• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2021 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Class Capture Videos
  • Gradebook

Question 3

August 25, 2021 by David Lanter 8 Comments

Which information security objective(s) could be put at risk if the alternative safeguards recommended by the FGDC guidelines are applied?  Explain how the objective(s) is put at risk by the mitigation(s).

Filed Under: Unit 02: Data Classification Process and Models Tagged With:

Reader Interactions

Comments

  1. Elizabeth Gutierrez says

    August 29, 2021 at 1:46 pm

    To begin, the FISMA defines three security objectives for information and information systems as the following:

    Confidentiality = “Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information…” [44 U.S.C., Sec. 3542]
    A loss of confidentiality is the unauthorized disclosure of information.
    Integrity = “Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity…” [44 U.S.C., Sec. 3542]
    A loss of integrity is the unauthorized modification or destruction of information.
    Availability = “Ensuring timely and reliable access to and use of information…” [44 U.S.C., SEC. 3542
    A loss of availability is the disruption of access to or use of information or an information system.

    Unfortunately, there are concerns that are not addressed by the FGDC guidelines regarding safeguard recommendations outlined in the “Guidelines for Providing Appropriate Access to Geospatial Data in Response to Security Concerns” reading. I would argue that all the security objectives (CIA) can be put at risk by the mitigations. To start with confidentiality, sharing sensitive information to downstream users without regulated restrictions other than hoping they respect the guidelines can be problematic because the other party may not treat PII with as much care since they are not bound by any responsibility. Also, I see the potential of compromising integrity in Step 10 (Change these data) because applying changes and/or removing valuable information from a document may result in loss of authenticity for the sake of security; for this reason, I believe in the importance of tracking the changes made to the document. Lastly, review of decisions made about the sensitivity of geospatial data can put availability at risk because it can lead to altering the access of such data that affects both the originating organization and downstream ones.

    Log in to Reply
    • Shubham Patil says

      August 31, 2021 at 12:35 pm

      Elizabeth,

      The guidelines provide a method for balancing security risks and the benefits of geospatial data dissemination. If safeguarding is justified, the guidelines help organizations select appropriate risk-based safeguards that provide access to geospatial data and still protect sensitive information content. I do see your point on how the all three security objectives can be applied.

      Log in to Reply
  2. Shubham Patil says

    August 29, 2021 at 7:38 pm

    Information security objectives that could be put at risk if the alternative mitigations are applied are:

    INTEGRITY
    “Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity…” [44 U.S.C., Sec. 3542]
    A loss of integrity is the unauthorized modification or destruction of information.

    According to the FGDC guidelines “Change of Data” relates closely to the Integrity of data and could put the risk level at high. For example, Incidents caused by undetected errors or vulnerabilities as a result of change (e.g. unforeseen effects of a change or a poorly managed change due to a lack of testing or improper change management practices) to e.g. software, IT systems and data.

    AVAILABILITY
    “Ensuring timely and reliable access to and use of information…” [44 U.S.C., SEC. 3542]
    A loss of availability is the disruption of access to or use of information or an information system.

    According to the FGDC guidelines “Restrict the Data” relates closely to the availability of the data and can put the risk level at high. For example, A lack of data can result in an inability to scale the service to meet business needs, system interruptions, degradation or the public might not have access to geospatial data.

    Log in to Reply
    • Elizabeth Gutierrez says

      August 30, 2021 at 6:32 pm

      Hi Shubham,

      I agree with you that integrity and availability are both at risk if alternative mitigations are applied. I wonder though, how can an organization change information that needs to be safeguarded and maintain the data’s integrity and usefulness? As for availability, access to information and knowledge is viewed as a right in America and is attributed to the country’s success. I think it is important to find the right balance between what risk might be acceptable and safeguarding information that if misused — could have negative consequences.

      Log in to Reply
    • Yangyuan Lin says

      August 31, 2021 at 11:57 pm

      Hi Shubhan,

      I agree what you said. As for intergrity, I think that the modification of the information will damage the accuracy and authenticity of the information. Data changes that have not been tested lead to higher risks. Also, I think that restrictions on permissions will cause the loss of usability dramas and interruption of access.

      Log in to Reply
    • Alexander William Knoll says

      September 1, 2021 at 10:50 pm

      Hey Shubham,

      You make an interesting point. I agree that integrity and availability could be put at risk for these reasons, but I was curious why you don’t feel the same way for confidentiality?

      Log in to Reply
  3. Yangyuan Lin says

    August 31, 2021 at 11:25 pm

    The modification of the information may cause the destruction of the information or the authenticity of the information. For sensitive information, it is doubtful how this information can be found by private or public organizations. I think these private information should be protected before it is discovered. The government department’s information availability, that is, the level of information access authority should be reset instead of being easily obtained. Restricting permissions may lead to a higher level of risk.

    Log in to Reply
  4. Alexander William Knoll says

    September 1, 2021 at 10:47 pm

    Which information security objective(s) could be put at risk if the alternative safeguards recommended by the FGDC guidelines are applied? Explain how the objective(s) is put at risk by the mitigation(s).

    I would say that all of the security objectives could be put at risk if the alternative safeguards are applied. The 3 objectives, confidentiality, integrity, and availability, are defined as followed.

    Confidentiality = “Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information…” [44 U.S.C., Sec. 3542]
    A loss of confidentiality is the unauthorized disclosure of information.
    Integrity = “Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity…” [44 U.S.C., Sec. 3542]
    A loss of integrity is the unauthorized modification or destruction of information.
    Availability = “Ensuring timely and reliable access to and use of information…” [44 U.S.C., SEC. 3542
    A loss of availability is the disruption of access to or use of information or an information system.

    All 3 objectives are prone to human error. For example, An employee may disclose information about the organization, intentionally or unintentionally, which would be a loss of confidentiality. An employee may also destroy data, which would be the loss of integrity, Finally, an employee may damage software, which would be the loss of availability. Thus, all the objectives are at risk simply due to human nature.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (6)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (6)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in