#Áåëüãèáàåâà À.Ê. Information security and the CIA triad

 

 

Belgibayeva Alfiya

S.Toraighyrov Pavlodar State University, Kazakhstan

Information security and the CIA triad

 

An examination of the potential problems that can arise on a poorly secured system will help in understanding the need for security. Three basic kinds of malicious behavior are:

– Denial of service.

– Compromising the integrity of the information.

– Disclosure of information.

Denial of Service. Denial of service occurs when a hostile entity uses a critical service of the computer system in such a way that no service or severely degraded service is available to others. Denial of service is a difficult attack to detect and protect against, because it is difficult to distinguish when a program is being malicious or is simply greedy.An example of denial of service is an Internet attack, where a attacker requests a large number of connections to an Internet server. Through the use of an improper protocol, the attacker can leave a number of the connections half open. Most systems can handle only a small number of half-open connections before they are no longer able to communicate with other systems on the net. The attack completely disables the Internet server.

Compromising the Integrity of the Information. Most people take for granted that the information stored on the computer system is accurate, or at least has not been modified with a malicious intent. If the information loses its accuracy, the consequences can be extreme. For example, if competitors hacked into a company’s data base and deleted customer records, a significant loss of revenues could result. Users must be able to trust that data are accurate and complete.

Disclosure of  Information. Probably the most serious attack is disclosure of information. If the information taken off a system is important to the success of an organization, it has considerable value to a competitor. Corporate espionage is a real threat, especially from foreign companies, where the legal reprisals are much more difficult to enforce. Insiders also pose a significant threat. Limiting user access to the information needed to perform specific jobs increases data security dramatically.

Information security (IS) is designed to protect the confidentiality, integrity and availability of computer system data from those with malicious intentions.

The CIA triad is one of the core principles of information security. It is made up of three main components: Confidentiality, Integrity and Availability. There is a continuous debate about extending this classic trio. Issues such as Non– Repudiation do not fit well within the three core concepts. Legality is also becoming a key consideration for practical security installations.

The Parkerian hexad is a set of six elements of information security that adds three additional attributes to the three classic security attributes of the CIA triad. The Parkerian Hexad attributes are the following:

– Confidentiality

Is the information protected from unauthorized disclosure and observation?

Elements of security that help enforce confidentiality are: encryption, authentication, access control, physical security, and permissions.

– Integrity

Is the information complete, whole and unchanged from the previous state?

Element of security that help enforce integrity: hashing techniques.

– Availability

Are information and systems available so that they can be accessed in a timely manner for the intended purpose?

Elements of security that help maintain availability: tolerance and redundancy techniques – disk redundancies, server redundancies, site redundancies, backups, alternate power and cooling systems.

– Non-Repudiation or Authenticity

Is the information genuine, valid, and not fraudulent?

Elements of security that help maintain availability: digital signatures, logging.

– Possession or Control

Is the information is the control of the authorized individuals?

– Utility or Usefulness

Is the information usable for its intended purpose?

Information security handles risk management. Anything can act as a risk or a threat to the CIA triad or Parkerian hexad. Sensitive information must be kept - it cannot be changed, altered or transferred without permission. For example, a message could be modified during transmission by someone intercepting it before it reaches the intended recipient. Good cryptography tools can help mitigate this security threat.

Digital signatures can improve information security by enhancing authenticity processes and prompting individuals to prove their identity before they can gain access to computer data.

Information systems security does not just deal with computer information, but also protecting data and information in all of its forms, such as telephone conversations.

Risk assessments must be performed to determine what information poses the biggest risk. For example, one system may have the most important information on it and therefore will need more security measures to maintain security. Business continuity planning and disaster recovery planning are other facets of an information systems security professional. This professional will plan for what could happen if a major business disruption occurs, but still allow business to continue as usual.

 

References:

1.                     Acuff, Jr., A. Marshall. "Information Security Impacting Securities Valuations: Information Technology and the Internet Changing the Face of Business," Institute of Internal Auditors, 2000.

2.                     Barbara Guttman and Edward A. Roback. An Introduction to Computer Security: The NIST Handbook, 1995.

3.                     Micki Krause and Harold F. Tipton Handbook of Information Security Management, 1998.