Critical Characteristics of Information
Critical Characteristics of Information
Confidentiality
Verification/Validation, Facts
Unintentional Disclosures
Utilit Possession
y
CNSS Security Model
McCumber Cube
FATIMA RAIZA A. SALI
1. A subject or object’s ability to use, manipulate, modify, or affect another
subject or object.
A. Attack B. Exposure C. Access
2. Any event or circumstance that has the potential to adversely affect
operations and assets.
B. Threat B. Threat agent C. Asset
3. Th probability of an unwanted occurrence, such as an adverse event or loss.
A. Loss B. Risk C. Exploit
4. When it is protected from disclosure or exposure to unauthorized individuals
or system.
B. Authenticity B. Confidentiality C. Accuracy
5. When it is free from mistakes or errors and has the value that the end user
expects.
C. Integrity B. Accuracy C. Availability
6. The state of united and undivided.
A. Authenticity B. Integrity C. Accuracy
7. The one who initiates the attack
B. Attacker B. Subject on an attack C. Object of an attack
8. The target of the attack.
C. Attacker B. Subject on an attack C. Object of an attack
9. A resource that is being protected.
D. Data B. Asset C. Information
10. Is the quality or state of having value for some purpose or end.
A. Possession B. Availability C. Utility