CHAPTER 3

TOWARD A NEW FRAMEWORK FOR INFORMATION SECURITY*

Donn B. Parker, CISSP

3.1 PROPOSAL FOR A NEW INFORMATION SECURITY FRAMEWORK

3.2 SIX ESSENTIAL SECURITY ELEMENTS

3.2.1 Loss Scenario 1: Availability

3.2.2 Loss Scenario 2: Utility

3.2.3 Loss Scenario 3: Integrity

3.2.4 Loss Scenario 4: Authenticity

3.2.5 Loss Scenario 5: Confidentiality

3.2.6 Loss Scenario 6: Possession

3.2.7 Conclusions about the Six Elements

3.3 WHAT THE DICTIONARIES SAY ABOUT THE WORDS WE USE

3.4 COMPREHENSIVE LISTS OF SOURCES AND ACTS CAUSING INFORMATION LOSSES

3.4.1 Complete List of Information Loss Acts

3.4.2 Examples of Acts and Suggested Controls

3.4.3 Physical Information and Systems Losses

3.4.4 Challenge of Complete Lists

3.5 FUNCTIONS OF INFORMATION SECURITY

3.6 SELECTING SAFEGUARDS USING A STANDARD OF DUE DILIGENCE

3.7 THREATS, ASSETS, VULNERABILITIES MODEL

3.8 CONCLUSION

3.1 PROPOSAL FOR A NEW INFORMATION SECURITY FRAMEWORK.

Information security, historically, has been limited by the lack of a comprehensive, complete, and analytically sound framework for analysis and improvement. The persistence of the classic triad of CIA (confidentiality, integrity, availability) is inadequate to describe what security practitioners include and implement when doing their jobs. We need a new information security framework that is complete, correct, and consistent to express, in practical language, the means for information owners to protect their information from any adversaries and vulnerabilities.

The current ...

Get Computer Security Handbook, Fifth Edition now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.