CIA Triad

Confidentiality

  • Measures used to ensure the protection of secrecy of data, objects, or resources

  • Goal - prevent or minimize unauthorized access to data

  • Focuses security measures on making sure that no one other than the intended recipient of a message receives it or is able to read it

  • Examples of security controls

    • Encryption

    • Access controls

    • Steganography

  • Object

    • passive element in a security relationship

    • Examples

      • Files

      • Computers

      • Network connections

      • Applications

  • Subject

    • Active element in a security relationship

    • Examples

      • Users

      • Programs

      • Computers

  • Sensitivity

    • quality of information, which could cause harm if disclosed

  • Discretion

    • an act of decision where an operator can influence of control disclosure in order to minimize harm or damage.

  • Criticality

    • level to which information is mission critical

    • the higher the level of criticality the more important it is to maintain confidentiality of the information.

  • Concealment

    • act of hiding or preventing disclosure

    • Often viewed as means of cover, obfuscation, or distraction

    • Concept of attempting to gain protection through hiding, silence or secrecy

  • Secrecy

    • act of keeping something a secret or preventing the disclosure information

  • Privacy

    • keeping information confidential that is personally identifiable

  • Seclusion

    • Storing something in an out of the way location

    • Provide strict access controls

    • Help enforcement of confidentiality protections

  • Isolation

    • Act of keeping something separated from others

    • Prevent commingling of information or disclosure of information

Integrity

  • Integrity

    • Concept of protecting the reliability and correctness of data

    • Prevents unauthorized alterations of data

    • Ensures that data remains correct, unaltered and preserved

  • Proper integrity protection provides a means for authorized changes while protecting against intended and malicious unauthorized activities as well as mistakes made by authorized users

  • Three perspectives

    • Preventing unauthorized subjects from making modifications

    • Preventing authorized subjects from making unauthorized modifications, such as mistakes

    • Maintaining the internal and external consistency of objects so that their data is a correct and true reflection of the real world and any relationship with any child, peer, or parent object is valid, consistent, and verifiable

  • Attacks focused on violation of integrity

    • Viruses

    • Logic bombs

    • Unauthorized access

    • Errors in coding and applications

    • Malicious modification

    • Intentional replacement

    • System back doors

  • Events that lead to integrity breaches

    • Modifying or deleting files

    • Entering invalid data

    • Altering configurations

    • Errors in commands, codes and scripts

    • Introducing a virus

    • Executing malicious code

  • Countermeasures

    • Strict access control

    • Rigorous authentication procedures

    • Intrusion detection systems

    • Object/data encryption

    • Hash total verifications

    • Interface restrictions

    • Input/function checks

    • Extensive personnel training

  • Other concepts, conditions and aspects

    • Accuracy - being correct and precise

    • Truthfulness - being a true reflection of reality

    • Authenticity - being authentic or genuine

    • Validity - being factually or logically sound

    • Nonrepudiation - not being able to deny having performed an action or activity or being able to verify the origin of a communication or event

    • Accountability - being responsible or obligated for actions and results

    • Responsibility - being in charge or having control over something or someone

    • Completeness - having all needed and necessary components or parts

    • Comprehensiveness - being complete in scope; the full inclusion of all needed elements

Availability

  • Availability

    • Authorized subjects are granted timely and uninterrupted access to objects.

    • Offers a high level of assurance that the data, objects, and resources are accessible to authorized subjects

  • To maintain availability controls have to be in place to ensure

    • Authorized access

    • Acceptable level of performance

    • Quickly handle interruptions

    • Provide for redundancy

    • Maintain reliable backups

    • Prevent data loss or destruction

  • Threats to availability

    • Device failure

    • Software errors

    • Environmental issues

    • DoS attacks

    • Object destruction

    • Communication interruptions

  • Events that lead to availability breaches

    • Accidentally deleting files

    • Overutilizing a hardware or software component

    • Under-allocating resources

    • Mislabeling or incorrectly classifying objects

  • Countermeasures

    • Designing intermediary delivery systems properly

    • Using access controls effectively

    • Monitoring performance and network traffic

    • Use firewalls and routers to prevent DoS attacks

    • Implementing redundancy for critical systems

    • Maintaining and testing backup systems

  • Other concepts, conditions, and aspects of availability

    • Usability - state of being easy to use or learn or being able to be understood and controlled by a subject.

    • Accessibility - assurance that the widest range of subjects can interact with a resource regardless of their capabilities or limitations

    • Timeliness - prompt, on time, within a reasonable time frame, or providing low-latency response

AAA Services

  • Identification

    • claiming to be someone else when trying to access a secured area or system

    • Subject has to provide an identity to a system to start the process of authentication

  • Authentication

    • proving that you are who you claim to be

    • Process of verifying or testing the subject is who they claim to be

    • Authentication factor used to verify identity

      • Passwords

      • Pins

      • Keys, tokens, smartcards

      • Biometrics

  • Authorization

    • defining the permissions of a resource and object access for a specific identity

    • Making sure that the requested activity or access to an object is allowed given the rights and privileges assigned to the identification identity

  • Auditing

    • recording a log of the events and activities related to the system and subjects

    • Process by which unauthorized or abnormal activities are detected on a system

  • Accounting (accountability)

    • reviewing log files to check for compliance and violations in order to hold subjects accountable for their actions

    • Established by linking a human to the activities of an online identity through auditing, authorization, authentication and identification mechanisms.

Last updated