Chapter 1. Security Overview
15
(IEEE). The same ideals hold true for information security. Many security consultants and vendors
agree upon the standard security model known as CIA, or Confidentiality, Integrity, and Availability.
This three tiered model is a generally accepted component to assessing risks to sensitive information
and establishing security policy. The following describes the CIA model in greater detail:
Confidentiality Sensitive information must be available only to a set of pre defined individuals.
Unauthorized transmission and usage of information should be restricted. For example, confiden
tiality of information ensures that a customer's personal or financial information is not obtained by
an unauthorized individual for malicious purposes such as identity theft or credit fraud.
Integrity Information should not be altered in ways that render it incomplete or incorrect. Unau
thorized users should be restricted from the ability to modify or destroy sensitive information.
Availability Information should be accessible to authorized users any time that it is needed.
Availability is a warranty that information can be obtained with an agreed upon frequency and
timeliness. This is often measured in terms of percentages and agreed to formally in Service Level
Agreements (SLAs) used by network service providers and their enterprise clients.
1.2. Security Controls
Computer security is often divided into three distinct master categories, commonly referred to as
controls:
Physical
Technical
Administrative
These three broad categories define the main objectives of proper security implementation. Within
these controls are sub categories that further detail the controls and how to implement them.
1.2.1. Physical Controls
The physical control is the implementation of security measures in a defined structure used to deter or
prevent unauthorized access to sensitive material. Examples of physical controls are:
Closed circuit surveillance cameras
Motion or thermal alarm systems
Security guards
Picture IDs
Locked and dead bolted steel doors
1.2.2. Technical Controls
The technical control uses technology as a basis for controlling the access and usage of sensitive data
throughout a physical structure and over a network. Technical controls are far reaching in scope and
encompass such technologies as:
Encryption
Smart cards
Network authentication
footer
Our partners:
PHP: Hypertext Preprocessor Best Web Hosting
Java Web Hosting
Inexpensive Web Hosting
Jsp Web Hosting
Cheapest Web Hosting
Jsp Hosting
Cheap Hosting
Visionwebhosting.net Business web hosting division of Web
Design Plus. All rights reserved