Archive

Posts Tagged ‘CIA’

Integrity & it's constituent parts

September 30, 2009 Leave a comment

Bishop has an interesting way of breaking down integrity into smaller parts. Further to his brief definition of integrity being the trustworthiness of data/resources in terms of preventing unwarranted changes, he says that it is made up of 2 parts:

  • Data integrity [The content of the information remains untampered with]
  • Origin Integrity [The credibility / trustworthiness of the origin of the data/information]

He further describes the ways of ensuring that integrity is maintained as follows:

Prevention Mechanisms:

  • Blocking any unauthorized attempts to change the data
  • Blocking any attempts to change the data in unauthorized ways [i.e. One may have the duty to manipulate data using a certain way/method, but may use different unauthorized ways to do the same].

Detection Mechanisms:

  • Simply reporting that the data’s integrity is no longer trustworthy.
Advertisements
Categories: Uncategorized Tags: , ,

Introduction [The C.I.A. of Computer Security and it's other possible relatives].

September 28, 2009 Leave a comment

In order to get an understanding of Computer Security it is necessary to break it down into smaller composite parts [i.e. to break it down into it’s founding principles]. From the class lecture we saw CIA [Confidentiality, Integrity and Availability] are the necessary components that compose a secure system.
Confidentiality: The ability to ensure that data/information that is intended to be private/secret remains [is maintained] that way. This could be paraphrased to as data/information should only be made accessible to those entities who legally have the rights to do so.
Integrity: Data/Information is only modified by those entities who should be able to do so.
Availability: Data/ Information/ Resources should be available to the respective consumer entities at all times [whenever they are required].

Sometimes, some additions to these 3 criteria are discussed. The following are some of these:
a). Non-repudiation
b). Authenticity

Even though one may think that this is the only way of breaking computer security down, there are other models…[to be continued…]

[Update: 28th Sept – So far I haven’t come across any other ways of breaking down IT Security into it’s constituent parts, so if you do come across another, please point me in that direction]