, such as submitting assignments or participating in discussion boards, should not corrupt user data or disrupt its authenticity. The policy should include administrative controls that detect, deter, and disrupt known malicious tactics, techniques, and procedures or programs which could potentially corrupt data while it is being processed. The policy should also safeguard against non-malicious factors that may result in data corruption such as programming errors by way of coding-error safeguards such as checksums and cyclic redundancy checks.
Transmission Integrity Policy - This policy should define standards and implementation procedures to ensure that user data in transit between information systems should not corrupt user data or disrupt its authenticity. The policy should include administrative controls that detect, deter, and disrupt known malicious tactics, techniques and procedures or programs which could potentially corrupt data while it is being transmitted. The policy should also safeguard against non-malicious factors that may result in data corruption such as suboptimal transmission channels by way regular information transmission assurance inspections to minimize noise during transmission.
การแปล กรุณารอสักครู่..
