• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.701 ■ Fall 2022 ■ William Bailey
  • HomePage
  • Instructor
  • Syllabus
  • Schedule
    • First Half of the Semester
      • Unit #1: Understanding an Organization’s Risk Environment
      • Unit #2: Case Study 1 – Snowfall and stolen laptop
      • Unit #2: Data Classification Process and Models
      • Unit #3: Risk Evaluation
      • Unit #4 Case #2: Autopsy of a Data Breach: The Target Case
      • Unit #5: Creating a Security Aware Organization
      • Unit #6: Physical and Environmental Security
    • Second Half of the Semester
      • Unit #8 Case Study 3 – A Hospital Catches the “Millennium Bug”
      • Unit #9: Business Continuity and Disaster Recovery Planning
      • Unit #10: Network Security
      • Unit #11: Cryptography, Public Key Encryption and Digital Signatures
      • Unit #12: Identity Management and Access Control
      • Unit #13: Computer Application Security
  • Deliverables
    • Weekly Deliverables
      • “In the News” Articles
      • Answers to Reading Discussion Questions
      • Comments on Reading Discussion Question and Other Students’ Answers
    • Case Studies
    • Team Project
  • Class Capture Videos

Question 3

August 24, 2022 by William Bailey 14 Comments

Which information security objective(s) could be put at risk if the alternative safeguards recommended by the FGDC guidelines are applied?  Explain how the objective(s) is put at risk by the mitigation(s).

Filed Under: Unit 02: Data Classification Process and Models Tagged With:

Reader Interactions

Comments

  1. Nicholas Foster says

    August 28, 2022 at 5:54 pm

    The FGDC guidelines annotate that altering data in order to safeguard said data is appropriate. Altering data per FGDC is “To remove or modify the sensitive information and then make the changed data available without further safeguards.” If the data is modified, then that is by definition loss of integrity. Additionally, how does the data that is now “available without further safeguards” maintain its integrity and who is responsible for ensuring said integrity? Availability would also be impacted in that if the data is “removed or modified” the ability to access the unaltered data could be lengthy and cumbersome. A process would need to be outlined on how to request access to the unmodified data. Those who need said access would also need to know where to look in order to find said process. Now the people who need access to the unmodified data do not have it and may not even know how to get it. This by definition takes away from availability.

    Log in to Reply
    • Kenneth Saltisky says

      August 30, 2022 at 4:52 pm

      Hi Nicholas,
      I agree that adding a process to access the unmodified would be important as a result of safeguards being applied. However, I also think that excessive data could result in conflicts in placement when considering the CIA triad. Maybe a good idea as part of the process would be to inform current users of the data being modified.

      Log in to Reply
  2. David Vanaman says

    August 29, 2022 at 9:30 pm

    The two safeguards recommended by FGDC are to restrict the sensitive data or alter the data to remove the sensitive information. Restricting the data interferes with availability, but it is the most straightforward and understandable mechanism of protecting sensitive information. We can see this sort of data protection by restriction and it is obvious- there is a gap or empty space in the data. The second recommendation is potentially more problematic. Altering data damages the integrity of the data and absent any warning that the data has been altered, it could be taken at face value. For something like a the geospatial data that the FGDC works with, this could lead to a situation where someone uses altered data without knowing it was altered and comes to incorrect conclusions. With redacted or blocked data, at least the user knows the data is incomplete.

    Log in to Reply
    • Kenneth Saltisky says

      August 30, 2022 at 5:02 pm

      Hey David,
      I understand your view on the complications involved in either restricting or altering the data as a part of the safeguards. Altering the data is especially concerning since jobs that require precise information or require almost perfect integrity would be more difficult.

      Log in to Reply
    • Christa Giordano says

      September 2, 2022 at 8:28 pm

      Hi David,
      I like the way that you simplified and articulated the main points of the readings. While restricting the data does interfere with availability, depending on the subject matter, this could be acceptable. The sensitive information might not be necessary for a person to analyze the information and render a conclusion and as you noted, it is very obvious that this data is missing. Out of the two choices I do believe this is the preferable one. If the decision is made to alter the data and thereby impact the integrity of the data, there should be a disclaimer or something identifying this fact to the user of the data. A cost benefit analysis will be most beneficial in these circumstances to determine the best method to protect the data if necessary.

      Log in to Reply
    • Nicholas Foster says

      September 2, 2022 at 8:51 pm

      Hey Dave,

      I really like your point in that redacting data is to an extent better then all together leaving out or adjusting the data because like you said the user at the very least knows the data they’re looking at isn’t entirely accurate/complete. I can envision situations where data that is left out entirely or adjusted without annotations that it’s been edited.

      Log in to Reply
  3. Christa Giordano says

    August 29, 2022 at 10:52 pm

    The safeguards outlined by the FDGC guidance include either obfuscating or masking the data as it exists or to entirely remove elements of data deemed sensitive in order to protect the confidentiality. The downstream impact of this is that by safeguarding the confidentiality of the data, the two solutions provided impact the data integrity by editing the data and/or the availability of the data if specific data elements are removed. Considering this data could be used for analysis or research, the elements that are modified or removed should be considered to ensure this does not impact the analysis or conclusions rendered as a result of not having access to the entire dataset by which to draw conclusions. The act of safeguarding the confidentiality could inadvertently influence and incorrect conclusion. These are risks that should be considered when assessing the situation. If it is truly necessary to obfuscate or remove data, perhaps a disclaimer identifying the data is incomplete would be helpful.

    Log in to Reply
    • Kenneth Saltisky says

      August 30, 2022 at 5:05 pm

      Hi Christa,
      I find it interesting how you described the effects on confidentiality as a result of the alternate safeguards. I didn’t consider that the very act of implementing the safeguards could result in potentially violating confidentiality. I would assume that anyone considering applying safeguards would receive proper authentication first, but if an individual were to apply them without any authentication would be a violation of confidentiality.

      Log in to Reply
      • Jill Brummer says

        August 31, 2022 at 8:48 pm

        Hi Christa,

        I agree with you on compromising the integrity of the data if any is restricted or changed, that it could have a downstream effect depending on what analysis is done on the data and could render the conclusion of not having access to the full data set because the data set might not be complete and/or accurate.

        Log in to Reply
  4. Kenneth Saltisky says

    August 30, 2022 at 4:46 pm

    The alternative safeguards outlined by the FDGC guidance involve either obfuscating or hiding the data by changing its metadata or removing elements that are sensitive. As such, integrity and availability can be negatively impacted as a result of applying alternative safeguards. Those that used the data to access specific pieces of information would need to find alternate sources that have the data or obtain the proper credentials necessary to access the data.

    Log in to Reply
    • Shepherd Shenjere says

      September 2, 2022 at 4:38 pm

      Hello Kenneth,
      I agree with you on the idea that obfuscating or hiding the data by changing its metadata or removing elements that are sensitive will greatly violate security objectives such as integrity and availability. Perhaps this data is going to be used in future researches or projects, the results won’t be credible, because the experiment has be ran with tempered data. No integrity here. So, it is critical to find other ways to access this data without violating security objectives.

      Log in to Reply
  5. Maxwell ODonnell says

    September 5, 2022 at 2:35 pm

    One way to safeguard the data would be to limit who has access to it, in doing so limiting its permissions. Fewer people having access to the data means there is less potential for breaches. However, this obviously limits the accessibility of the data which can be counterintuitive for an institution, if no one can access the data, what is the point in keeping it or employing expensive safeguards to it? Another safeguard is to change the data itself, removing sensitive information to limit the potential damage a breach can cause. However, the issue with this approach is that the value of the data is within its integrity and changing it too much makes the data useless and no longer needs to be safeguarded. Taking this approach, there must be a limit to how much information can be changed, the data must retain some of its value while retaining its integrity.

    Log in to Reply
  6. Samuel Omotosho says

    September 30, 2022 at 11:42 am

    When the FGDC guidelines are applied, they work under two principles: restricting or changing data. These could impact the three objectives of data security which include confidentiality, availability, and integrity. When these guidelines are applied, they interfere with the authority of the data. This allows the user to view data which puts the confidentiality of information at risk. When the user can change the data, the integrity of the information is at stake (Borky & Bradley, 2018). When data is restricted according to the FGDC guidelines, they tend to limit management from accessing it. This makes it challenging to run their duties, resulting in losses.

    Log in to Reply
  7. Abayomi Aiyedebinu says

    October 10, 2022 at 1:34 am

    According to the FGDC guidelines one of the recommendations is to Restrict the Data which relates closely to the availability of the data and can put the risk level at high. For example, A lack of data can result in system interruptions. When data is restricted only few people have access to it and the possibility of this data been breached is almost minimal.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Unit 01: Understanding an Organization's Risk Environment (5)
  • Unit 02: Case Study 1 – Snowfall and a stolen laptop (6)
  • Unit 02: Data Classification Process and Models (6)
  • Unit 03: Risk Evaluation (6)
  • Unit 04: Case Study 2 – Autopsy of a Data Breach – The Target Case (4)
  • Unit 05: Creating a Security Aware Organization (6)
  • Unit 06: Physical and Environmental Security (6)
  • Unit 08: Case Study 3 – A Hospital Catches the "Millennium Bug" (3)
  • Unit 09: Business Continuity and Disaster Recovery (6)
  • Unit 10: Network Security (6)
  • Unit 11: Cryptography, Public Key Encryption and Digital Signature (6)
  • Unit 12: Identity Management and Access Control (6)
  • Unit 13: Computer Application Security (6)
  • Welcome (1)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in