Examples
The three levels of impact on organizations or individuals should
there be a breach of security (i.e. a loss of confidentiality, integrity and/or
availability). These levels are defined in FIPS 199:
Low: The loss could be expected to have a limited
adverse effect on organizational operations, organizational assets, or
individuals. A limited adverse effect means that, for example, the loss of
confidentiality, integrity, or availability might
·
Cause degradation in mission capability to an
extent and duration that the organization is able to perform its primary functions,
but the effectiveness of the functions is noticeably reduced;
·
Result in minor damage to organizational assets;
·
Result in minor financial loss; or
·
Result in minor harm to individuals.
Moderate: The loss could be expected to have a
serious adverse effect on organizational operations, organizational assets, or
individuals. A serious adverse effect means that, for example, the loss might
·
Cause significant degradation in mission
capability to an extent and duration that the organization is able to perform
its primary functions, but the effectiveness of the functions is significantly
reduced;
·
Result in significant damage to organizational
assets;
·
Result in significant financial loss; or
·
Result in significant harm to individuals that
do not involve loss of life or serious, life-threatening injuries.
High: The loss could be expected to have a severe or
catastrophic adverse effect on organizational operations, organizational
assets, or individuals. A severe or catastrophic adverse effect means that, for
example, the loss might
·
Cause a severe degradation in or loss of mission
capability to an extent and duration that the organization is not able to perform
one or more of its primary functions;
·
Result in major damage to organizational assets;
·
Result in major financial loss; or
·
Result in severe or catastrophic harm to individuals
involving loss of life or serious, life-threatening injuries.
CONFIDENTIALITY Student
grade information is an asset whose confidentiality is considered to be highly
important by students. In the United States, the Family Educational Rights and
Privacy Act (FERPA) regulate the release of such information. Grade information
should only be available to students, their parents, and employees that require
the information to do their job. Student enrollment information may have a
moderate confidentiality rating. While still covered by FERPA, this information
is seen by more people on a daily basis, is less likely to be targeted than grade
information, and results in less damage if disclosed. Directory information
(such as lists of students, faculty, or departmental lists) may be assigned a
low confidentiality rating or indeed no rating. This information is typically
freely available to the public and published on a school’s Web site.
INTEGRITY Several
aspects of integrity are illustrated by the example of a hospital patient’s
allergy information stored in a database. The doctor should be able to trust
that the information is correct and current. Now suppose that an employee
(e.g., a nurse) who is authorized to view and update this information
deliberately falsifies the data to cause harm to the hospital. The database
needs to be restored to a trusted basis quickly, and it should be possible to
trace the error back to the person responsible. Patient allergy information is
an example of an asset with a high requirement for integrity. Inaccurate
information could result in serious harm or death to a patient and expose the
hospital to massive liability.
An example of an asset that may be assigned a moderate level
of integrity requirement is a Web site that offers a forum to registered users
to discuss some specific topic. Either a registered user or a hacker could
falsify some entries or deface the Web site. If the forum exists only for the
enjoyment of the users, brings in little or no advertising revenue, and is not
used for something important such as research, and then potential damage is not
severe. The Web master may experience some data, financial, and time loss.
An example of a low-integrity requirement is an anonymous
online poll. Many Web sites, such as news organizations, offer these polls to
their users with very few safeguards. However, the inaccuracy and unscientific
nature of such polls is well understood.
AVAILABILITY The
more critical a component or service, the higher is the level of availability
required. Consider a system that provides authentication services for critical
systems, applications, and devices. An interruption of service results in the
inability for customers to access computing resources and for the staff to
access the resources they need to perform critical tasks. The loss of the
service translates into a large financial loss due to lost employee
productivity and potential customer loss.
An
example of an asset that typically would be rated as having a moderate
availability requirement is a public Web site for a university; the Web site
provides information for current and prospective students and donors. Such a site
is not a critical component of the university’s information system, but its
unavailability will cause some embarrassment.An online telephone directory lookup application would be classified as a low-availability requirement. Although the temporary loss of the application may be an annoyance, there are other ways to access the information, such as a hardcopy directory or the operator.
Lecture Reference:
W. Stallings, “Network Security Essentials: Applications and Standards, Fourth Edition.”
Thankyou for sharingcustomized purchase software management
ReplyDelete