0% found this document useful (0 votes)
13 views5 pages

Cnss Security Model

Download as pdf or txt
Download as pdf or txt
Download as pdf or txt
You are on page 1/ 5

Introduction to Information Security 15

File corruption is not necessarily the result of external forces, such as hackers. Noise in the
transmission media, for instance, can also cause data to lose its integrity. Transmitting 1
data on a circuit with a low voltage level can alter and corrupt the data. Redundancy bits
and check bits can compensate for internal and external threats to the integrity of informa-
tion. During each transmission, algorithms, hash values, and the error-correcting codes
ensure the integrity of the information. Data whose integrity has been compromised is
retransmitted.

Utility The utility of information is the quality or state of having value for some purpose
or end. Information has value when it can serve a purpose. If information is available, but is
not in a format meaningful to the end user, it is not useful. For example, to a private citizen
U.S. Census data can quickly become overwhelming and difficult to interpret; however, for a
politician, U.S. Census data reveals information about the residents in a district, such as
their race, gender, and age. This information can help form a politician’s next campaign
strategy.

Possession The possession of information is the quality or state of ownership or control.


Information is said to be in one’s possession if one obtains it, independent of format or
other characteristics. While a breach of confidentiality always results in a breach of posses-
sion, a breach of possession does not always result in a breach of confidentiality. For exam-
ple, assume a company stores its critical customer data using an encrypted file system. An
employee who has quit decides to take a copy of the tape backups to sell the customer
records to the competition. The removal of the tapes from their secure environment is a
breach of possession. But, because the data is encrypted, neither the employee nor anyone
else can read it without the proper decryption methods; therefore, there is no breach of con-
fidentiality. Today, people caught selling company secrets face increasingly stiff fines with
the likelihood of jail time. Also, companies are growing more and more reluctant to hire
individuals who have demonstrated dishonesty in their past.

CNSS Security Model


The definition of information security presented in this text is based in part on the CNSS doc-
ument called the National Training Standard for Information Systems Security Professionals
NSTISSI No. 4011. (See www.cnss.gov/Assets/pdf/nstissi_4011.pdf. Since this document was
written, the NSTISSC was renamed the Committee on National Security Systems (CNSS)—
see www.cnss.gov. The library of documents is being renamed as the documents are
rewritten.) This document presents a comprehensive information security model and has
become a widely accepted evaluation standard for the security of information systems. The
model, created by John McCumber in 1991, provides a graphical representation of the archi-
tectural approach widely used in computer and information security; it is now known as the
McCumber Cube.17 The McCumber Cube in Figure 1-6, shows three dimensions. If extrapo-
lated, the three dimensions of each axis become a 3 3 3 cube with 27 cells representing
areas that must be addressed to secure today’s information systems. To ensure system security,
each of the 27 areas must be properly addressed during the security process. For example, the
intersection between technology, integrity, and storage requires a control or safeguard that
addresses the need to use technology to protect the integrity of information while in storage.
One such control might be a system for detecting host intrusion that protects the integrity of

Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
16 Chapter 1

Figure 1-6 The McCumber Cube18


Source: Course Technology/Cengage Learning

information by alerting the security administrators to the potential modification of a critical


file. What is commonly left out of such a model is the need for guidelines and policies that
provide direction for the practices and implementations of technologies. The need for policy
is discussed in subsequent chapters of this book.

Components of an Information System


As shown in Figure 1-7, an information system (IS) is much more than computer hardware; it
is the entire set of software, hardware, data, people, procedures, and networks that make pos-
sible the use of information resources in the organization. These six critical components enable
information to be input, processed, output, and stored. Each of these IS components has its
own strengths and weaknesses, as well as its own characteristics and uses. Each component
of the information system also has its own security requirements.

Software
The software component of the IS comprises applications, operating systems, and assorted
command utilities. Software is perhaps the most difficult IS component to secure. The exploi-
tation of errors in software programming accounts for a substantial portion of the attacks on
information. The information technology industry is rife with reports warning of holes, bugs,
weaknesses, or other fundamental problems in software. In fact, many facets of daily life are
affected by buggy software, from smartphones that crash to flawed automotive control com-
puters that lead to recalls.
Software carries the lifeblood of information through an organization. Unfortunately, soft-
ware programs are often created under the constraints of project management, which limit
time, cost, and manpower. Information security is all too often implemented as an after-
thought, rather than developed as an integral component from the beginning. In this way,
software programs become an easy target of accidental or intentional attacks.

Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Introduction to Information Security 17

Figure 1-7 Components of an Information System


Source: Course Technology/Cengage Learning

Hardware
Hardware is the physical technology that houses and executes the software, stores and trans-
ports the data, and provides interfaces for the entry and removal of information from the
system. Physical security policies deal with hardware as a physical asset and with the protection
of physical assets from harm or theft. Applying the traditional tools of physical security, such as
locks and keys, restricts access to and interaction with the hardware components of an informa-
tion system. Securing the physical location of computers and the computers themselves is impor-
tant because a breach of physical security can result in a loss of information. Unfortunately,
most information systems are built on hardware platforms that cannot guarantee any level of
information security if unrestricted access to the hardware is possible.
Before September 11, 2001, laptop thefts in airports were common. A two-person team
worked to steal a computer as its owner passed it through the conveyor scanning devices.
The first perpetrator entered the security area ahead of an unsuspecting target and quickly
went through. Then, the second perpetrator waited behind the target until the target placed
his/her computer on the baggage scanner. As the computer was whisked through, the second
agent slipped ahead of the victim and entered the metal detector with a substantial collection
of keys, coins, and the like, thereby slowing the detection process and allowing the first per-
petrator to grab the computer and disappear in a crowded walkway.
While the security response to September 11, 2001 did tighten the security process at air-
ports, hardware can still be stolen in airports and other public places. Although laptops and
notebook computers are worth a few thousand dollars, the information contained in them
can be worth a great deal more to organizations and individuals.

Data
Data stored, processed, and transmitted by a computer system must be protected. Data is
often the most valuable asset possessed by an organization and it is the main target of
intentional attacks. Systems developed in recent years are likely to make use of database

Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
18 Chapter 1

management systems. When done properly, this should improve the security of the data and
the application. Unfortunately, many system development projects do not make full use of
the database management system’s security capabilities, and in some cases the database is
implemented in ways that are less secure than traditional file systems.

People
Though often overlooked in computer security considerations, people have always been a
threat to information security. Legend has it that around 200 B.C. a great army threatened
the security and stability of the Chinese empire. So ferocious were the invaders that the
Chinese emperor commanded the construction of a great wall that would defend against
the Hun invaders. Around 1275 A.D., Kublai Khan finally achieved what the Huns had been
trying for thousands of years. Initially, the Khan’s army tried to climb over, dig under, and
break through the wall. In the end, the Khan simply bribed the gatekeeper—and the rest is
history. Whether this event actually occurred or not, the moral of the story is that people
can be the weakest link in an organization’s information security program. And unless policy,
education and training, awareness, and technology are properly employed to prevent people
from accidentally or intentionally damaging or losing information, they will remain the
weakest link. Social engineering can prey on the tendency to cut corners and the common-
place nature of human error. It can be used to manipulate the actions of people to obtain
access information about a system. This topic is discussed in more detail in Chapter 2, “The
Need for Security.”

Procedures
Another frequently overlooked component of an IS is procedures. Procedures are written
instructions for accomplishing a specific task. When an unauthorized user obtains an organiza-
tion’s procedures, this poses a threat to the integrity of the information. For example, a consul-
tant to a bank learned how to wire funds by using the computer center’s procedures, which
were readily available. By taking advantage of a security weakness (lack of authentication),
this bank consultant ordered millions of dollars to be transferred by wire to his own account.
Lax security procedures caused the loss of over ten million dollars before the situation was cor-
rected. Most organizations distribute procedures to their legitimate employees so they can
access the information system, but many of these companies often fail to provide proper educa-
tion on the protection of the procedures. Educating employees about safeguarding procedures is
as important as physically securing the information system. After all, procedures are informa-
tion in their own right. Therefore, knowledge of procedures, as with all critical information,
should be disseminated among members of the organization only on a need-to-know basis.

Networks
The IS component that created much of the need for increased computer and information
security is networking. When information systems are connected to each other to form local
area networks (LANs), and these LANs are connected to other networks such as the Internet,
new security challenges rapidly emerge. The physical technology that enables network func-
tions is becoming more and more accessible to organizations of every size. Applying the tra-
ditional tools of physical security, such as locks and keys, to restrict access to and interaction
with the hardware components of an information system are still important; but when com-
puter systems are networked, this approach is no longer enough. Steps to provide network

Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.
Introduction to Information Security 19

security are essential, as is the implementation of alarm and intrusion systems to make system
owners aware of ongoing compromises. 1

Balancing Information Security and Access


Even with the best planning and implementation, it is impossible to obtain perfect information
security. Recall James Anderson’s statement from the beginning of this chapter, which empha-
sizes the need to balance security and access. Information security cannot be absolute: it is a
process, not a goal. It is possible to make a system available to anyone, anywhere, anytime,
through any means. However, such unrestricted access poses a danger to the security of the
information. On the other hand, a completely secure information system would not allow
anyone access. For instance, when challenged to achieve a TCSEC C-2 level security certifica-
tion for its Windows operating system, Microsoft had to remove all networking components
and operate the computer from only the console in a secured room.19
To achieve balance—that is, to operate an information system that satisfies the user and the
security professional—the security level must allow reasonable access, yet protect against
threats. Figure 1-8 shows some of the competing voices that must be considered when balanc-
ing information security and access.
Because of today’s security concerns and issues, an information system or data-processing
department can get too entrenched in the management and protection of systems. An imbal-
ance can occur when the needs of the end user are undermined by too heavy a focus
on protecting and administering the information systems. Both information security technolo-
gists and end users must recognize that both groups share the same overall goals of the
organization—to ensure the data is available when, where, and how it is needed, with

Figure 1-8 Balancing Information Security and Access


Source: Course Technology/Cengage Learning

Copyright 2011 Cengage Learning. All Rights Reserved. May not be copied, scanned, or duplicated, in whole or in part. Due to electronic rights, some third party content may be suppressed from the eBook and/or eChapter(s).
Editorial review has deemed that any suppressed content does not materially affect the overall learning experience. Cengage Learning reserves the right to remove additional content at any time if subsequent rights restrictions require it.

You might also like