The three axes are: Desired Goals, States of Information, and Counter-measures.
By looking at things from the perspective of the intersection of the three axes, you can be sure to look at all sides of an information security issue. Pick any of the smaller 27 cubes and think about the problem or concerns from that perspective.
Desired Goals
When dealing with information, you have three goals:
- Confidentiality. Information should only be accessed by those who should see it.
- Integrity. Information should not be changed outside of proper processes.
- Availability. Information should be accessible when it is wanted.
States of Information
Information exists in three different states of being:
- Storage. An inactive state of information hibernation - the information is waiting to be accessed.
- Transmission. Anytime information moves, it is in this state.
- Processing. When being actively examined or modified, information is in this state.
Counter-measures
The methods of reducing or removing threats to the three desired goals are accomplished by:
- Technology. Using hardware or software to limit threats.
- Policy & Practice. Using procedures that mitigate risk or eliminate the possibility of threats.
- Awareness, Training, & Education. Giving each consumer of information the knowledge of how to identify and handle threats.
This method of analysis is becoming more useful in daily life every year. When evaluating what information to put online, it helps to be able to think about these issues. We live in the information age, and it behooves us all to continually be learning about what that means for us personally.
No comments:
Post a Comment