0% found this document useful (0 votes)
238 views11 pages

Critical Characteristics of Information

The document discusses critical characteristics of information including confidentiality, integrity, availability, and accuracy. Confidentiality refers to protecting data from passive attacks during transfer. Integrity ensures the truthfulness and prevention of unauthorized changes to data. Availability means information and communication systems are ready for use as expected. Accuracy means retrieving data entered in the past without errors when requested.

Uploaded by

abusamansevt1925
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
238 views11 pages

Critical Characteristics of Information

The document discusses critical characteristics of information including confidentiality, integrity, availability, and accuracy. Confidentiality refers to protecting data from passive attacks during transfer. Integrity ensures the truthfulness and prevention of unauthorized changes to data. Availability means information and communication systems are ready for use as expected. Accuracy means retrieving data entered in the past without errors when requested.

Uploaded by

abusamansevt1925
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 11

Critical Characteristics of Information

Confidentiality

Refers to the process of protecting the data being transferred


from all type of passive attacks.
Integrity

Truth worthiness of data or resources and it is usually phrased


in terms of preventing improper or unauthorized change.
Availability

Is a method in which the information and communication will


be ready for use when expected.
Accuracy

When we request for data, in past what we entered exactly


that data should be retrieved without any errors.
Authenticity

Verification/Validation, Facts
Unintentional Disclosures

Utilit Possession
y
CNSS Security Model

Committee on National Security System has three dimensional security model


which has now become a standard security model for many of the currently
operating information system.

McCumber Cube
FATIMA RAIZA A. SALI
1. A subject or object’s ability to use, manipulate, modify, or affect another
subject or object.
A. Attack B. Exposure C. Access
2. Any event or circumstance that has the potential to adversely affect
operations and assets.
B. Threat B. Threat agent C. Asset
3. Th probability of an unwanted occurrence, such as an adverse event or loss.
A. Loss B. Risk C. Exploit
4. When it is protected from disclosure or exposure to unauthorized individuals
or system.
B. Authenticity B. Confidentiality C. Accuracy
5. When it is free from mistakes or errors and has the value that the end user
expects.
C. Integrity B. Accuracy C. Availability
6. The state of united and undivided.
A. Authenticity B. Integrity C. Accuracy
7. The one who initiates the attack
B. Attacker B. Subject on an attack C. Object of an attack
8. The target of the attack.
C. Attacker B. Subject on an attack C. Object of an attack
9. A resource that is being protected.
D. Data B. Asset C. Information
10. Is the quality or state of having value for some purpose or end.
A. Possession B. Availability C. Utility

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy