Understanding the Fundamentals of Information Security: A Comprehensive Recap
Hello friends. In this blog post, we will be doing a quick recap, a sort of revision, of what we have discussed so far about the security framework, information security policy, and the CIA triad—confidentiality, integrity, and availability. This recap is based on Visio drawings I developed while preparing for CISSP some time back. These drawings serve as a memory map to consolidate all the concepts in one place. Let’s dive in, and hopefully, this will be more interesting than previous discussions, thanks to its pictorial representation.
Security Framework and Policy Development
Firstly, we select a security framework and then develop an information security policy around this framework. Our policy will focus on a framework or a set of frameworks, depending on the business requirement. This decision is explained in a three-step process:
- Security Initiation: We choose a framework based on the type of business we have, whether it is telco, healthcare, financial institution, or government organization. This is a crucial step.
- Security Fine-Tuning: Security is refined using security evaluation, which could include risk assessment, vulnerability assessment, or penetration testing. We tailor the initial security framework to suit the specific needs of the organization.
- Policy Conception: As a result of the first two steps, the organization’s security policy is conceived.
A security framework provides a starting point for implementing security. When designing security, we need to ensure:
- Security is treated as an element of business management.
- It supports the organization’s objectives, mission, and goals.
- Security is a continuous journey, evolving with business requirements.
- It is legally defensible and cost-effective.
The CIA Triad: Confidentiality, Integrity, and Availability
The CIA triad is the essence of the information security policy. It consists of three critical components:
- Confidentiality: Prevents unauthorized access and protects the secrecy of data.
- Integrity: Ensures the authenticity and genuineness of data.
- Availability: Ensures that services, resources, or data are accessible to authorized users.
Each component is crucial, and their importance may vary depending on the specific business context.
Confidentiality
Confidentiality aims to prevent or minimize unauthorized access, protecting the secrecy of data or resources. Key terms related to confidentiality include:
- Sensitivity: The quality of data, often used in government organizations.
- Discretion: The act of deciding on the disclosure of documents.
- Criticality: Signifies the importance to business.
- Concealment: Preventing disclosure, sometimes through security by obscurity.
- Secrecy: Keeping data secret.
- Privacy: Pertains to personally identifiable information.
- Seclusion and Isolation: Storing data off-site (seclusion) or keeping it separate (isolation).
Integrity
Integrity is about maintaining the authenticity and genuineness of data. Terms associated with integrity include:
- Accuracy: Having precise and correct values.
- Truthfulness: The true reflection of reality.
- Validity: Data should be factually correct and logically sound.
- Accountability: Responsibility for the integrity of the data.
- Responsibility: Having control.
- Completeness: Providing a complete and truthful picture.
- Comprehensiveness: Covering the entire scope of the intended objective.
The goal of integrity is to facilitate authorized changes while preventing unauthorized alterations, protecting the reliability and correctness of data.
Availability
Availability ensures that services, resources, or data are accessible to authorized users. Key terms related to availability include usability, accessibility, and timeliness. The goal of availability is timely and uninterrupted access to objects for authorized subjects.
Reverse of CIA: Disclosure, Alteration, and Destruction
The inverse of the CIA triad is DAD: Disclosure, Alteration, and Destruction. Disclosure involves unauthorized access, alteration involves unauthorized changes, and destruction makes data unavailable.
Additional Concepts: Non-repudiation and Authentication
Non-repudiation and authentication are also crucial concepts:
- Authentication: Verifies the source, ensuring that the person claiming to be someone is actually that person.
- Non-repudiation: Ensures that the sender cannot deny their participation in the communication.
References for Further Reading
- Books:
- Whitman, M. E., & Mattord, H. J. (2018). Principles of Information Security. Cengage Learning.
- Stallings, W. (2019). Network Security Essentials: Applications and Standards. Pearson.
- Research Papers:
- Schneier, B. (1999). Attack Trees. Dr. Dobb’s Journal of Software Tools.
- Bishop, M. (2003). What is Computer Security?. IEEE Security & Privacy, 1(1), 67-69.
- Articles:
- “Understanding the CIA Triad” (2020). Infosec Institute. Link
- “The Importance of Confidentiality, Integrity, and Availability in Information Security” (2021). CSO Online. Link
- News:
- “Data Breaches and the CIA Triad: Lessons from Major Incidents” (2022). Security Magazine. Link
By understanding and applying these principles, organizations can create a robust information security policy that supports their business objectives and adapts to changing requirements.
Thanks for reading. If you have feedback or comments, please put them in the comment section so I can improve further.