• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2026 ■ Kelly McKain-D'Andria
  • Welcome
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project Preparation

Question 2

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

How would you apply the security categorization standards (FIPS 199) to decide if each of the information security risk mitigations (“safeguards”) described in the Guidelines for Providing Appropriate Access to Geospatial Data in Response to Security Concerns are needed?

Filed Under: 1b: Data Classification Process and Models Tagged With:

Reader Interactions

Comments

  1. Changyang Sui says

    June 9, 2025 at 10:48 pm

    Based on the FIPS 199 security categorization standards, the security safeguards for geospatial data should be determined according to their impact levels (low, moderate, high) on confidentiality, integrity, and availability:

    For high-impact data (e.g., involving national security or critical infrastructure), stringent measures must be implemented, including strong encryption (SC-28, SC-9), least-privilege access controls (AC-3, AC-6), continuous auditing (AU-2, AU-6), and Privacy Impact Assessments (PIA).

    For moderate-impact data (e.g., related to public safety), core protections such as transmission encryption and basic access controls are required.

    For low-impact data (e.g., publicly available maps), only fundamental management measures are necessary.

    Additionally, legal requirements (e.g., OMB M-07-16 mandating two-factor authentication) and aggregated risk considerations should be incorporated to ensure the protection level aligns with data sensitivity, avoiding both excessive and insufficient safeguards.

    Log in to Reply
  2. Siyu Li says

    June 12, 2025 at 10:04 am

    FIPS 199’s security categorization drives safeguard necessity by linking each control to the confidentiality, integrity, and availability impacts of geospatial data. By prioritizing safeguards based on impact levels and the high-water mark principle, organizations ensure that controls are proportionate to risk, avoiding over- or under-investment in security. This approach ensures that safeguards for geospatial data are both effective and compliant with federal standards.

    Log in to Reply
  3. Xinran Wu says

    June 12, 2025 at 11:02 am

    FIPS 199 assesses three security objectives: Confidentiality, Integrity, Availability. For each objective, assign impact levels: low, moderate, high.
    For example:
    1、The disclosure of geographic coordinates of military facilities endangers national security and misleads military operations, so its information security level :
    SC={(confidential, high),(integrity, High),(availability, High)}
    2、The disclosure of the location of critical infrastructure will cause public disaster, service interruption and threaten people’s livelihood, so its information security level i:
    SC={(confidential, high),(integrity, Moderate),(availability, High)}
    3、The public basic map, including roads and administrative divisions, does not contain sensitive information, which will affect the use of users, so its information security level:
    SC={(confidential, low),(integrity, low),(availability, low)}

    Log in to Reply
    • Xinran Wu says

      June 12, 2025 at 11:05 am

      For the first two types of information, it is necessary to control the access rights, and for the third type of information, it is not necessary to control the access rights

      Log in to Reply
  4. Jialin Fan says

    June 14, 2025 at 8:56 am

    I think that includes the following steps:
    1. Assess impact levels: Determine the impact levels (low, moderate, high) of the loss of confidentiality, integrity, and availability of the data according to FIPS 199. Assign low, moderate, or high impact levels for each CIA category.
    2. Determine System Security Category: Combine the highest impact levels across CIA to define the system’s overall security category.
    3. Select the corresponding measures: High-impact systems require stricter safeguards; moderate-impact systems may need standard protections; low-impact systems may only require basic safeguards.
    4. Document the decision-making process. Keep records of how you applied the FIPS 199 standards and why you decided whether each safeguard is needed or not. This documentation can be useful for audits and future reference.

    Log in to Reply
  5. Jiaxuan Ma says

    June 15, 2025 at 11:16 am

    Guidelines for Providing Appropriate Access to Geospatial Data in Response to Security Concerns offers two guidelines: Change the data and Restrict the data.
    Three security objectives of FIPS 199 are confidentiality, integrity, and availability. There are three levels of potential impact: LOW, MODERATE and HIGH.

    Firstly, identify information and systems.
    The generalized format for expressing the security category of an information type is:
    SC information type = {(confidentiality, impact), (integrity, impact), (availability, impact)},
    *impact= LOW/MODERATE/HIGH/NA
    While determining the security category of an information system requires more analysis, must consider the security category of all information types on the system and apply the maximum potential impact.

    Secondly, evaluate potential impacts.
    Evaluate whether the adverse effect caused by these three event are limited, serious or severe or catastrophic.
    1. unauthorized disclosure (Confidentiality)
    2. the unauthorized modification or destruction (Integrity)
    3. disruption of access to or use of information or an information system (Availability)

    Then, based on the assessment results, determine the safeguards. If the three security objects of an information system are all “HIGH”, consider whether by changing these data, services can still be provided to the public and security risks can be mitigated, thereby deciding whether to change the data or restrict it.

    Log in to Reply
  6. Yingyu Wang says

    June 15, 2025 at 11:34 am

    To determine the necessity of mitigation measures based on the FIPS 199 standard, I believe the following technical framework is required:

    Evaluate confidentiality, integrity, and availability from low, medium, and high levels.

    Implement technical controls, physical controls, and administrative controls for prevention. Additionally, a layered defense mechanism should be adopted along with periodic vulnerability scanning, and employee security training must be conducted.

    Use the model mentioned in the article, risk = asset * threat * vulnerability, assigning different asset weights based on asset value, and estimating threat probability based on the environmental evaluation. Vulnerability testing should be carried out through penetration testing.

    Based on the ALE (Annual Loss Expectancy) calculation results, for high-security data, even if the cost of control measures exceeds the SLE (Single Loss Expectancy), an application-level firewall should still be deployed. For medium and low-security data, a risk transfer strategy can be applied.

    Log in to Reply
  7. Ruizhen Zhang says

    June 16, 2025 at 3:19 am

    FIPS 199 include the three security objectives (confidentiality, integrity, availability) and the three potential impact levels (low, moderate, high).
    First, recognize all types of information involved. For example, in the context of geospatial data, this might include personally identifiable information, sensitive location data, etc.
    According to FIPS 199, each type of information’s security category is determined based on the potential impact level on the organization or individuals if confidentiality, integrity, or availability were compromised. The impact levels are categorized as Low, Moderate, or High:
    If the loss of confidentiality, integrity, or availability could be expected to have a limited adverse effect, then the potential impact is Low.
    If it could cause serious adverse effects, then the potential impact is Moderate.
    If it could result in severe or catastrophic adverse effects, then the potential impact is High.
    For High-impact information, stronger protective measures may be required, such as advanced encryption techniques, strict access controls, and regular audits.
    For Moderate-impact information, more standard security measures like basic encryption and routine monitoring may suffice.
    For Low-impact information, basic protections such as simple access controls might be adequate.
    Once the necessary safeguards are identified, implement them into the system and continuously monitor and adjust to ensure their effectiveness.

    Log in to Reply
  8. Yufei Zhu says

    June 16, 2025 at 6:37 am

    The first step is to determine the security classification of geospatial data. Whether data leakage and tampering threaten the three security objectives of confidentiality, integrity and availability, and whether the threat level is “high”, ‘’moderate’’ or “low”. If the data is high-impact, the highest level of control must be implemented. If the data is moderate-impact data, a medium level of control is sufficient. For example, if geospatial data is high-impact data, its unauthorized disclosure could have a serious impact on the organization, and therefore access control lists, encrypted transmission of data, and physical security are needed to ensure the security of the data. If it is moderate-impact data, a selection of necessary measures can be implemented.

    Log in to Reply
  9. Meiyan Liu says

    June 16, 2025 at 8:17 am

    1. Identify Information Types and Systems: First, it’s essential to determine the specific information types and systems associated with the geospatial data. For example, the data could be related to national security, emergency response, or commercial use. According to FIPS 199, a high impact means that the unauthorized disclosure could cause a severe or catastrophic adverse effect on organizational operations, assets, or individuals.
    2. Assess Potential Impact on Confidentiality: Evaluate the potential impact of unauthorized disclosure of the geospatial data. If the data contains sensitive information such as the location of military installations or critical infrastructure, a loss of confidentiality could have a high impact. According to FIPS 199, a high impact means that the unauthorized disclosure could cause a severe or catastrophic adverse effect on organizational operations, assets, or individuals.
    3. Assess Potential Impact on Integrity: Consider the consequences of unauthorized modification or destruction of the geospatial data. If inaccurate geospatial data could lead to significant disruptions in emergency response efforts, for example, causing responders to go to the wrong location, it would have a high impact on integrity.
    4. Evaluate Safeguards: Once the security category is determined, evaluate each safeguard described in the Guidelines. If the safeguard is related to protecting confidentiality, such as access controls or encryption, and the data has a high or moderate confidentiality impact, then the safeguard is likely necessary.

    Log in to Reply
  10. Yiwen Lou says

    June 16, 2025 at 9:21 am

    I think the process goes like this:
    Assess impact levels based on FIPS 199: Figure out how bad it would be if data lost its confidentiality, integrity, or availability. For each of these three aspects (CIA), assign a low, moderate, or high impact level. It’s like grading how much trouble we’d be in if each type of data security got messed up.
    Figure out the system’s security category: Take the highest impact level from the CIA categories and use that to define the overall security category for the system. So if confidentiality is high-impact but the others are moderate, the system is considered high-impact overall.
    Pick the right safeguards: High-impact systems need strict security measures, moderate ones can have standard protections, and low-impact systems just need basic safeguards. It’s like wearing a helmet for high-risk activities vs. a bike lock for moderate-risk ones.
    Write down why you made these choices: Keep notes on how you used FIPS 199 standards and why you chose each safeguard. This paperwork is key for audits and remembering our reasoning later—kind of like taking notes in class to study for exams!

    Log in to Reply
  11. Yiying Chen says

    June 16, 2025 at 12:06 pm

    I firstly learned the FIPS 199 defines three security objectives for information and information systems:
    CONFIDENTIALITY: Preserving authorized restrictions on information access and disclosure, including means for protecting personal privacy and proprietary information. And the loss of confidentiality is the unauthorized disclosure of information.
    INTEGRITY: Guarding against improper information modification or destruction, and includes ensuring information non-repudiation and authenticity. The loss of integrity is the unauthorized modification or destruction of information.
    AVAILABILITY: Ensuring timely and reliable access to and use of information. A loss of availability is the disruption of access to or use of information or an information system.
    Then, the security category of an information type can be associated with both user information and system information and can be applicable to information in either electronic or non-electronic form. It can also be used as input in considering the appropriate security category of an information system. Establishing an appropriate
    security category of an information type essentially requires determining the potential impact for each security objective associated with the particular information type.
    The generalized format for expressing the security category, SC, of an information type is:
    SC information type = {(confidentiality, impact), (integrity, impact), (availability, impact)},
    As Geospatial Data, data masking is important to protect some some critical spots, as unmasked data enables strategic attacks by adversaries, violating FIPS 199’s ‘must protect’ mandate for high-confidentiality data.
    Besides, digital watermarking can be a recommended way to clarify the right of some lands and boundary, also distribution to local governments, aligning with FIPS 199’s ‘should implement’ guidance for Moderate-integrity data.

    Log in to Reply
  12. Jingni Li says

    June 17, 2025 at 1:31 am

    FIPS 199 categorizes information and information systems into low, moderate, and high impact levels based on the potential impact of a security breach on confidentiality, integrity, and availability. To determine if the information security risk mitigations in the Geospatial Data access guidelines are needed, one would assess the impact level of the geospatial data in question according to FIPS 199. For data with a low – impact level, simpler safeguards may suffice, while moderate – and high – impact data would require more comprehensive and robust risk mitigations. By aligning the nature and extent of the safeguards with the categorized impact level of the geospatial data, an appropriate and proportionate security approach can be established.

    Log in to Reply
  13. Xintong Zhang says

    June 17, 2025 at 8:29 am

    When applying the security categorization standards of FIPS 199, geospatial data should first be classified by information types such as privacy data or critical infrastructure data, with their attributes defined in conjunction with legal requirements or organizational definitions. Next, potential impacts are assessed across confidentiality, integrity, and availability to define high, moderate, and low threat levels. For instance, if geospatial data contains personally identifiable information, unauthorized disclosure may harm individuals, warranting a high confidentiality impact rating.
    Subsequently, security safeguards must align with security categories. Encryption technologies and access control mechanisms address high confidentiality needs; data validation and audit trails ensure integrity; and redundant systems mitigate availability risks. When data includes personally identifiable information, privacy measures like data minimization and de-identification should be integrated to reduce potential data breach risks. Finally, the “high water mark” principle in FIPS 199 is used to verify whether safeguards effectively address the highest impact level within the security category, ensuring protection measures match data security requirements and prevent insufficient protection.

    Log in to Reply
  14. Liyuan Zhou says

    June 18, 2025 at 3:19 am

    To determine if security measures for geospatial data are necessary, start by judging how important the data is. If it’s public data like a park map that won’t cause big problems if leaked, basic management works—just log who accesses it or update systems regularly. For more important data like urban traffic flow that could affect operations if leaked, strengthen protection with things like password + verification code logins or file encryption. Critical data like key facility locations that pose safety risks if leaked needs strict controls, such as fingerprint authentication, real-time access monitoring, and approval for every use. The key is to match measures to data importance: encrypting critical data makes sense, but doing the same for public data is overkill. Avoid over-protecting trivial data while ensuring important info isn’t left unguarded.

    Log in to Reply
  15. Meiqi Yan says

    June 18, 2025 at 3:58 am

    To decide if a security safeguard is needed using FIPS 199, I’d first assess the potential impact if the geospatial data was compromised—like whether its loss could harm safety, privacy, or operations. For example, if the data could endanger lives, strong safeguards like encryption or strict access controls would be necessary. If the risk is minor, basic protections might suffice. The goal is to match the safeguards to the data’s sensitivity level—no overkill, but no weak spots either.

    Log in to Reply
  16. Wenhao GUO says

    June 18, 2025 at 5:45 am

    To apply FIPS 199 security categorization standards, first assess the geospatial data’s impact levels on confidentiality, integrity, and availability—classifying them as low, moderate, or high. High-impact data, where compromise could cause severe consequences, requires stringent safeguards like strong encryption, least-privilege access controls, and continuous auditing; moderate-impact data needs core protections such as transmission encryption and basic access controls; low-impact data only requires fundamental management measures. Additionally, integrate legal mandates and aggregated risk analysis to ensure safeguards align with data sensitivity, avoiding both excessive and insufficient protection. This approach ensures each mitigation measure is justified by the data’s security categorization, balancing risk reduction with practical implementation.

    Log in to Reply
  17. Wenhao Liu says

    June 18, 2025 at 6:18 am

    To apply FIPS 199 security categorization standards, first, identify the information types in geospatial data, such as privacy-related or critical infrastructure data. Evaluate the potential impact of confidentiality, integrity, and availability losses for each information type. For example, if unauthorized disclosure of geospatial data could cause significant harm (high impact), the confidentiality safeguard would be prioritized. FIPS 199 requires assigning impact levels (low, moderate, high) for each security objective. Safeguards like access controls or encryption would be deemed necessary if they align with the impact levels—e.g., high-impact data needs robust encryption (technical control) and strict access policies (management control).

    Log in to Reply
  18. Zuqi Zhang says

    June 19, 2025 at 4:01 am

    To figure out if we need certain security safeguards for geospatial data, we can use the FIPS 199 standards. These standards help us categorize how important and sensitive the data is. We look at three main things: the impact on confidentiality (keeping secrets), integrity (making sure the data isn’t messed up), and availability (making sure people who need it can access it).
    then, we match these categories to the guidelines for geospatial data. If the data is super sensitive or critical, we definitely need stronger safeguards like encryption and strict access controls. If it’s less sensitive, maybe we can go with lighter measures. It’s all about balancing the risk with what’s practical.

    Log in to Reply
  19. Xiaojin Liu says

    June 19, 2025 at 6:40 am

    According to FIPS 199, to determine whether security protection measures for geospatial data are necessary, the data must first be classified based on potential impact (confidentiality, integrity, availability): high impact (such as military geospatial data) requires strict measures (such as multi-factor authentication, encryption); medium impact (such as local government data) requires basic protection (such as access control); low impact (such as public maps) only requires basic safeguards (such as backup). Ultimately, the overall security protection intensity of the system is determined based on the highest impact level of the data, ensuring the rational allocation of resources and prioritizing the protection of high-risk data.

    Log in to Reply
  20. Jianwei Huang says

    June 19, 2025 at 8:54 am

    To apply FIPS 199, first assess the geospatial data’s impact level—low, moderate, or high—based on how much harm loss or breach would cause. Each safeguard in the guidelines should match this impact. For example, if data exposure could severely affect public safety (high impact), stronger controls like encryption or strict access reviews are needed. If impact is low, basic measures like user training might suffice. FIPS 199 helps map safeguards to the data’s criticality: analyze each risk mitigation to see if it aligns with the data’s classified impact level, ensuring measures are neither excessive nor insufficient. This way, resources focus on safeguards that truly fit the data’s security needs.

    Log in to Reply
  21. Jiwei Yang says

    June 19, 2025 at 11:45 am

    To apply FIPS 199 security categorization standards to geospatial data safeguards, first assess the confidentiality, integrity, and availability (CIA) impact levels of the data. FIPS 199 defines three categories: low, moderate, and high, based on whether a breach would cause “limited,” “serious,” or “catastrophic” harm,prioritizing measures that directly mitigate the highest identified risks. This ensures proportionality and effectiveness in risk management.

    Log in to Reply
  22. Yan Liu says

    June 20, 2025 at 12:50 am

    The first step in securing geospatial data is classifying it by security impact—assessing if leaks/tampering threaten confidentiality, integrity, or availability, rated as high, moderate, or low. High-impact data requires strict controls like access lists, encrypted transmission, and physical security, as unauthorized disclosure poses severe organizational risks. Moderate-impact data allows more targeted measures, balancing security with practicality. This risk-based approach ensures resources align with data criticality, optimizing protection efficiency.

    Log in to Reply
  23. Huiling Huang says

    June 20, 2025 at 3:48 am

    First, FIPS 199 helps you figure out how important your geospatial data is. You look at three things: how bad it would be if the data’s confidentiality (kept secret) is broken, its integrity (accuracy and trustworthiness) is messed up, or its availability (being there when you need it) is lost.
    For each safeguard in the guidelines, you ask yourself: Does this help protect the data’s confidentiality? For example, if it’s a rule about who can see the data, it probably does. Or does it keep the data accurate and whole (integrity), like a check to make sure the data isn’t changed by mistake? Or does it make sure the data is always ready when people need it (availability), like having a backup plan?
    If a safeguard helps protect the data based on its categorization (low, moderate, or high impact for each of those three things), then it’s likely needed. If it doesn’t match up with what the data needs to stay safe, you might not need it.

    Log in to Reply
  24. Rong Su says

    June 21, 2025 at 2:40 am

    FIPS 199 assesses three security objectives: Confidentiality, Integrity, Availability.
    For data with significant impact, stringent measures must be enforced, including robust encryption, least-privilege access controls, continuous auditing, and privacy impact assessments.
    For moderately impactful data, core protective measures such as transport encryption and basic access controls are required.
    For low-impact data, only basic administrative safeguards are necessary.

    Log in to Reply
  25. Xinshang Pei says

    June 21, 2025 at 11:50 am

    Applying FIPS 199 Security Categorization:​​

    ​​Identify Data Types​​ – Classify geospatial data (e.g., privacy-sensitive, critical infrastructure).
    ​​Assess Impacts​​ – Evaluate potential harm from breaches of:
    • ​​Confidentiality​​ (unauthorized access)
    • ​​Integrity​​ (unauthorized modification)
    • ​​Availability​​ (service disruption)
    ​​Assign Impact Levels​​ – Label each security objective as Low/Moderate/High (e.g., high-impact if unauthorized disclosure causes severe damage).
    ​​Implement Controls​​ – Match safeguards to impact levels:
    • High-impact: AES-256 encryption + role-based access controls
    • Moderate: Multi-factor authentication + audit logs

    Log in to Reply
  26. Gao Yujing says

    June 21, 2025 at 1:03 pm

    Data Sensitivity Assessment​​
    Based on the Three Security Objectives of FIPS 199:​​
    ​​ (Confidentiality)​​: If geospatial data contains sensitive information (e.g., critical infrastructure locations), high-level confidentiality safeguards are required (e.g., encryption, access controls).
    ​​ (Integrity)​​: If data tampering could impact public safety (e.g., emergency response maps), integrity safeguards are required (e.g., digital signatures, audit logs).
    (Availability)​​: If data disruption could threaten life or national security (e.g., real-time disaster monitoring), high availability measures are required (e.g., redundant backups).
    ​​2. | Impact Level Categorization​​
    ​​ (Low)​​: Disclosure of data does not affect national security or personal privacy (e.g., general topographic maps), likely requiring no additional safeguards.
    ​​ (Moderate)​​: Data leakage/corruption could cause limited harm (e.g., regional economic data), requiring partial safeguards (e.g., role-based access control).
    ​​(High)​​: Data involves national security or life risks (e.g., military base coordinates), requiring stringent safeguards (e.g., multi-factor authentication, data masking/de-identification).
    ​​3. Safeguard Mapping​​
    Confidentiality Requirement​​ → Implement data encryption (e.g., AES-256), least privilege access.
    Integrity Requirement​​ → Deploy hash verification, tamper-evident/protection technologies.
    Availability Requirement →​​ Establish disaster recovery systems, Service Level Agreements (SLA).
    ​​4. Continuous Monitoring​​
    Periodically review data categorization (e.g., annual review), dynamically adjust safeguards to adapt to new threats (e.g., data remnant risks in cloud environments).
    ​​Example​​
    High-Sensitivity Data​​ (e.g., power grid topology): Mandatory FIPS 140-2 validated encryption + Attribute-Based Access Control (ABAC).
    ​​Low-Sensitivity Data​​ (e.g., public park map): Only basic integrity checks required.

    Log in to Reply
  27. Yangyu Zhang says

    June 21, 2025 at 3:52 pm

    Here’s how to map geospatial data risks to FIPS 199 and justify safeguards:
    1.Categorize Geospatial Data Using FIPS 199.
    2.Map Safeguards to Impact Levels.
    3.Decision Flow for Safeguard Implementation

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (3)
  • 1b: Data Classification Process and Models (4)
  • 1c: Risk Evaluation (4)
  • 2a: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 2b: Creating a Security Aware Organization (4)
  • 2c: Physical and Environmental Security (3)
  • 3b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 3c: Business Continuity and Disaster Recovery (4)
  • 4a: Team Project Instructions (1)
  • 4b: Network Security (4)
  • 4c: Cryptography Public Key Encryption and Digital Signatures (4)
  • 5a: Identity Management and Access Control (4)
  • 5b: Computer Application Security (4)

Copyright © 2026 · Course News Pro on Genesis Framework · WordPress · Log in