• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.001 ■ Fall 2024 ■ David Lanter
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project

Question 3

August 28, 2024 by David Lanter 24 Comments

Which information security objective(s) could be put at risk if the alternative safeguards recommended by the FGDC guidelines are applied?  Explain how the objective(s) is put at risk by the mitigation(s).

Filed Under: Unit 02: Data Classification Process and Models Tagged With:

Reader Interactions

Comments

  1. Justin Chen says

    August 30, 2024 at 11:19 am

    Based on the safeguards provided by the guideline, several information security objectives may face some risks. Step 10 tells the users to “change the data” based on the previous questions asked, this safeguard may risk the “Integrity” of the information. This process could potentially alter the original data, which would lead to loss or inaccuracy of the information detail. Ultimately, the data will be less reliable for analysis or decision-making. Step 13 recommends “extent of restrictions” to mitigate the risks. This may refer to methods such as: MFA (Multi-Factor Authentication), restricting access to data or other complex access controls. This could potentially compromise the “Availability” of the data. Strict access controls will make authorized users of the information less accessible or even have no access to the data, legal users may not be able to obtain the information when needed.

    Log in to Reply
    • Sarah Maher says

      September 2, 2024 at 9:27 pm

      Hi Justin! I agree with all your points, and also said that changing the data risks integrity, and restricting the data risks availability. Do you think that changing the data could affect the availability as well?

      Log in to Reply
  2. Daniel Akoto-Bamfo says

    August 31, 2024 at 12:07 am

    The three forms of information security objectives are confidentiality, integrity, and availability.
    Confidentiality involves maintaining authorized limits on information access and disclosure, including measures to safeguard personal privacy and proprietary information. Failure to uphold confidentiality can result in unauthorized access or disclosure of information, often due to inadequate encryption. Integrity involves protecting against unauthorized information modification or destruction and includes ensuring information authenticity. The loss of integrity is when information is improperly modified or destroyed, which can result in data that is not reliable or accurate. Availability is about making sure that information is accessible and reliable. If there’s a disruption to accessing or using information, it can lead to a loss of availability. This can happen when an information system becomes inaccessible, if there is not a proper recovery plan in place, or if backup procedures do not guarantee timely recovery.

    Log in to Reply
  3. Clement Tetteh-Kpakpah says

    August 31, 2024 at 9:26 am

    Either all or some of the information security objectives (Confidentiality, Integrity, and Availability) could be put at risk in diverse situations if the alternate safeguards recommended by the Federal Geographic Data Committee (FGDC) are applied.
    Confidentiality could be put at risk in cases where the alternate safeguards entail inadequate access controls and reduced encryption standards which will lead to exposing sensitive information to unauthorized persons
    Integrity could be put at risk in cases where the alternate safeguards have weak change management procedures and inadequate data validation leading to a likely change in the accuracy and completeness of information
    Availability could be put at risk in cases where the alternate safeguards come with simplified backup procedures and reduced redundancy as this will greatly impact access to information and systems.

    Log in to Reply
    • Sara Sawant says

      September 3, 2024 at 11:42 pm

      Hi Clement

      I agree with your approach by highlighting potential risks associated with alternate safeguards. To build on that, inadequate access controls and reduced encryption could jeopardize confidentiality, potentially leading to data breaches and legal repercussions. For integrity, weak change management and insufficient data validation might undermine data accuracy, resulting in flawed decisions and costly corrections. Additionally, simplified backups and reduced redundancy pose risks to availability, potentially causing system downtime, customer dissatisfaction, and financial losses.

      Log in to Reply
  4. Rohith says

    August 31, 2024 at 1:41 pm

    When we apply the alternative safeguards recommended by the FGDC guidelines the information security objectives of confidentiality, integrity, and availability could be put at risk.
    Confidentiality will be at risk as Weaker encryption algorithms might allow unauthorized individuals to access sensitive geographic data.
    Integrity will be at risk as disaster recovery plans could lead to data corruption and also data loss.
    Availability of data means the data accessible and it is reliable but weak disaster recovery planning could result in Data loss.
    By selecting alternative safeguards will increase risk of data breaches, unauthorized access leading to high cost recovery measures.

    Log in to Reply
    • Aaroush Bhanot says

      September 3, 2024 at 8:56 pm

      Hey Rohith,

      Great point about the potential risks associated with applying alternative safeguards as outlined by the FGDC guidelines. To expand on this, it’s important to consider how these risks can have cascading effects on broader organizational objectives.

      For instance, the impact on confidentiality through weaker encryption might not only expose sensitive geographic data but could also undermine the trust of stakeholders who rely on the security of that data. Moreover, the risk to data integrity and the potential for data corruption or loss due to inadequate disaster recovery plans highlights the importance of a holistic approach to risk management. Perhaps investing in more resilient disaster recovery solutions or adopting a layered security approach could mitigate these risks while still aligning with the guidelines.

      Log in to Reply
  5. Lily Li says

    August 31, 2024 at 2:13 pm

    If alternative safeguards that are recommended by the FGDC are applied it can pose risks to both confidentiality and integrity. If an organization decides to reduce the safeguards because they have determined to make the data available without doing a proper risk assessment or security review it can lead to issues in confidentiality. If the data contains sensitive information, making it publicly available can lead to breaches of information. Integrity is another issue that an organization needs to take into consideration especially if the new safeguards that they have decided to implement change how the data is managed or protected, introducing different vulnerabilities. If the authentication process has been weakened in this new safeguard then it can lead to unauthorized users making changes to the data.

    Log in to Reply
    • Daniel Akoto-Bamfo says

      September 3, 2024 at 10:07 pm

      Hi Lily,
      I believe you make a great point on credibility and integrity, but I also believe making the sensitive information public but unreliable indicates a risk of availability. Therefore, a holistic approach must be taken when applying the FGDC guidelines.

      Log in to Reply
  6. Sarah Maher says

    August 31, 2024 at 2:39 pm

    If the FGDC safeguards are applied they put Availability and Integrity at risk. The FGDC recommends changing the data if the data is internal and found to pose a risk. Changing data then disseminating it affects both Availability and Integrity as now not all the data is available and the Integrity of the data has been compromised. If the receiver of this data hopes to draw a conclusion from it, the wrong conclusions may be made as the data itself has changed. If the organization finds the data is internal and poses a risk they may choose to restrict the data. Restricting the data affects availability of the data as well.

    Log in to Reply
    • Charles Lemon says

      September 2, 2024 at 10:18 pm

      Hi Sarah,

      Thank you for your response. I agree that the balance of the confidentiality, integrity, and availability of data can be a very fine line. When two of these objectives become a high priority, it can be very challenging for an organization to determine the best path forward. If you were put into a position where you had the authority to restrict or release certain data, do you think you would be good at determining which to do? Do you also think you would favor the restriction of the data or the release of the data more often than not?

      Log in to Reply
  7. Steven Lin says

    September 1, 2024 at 1:31 am

    When evaluating the alternative safeguards outlined in the FGDC guidelines, it is important to consider the key security objectives: confidentiality, integrity, and availability. Confidentiality may be compromised by weak encryption or inadequate access control, making sensitive information vulnerable to unauthorized access. Integrity may be compromised if alternative safeguards lack comprehensive data validation or integrity checks, potentially leading to data corruption or tampering. Availability may be compromised if alternative safeguards overlook redundancy and disaster recovery measures, which could result in increased downtime or reduced system availability. Therefore, it is essential to analyze whether an alternative safeguard is truly necessary for the company, especially if its implementation compromises other areas of the organization.

    Log in to Reply
  8. Charles Lemon says

    September 1, 2024 at 12:06 pm

    All three information security objectives can be put at risk when applying the safeguards recommended by the FGDC guidelines. This was seen when we used the FIPS 199 security categorizations to determine which safeguards to apply. For example, when applying the restriction of data determined to be extremely sensitive in nature, a loss of availability of that data will occur. If data is determined to have a high impact of risk in both confidentiality and availability, the restriction or the publication of that data will in turn affect either the confidentiality or availability of that data. If the changing of data is applied in order to help publish an alternate form for the public, the integrity of that data will be at risk. These risks balance each other out when applying safeguards to information. It can be a fine line when two or more of the security objectives of confidentiality, integrity, and availability become a high priority.

    Log in to Reply
    • Steven Lin says

      September 3, 2024 at 5:52 pm

      Hi Charles,

      I appreciated how your analysis highlighted a critical challenge in information security. It balances the objectives of confidentiality, integrity, and availability while applying safeguards based on FIPS 199 categorizations. This delicate balancing act is a key consideration in cybersecurity. Such trade-offs are often necessary to protect sensitive data while maintaining system functionality. Your discussion managed to cover the complexity of maintaining a secure and functional information system.

      Log in to Reply
    • Clement Tetteh-Kpakpah says

      September 3, 2024 at 9:59 pm

      Hello Charles
      The write-up effectively demonstrates how applying safeguards, even those recommended by guidelines like FGDC, can inadvertently compromise one or more information security objectives. This highlights the delicate balance between protecting confidentiality, integrity, and availability. I am wondering if there could be a balance scale or percentage for the three objectives (confidentiality, integrity, and availability) that could be applied in diverse cases

      Log in to Reply
  9. Sara Sawant says

    September 1, 2024 at 3:49 pm

    Implementing the alternative security measures suggested by the FGDC guidelines may jeopardize the confidentiality, integrity, and availability of geospatial data. Confidentiality may nevertheless be compromised by restricting access or employing data obfuscation techniques, which expose private information to unauthorized parties. Furthermore, these techniques might unintentionally change the data, jeopardizing its integrity. Restricting access could also make data less accessible to authorized users, which could make it more difficult for critical processes that depend on precise and timely geographic data.

    Log in to Reply
  10. Elias Johnston says

    September 1, 2024 at 6:57 pm

    All three security objectives could be put at risk if the recommended safeguards are put in place. Specifically Step 10, as step 13 is subjected to the discretion of the decision maker. Step 10 encourages the user to change the data to avoid risk, however, these changes walk the line of interfering with the integrity of the data. If changes are made, the organization should document the changes in the metadata and should cite the authority that permits this change. This ensures that if changes are made, there is a log of what is changed. However, the public data may be needed in conjunction with the newly hidden data, which does dilute the integrity, if only slightly. In addition, there exists the possibility that not all critical information is removed from the data set, as there is always the possibility of human error. Finally, the accessibility of the data may be compromised, as simply changing the data could result in the loss of the data if careful procedures are not in place. Backups and logs should be put in place to ensure that a change in the data does not result in a deletion of the data.

    Log in to Reply
  11. Aaroush Bhanot says

    September 1, 2024 at 10:06 pm

    When applying the alternative safeguards recommended by the FGDC guidelines, the information security objectives of confidentiality, integrity, and availability could be put at risk. Confidentiality might be compromised if the data is altered for public use. This process involves modifying the original geospatial data to remove sensitive elements before public release. However, if not done carefully, this alteration could inadvertently reveal patterns or information about the sensitive data it aims to protect. For example, obvious gaps or alterations in the modified data might indicate the presence and nature of the removed sensitive information. Furthermore, overly restrictive access controls might lead to workarounds or unauthorized sharing among those who need the data with a risk of exposing the information to greater risk. Integrity could be affected if the process of changing data for public release introduces errors or inconsistencies in the geospatial information. Availability might be compromised if overly restrictive safeguards make it difficult for authorized users to access necessary geospatial data in a timely manner.

    Log in to Reply
    • Lily Li says

      September 2, 2024 at 6:52 pm

      Hello Aaroush,

      Your explanation provided great examples of how confidentiality, integrity, and availability could be put at risk if the alternative guidelines provided by the FDGC are followed. Your example of confidentiality is great as it shows the amount of problems that could occur if this process isn’t done correctly. Sometimes certain information should remain confidential especially if it’s clear that the data has been altered or that it has been modified. You also mentioned that overly restrictive access controls might lead to workarounds or unauthorized sharing of data which is a great example of the balance that needs to be maintained when handling this type of data.

      Log in to Reply
  12. Parth Tyagi says

    September 1, 2024 at 11:16 pm

    The implementation of FGDC safeguards might put the Confidentiality, Integrity and Availability of information at risk. This is why organizations need to weigh out the risk and control implementation since increasing one aspect of CIA might bring down another.
    For example, changing the data affects the integrity of data. One organization might think that making data publicly available post a few changes is a good thing, but the same decision might adversely affect its confidentiality and integrity, since the data will now be in an altered form and available to public. This can be the case with maps, photos, aerial views of important facilities.
    Another example is implementing heavyweight access control mechanisms, which would reduce the availability of the data for users.

    Log in to Reply
  13. Haozhe Zhang says

    September 1, 2024 at 11:41 pm

    One recommendation by FGDC as a security safeguard alternative is to change the data. This safeguard, while intended to address certain issues, could alter the original data. Such changes could result in the loss of accuracy of critical information, compromising the reliability and trustworthiness of the data. When the integrity of information is compromised, decisions based on that data may be flawed, leading to potentially negative consequences. Therefore, it’s crucial to carefully assess and document any changes to the data, ensuring that integrity is maintained throughout the process.

    Log in to Reply
  14. Lili Zhang says

    September 1, 2024 at 11:59 pm

    Applying the FGDC’s alternative safeguards could put the confidentiality, integrity, and availability of information at risk. For example, if we change the data to protect confidentiality, it might mess with the data’s integrity by causing errors or inaccuracies. Also, if we set up really strict access controls to keep data confidential, it could make it hard for authorized users to access the data, affecting availability. I think it’s important to carefully balance these safeguards so we don’t end up hurting the security of the data.

    Log in to Reply
    • Parth Tyagi says

      September 3, 2024 at 1:33 pm

      I think your example of strict access controls is interesting and resonates with my own answer to this question, however, upon second thought I’d like to add something onto it.
      Access Controls need to be commensurate with the level of security the data requires, which can be understood via a risk assessment. Only after that will an organization be able to make the right decision about the strength of access controls to be implemented.
      While implementing access controls, an organization needs to take into account – value of information, risk to information, budget, risk tolerance, ease of use, and residual risk at last. Do let me know your thoughts on this!

      Log in to Reply
  15. Yash Mane says

    September 2, 2024 at 4:22 pm

    Using the alternative protections advised by the FGDC policies runs the danger
    of compromising the following information security goals:

    Confidentiality: Sensitive geographical data may be accessed by illegal users if less
    strict alternative security measures are used, therefore causing data breaches.
    Integrity: Insufficient security might allow illegal changes to geographical data, thus
    undermining their dependability and correctness.
    Geospatial data availability may suffer if the alternative protections fall short in
    preventing attacks, therefore rendering it unavailable as required.
    Ignoring strong security measures might endanger the confidentiality, integrity, and
    availability of geographic data, therefore fostering possible security events and data
    abuse.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (2)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in