Chapter 1-1
Chapter 1-1
Paktia University
Faculty of Computer Science
Chapter 1
Integrity for data means that changes made to data are done only by
authorized individuals/systems.
Integrity refers to the trustworthiness of data or resources.
Integrity includes data integrity (the content of the information) and
origin integrity (the source of the data, often called authentication).
The principles of integrity assert that information and functions can be
added and removed only by authorized people.
Ex: incorrect data entered by a user in the database
Available 10
This applies to systems and to data. If the network or its data is not
available to authorized users
Availability refers to the ability to use information or resources.
Availability means information should be consistently and readily
accessible for authorized parties.
Availability is an important aspect of reliability as well as of system
design because an unavailable system is at least as bad as no system
at all.
Vulnerability 11
The methods and labels applied to data differ all around the world, but
some patterns do emerge.
Unclassified: Data that has little or no confidentiality, integrity, or
availability requirements and therefore little effort is made to secure it.
Sensitive But Unclassified (SBU): Data that could prove embarrassing if
revealed, but no great security breach will occur.
Confidential: Data that must comply with confidentiality requirements.
This is the lowest level of classified data in this scheme.
Data Classification(1/2)… 17
Secret: Data for which you take significant effort to keep secure. The
number of individuals who have access to this data is usually
considerably fewer than the number of people who are authorized to
access confidential data.
Top secret: Data for which you make great effort and sometimes incur
considerable cost to guarantee its secrecy. Usually a small number of
individuals have access to top-secret data, on condition that there is a
need to know.
Data Classification(1/2)… 18
Data Classification (2/2) 19
Value: Value is the number one criterion. Not all data has the same value.
Age: For many types of data, its importance changes with time.
Useful life: Often data is valuable for only a set window of time, and after
that window has expired there is no need to keep it classified.
Personal association: Data of this type usually involves something of a
personal nature.
Data Classification Procedure 20
Generally, the information classification procedure is as follows:
Step 1. Identify the administrator or custodian of the data.
Step 2. Define how information is classified and labeled (the number of
required classification levels).
Step 3. Classify the data by its owner.
Step 4. Specify exceptions to the classification policy.
Step 5. Define controls to be applied to each classification policy.
Step 6. Specify termination procedures for declassifying data or transferring
the custody of the data.
Step 7. Create an enterprise-awareness program.
Step 8. (Optional) Audit compliance to classification policy.
Data Classification Roles 21
For a classification system to work, there must be different roles that are fulfilled.
Owner: The owner is the person who is ultimately responsible for the
information, usually senior-level management who is in charge of a
business unit.
Custodian: The custodian is usually a member of the IT staff who has the
day-to day responsibility for data maintenance.
User: Users bear no responsibility for the classification of data or even the
maintenance of the classified data.
Security Controls (1/2) 22
Once the owner classifies the data, the custodian is responsible for
securing the data.
These controls fall into one of three categories:
Administrative: Controls that are largely policies and procedures.
Technical: Controls that involve electronics, hardware, software, and so on
Physical: Controls that are mostly mechanical.
Administrative Controls 23
Administrative controls are largely policy and procedure driven.
You will find many of the administrative controls that help with
information security in the enterprise in the human resources department.
Some of these controls are as follows:
Security-awareness training
Security policies and standards
Change controls and configuration controls
Security audits and tests
Good hiring practices
Background checks of contractors and employees
Technical Controls 24