The Cybersecurity Cube - Cyber Security Blog Series (CSBS 1)
The Cybersecurity Cube

The Cybersecurity Cube - Cyber Security Blog Series (CSBS 1)

In 1991, John McCumber made the McCumber Cube as a model framework for figuring out how different things affect information security projects. These three aspects make up the security model:

  1. The fundamental principles that must be adhered to safeguard information systems.
  2. The protection of information in every possible form that it can acquire.
  3. The precautions that have been taken to ensure the data's safety.


Fundamental Principles?

No alt text provided for this image

  • Confidentiality standards protect sensitive data from unauthorized access. Encryption, identity proofing, and two-factor authentication assure confidentiality.
  • Integrity protects system data and operations from tampering. Hash functions or checksums ensure integrity.
  • Authorized users can access systems and data when and as needed, while unauthorized users cannot. Maintenance, hardware repairs, software updates, and backups can do this.


Protection Information?

No alt text provided for this image

  • Processing data involves updating a database record (Data in process).
  • Data held in memory or on a hard drive, SSD, or USB drive is called storage (Data at rest).
  • Data transmission between information systems (Data in transit).


Security Measures?

No alt text provided for this image

  • Organizations implement security awareness, training, and education initiatives to increase end-user understanding of potential security risks and protective solutions.
  • Technology is the word for the different software and hardware solutions made to protect data systems. For example, firewalls keep an eye on your network all the time to look for any suspicious activity.
  • The administrative controls that provide the basis for how an organization implements information assurance are known as "policies and procedures," and they include things like incident response plans and best practice recommendations.

要查看或添加评论,请登录

Md Mofijul H.的更多文章

社区洞察

其他会员也浏览了