• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2026 ■ Kelly McKain-D'Andria
  • Welcome
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project Preparation

Question 3

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

Which two information security objectives could be put at risk if the mitigations (i.e. “safeguards”) recommended by the Guidelines for Providing Appropriate Access to Geospatial Data in Response to Security Concerns are applied?  Explain how each of the security objectives is put at risk by the safeguards.

Filed Under: 1b: Data Classification Process and Models Tagged With:

Reader Interactions

Comments

  1. Changyang Sui says

    June 9, 2025 at 11:01 pm

    1. Availability

    Overly Restrictive Access Controls (AC-3, AC-6): If access permissions are set too strictly (e.g., denying legitimate users necessary data), critical geospatial information may become inaccessible during emergencies or operational needs.

    Excessive Encryption (SC-28, SC-9): Improper key management or overly complex encryption could delay data decryption, hindering timely access for authorized personnel.

    2. Integrity

    De-identification (4.2.3): If data is overly anonymized or aggregated without preserving critical attributes, it may lose accuracy or contextual relevance (e.g., masking precise coordinates needed for infrastructure repairs).

    Audit Overload (AU-2, AU-6): Excessive logging without proper analysis tools could obscure genuine integrity threats (e.g., unauthorized modifications) in a flood of irrelevant alerts.

    Log in to Reply
  2. Xinran Wu says

    June 12, 2025 at 11:16 am

    Availability is threatened if safeguards make it difficult for authorized users to access data when needed due to overly complex access procedures.
    Strict access rules force users to bypass security to improve workflow efficiency, so integrity is threatened

    Log in to Reply
  3. Siyu Li says

    June 12, 2025 at 11:40 am

    Availability and integrity.
    For availability, MFA steps can delay access to real-time geospatial data during critical operations. And high-volume MFA requests can overload authentication servers, causing service degradation or downtime. In addition, If encryption keys are mismanaged, encrypted geospatial datasets become inaccessible, effectively “locking” the data. And encryption/decryption of large geospatial files introduces processing latency, slowing down real-time applications.
    For integrity, overly strict validation rules can lead to automated deletion or modification of correct geospatial data. Validating massive geospatial datasets with flawed algorithms can introduce systematic errors. Meanwhile, hardware failures or software bugs during backups can introduce silent data corruption. What’s worse, failing to verify the integrity of recovered data can lead to using corrupted backups.

    Log in to Reply
  4. Jialin Fan says

    June 14, 2025 at 10:11 am

    Two information security objectives that could be put at risk are availability and integrity.
    Regarding availability, overly restrictive safeguards (e.g., excessive access controls, delays in approval processes) may prevent authorized users from accessing critical geospatial data when needed. For example, emergency responders might face delays in obtaining disaster-related geospatial data due to stringent authorization checks, compromising timely decision-making.
    In terms of integrity, the safeguards may require frequent data updates and exchanges. These processes could introduce errors or malicious alterations to the geospatial data. For instance, during the data transfer between different systems, there could be glitches or attacks that modify the data, affecting its integrity.

    Log in to Reply
  5. Jiaxuan Ma says

    June 15, 2025 at 11:17 am

    Integrity and Availability.

    Integrity refers to protecting information from unauthorized modification or destruction and ensuring its accuracy and reliability. Changing the data will remove or modify the sensitive information, thereby affecting the integrity of the data.

    Availability refers to ensuring that information can be accessed by authorized users in a timely manner. If access to and use of data are restricted, it may affect the acquisition of data by authorized users, thereby affecting the efficiency of business processes and decisions.

    Log in to Reply
  6. Yingyu Wang says

    June 15, 2025 at 11:33 pm

    May pose a risk to both data availability and data integrity.
    In terms of data availability, complex permission approval processes and overly stringent data classification standards may prevent authorized users from accessing the required data in a timely manner, thus creating risks. As for data integrity, security measures such as encryption storage and digital watermarks, if incompatible with the dynamic updates of geospatial data, may lead to version confusion, resulting in errors.

    Log in to Reply
  7. Ruizhen Zhang says

    June 16, 2025 at 3:34 am

    Availability and integrity.
    For example, if access controls are not properly implemented, legitimate users might be denied access to the data they need, which would compromise availability. On the other hand, if the guidelines recommend strict access controls to prevent unauthorized access, but these controls are not properly configured or tested, legitimate users might be denied access to the data they need, which would compromise the availability of the data.
    In terms of integrity, if the safeguards are not properly implemented or if there are vulnerabilities in the access control mechanisms, an attacker could potentially gain access to the keys and decrypt the data, leading to a breach of integrity.

    Log in to Reply
  8. Yufei Zhu says

    June 16, 2025 at 6:38 am

    The application of mitigation measures may affect the security goals of availability and integrity.
    Overly strict access controls and encryption measures may result in legitimate users not being able to access data in a timely way. Legitimate users may have to go through complicated procedures to access the data, which affects the availability of the data.
    Mitigation measures may also affect the integrity of the data. For example, if data is encrypted and stored in separate locations, data updates and version synchronization may be affected.

    Log in to Reply
  9. Meiyan Liu says

    June 16, 2025 at 8:22 am

    The security objectives of confidentiality and integrity may be at risk. If the authentication mechanisms used in security measures (such as password policies and permission allocation) are flawed (such as weak password rules or excessive permission delegation), unauthorized users may bypass authentication and access sensitive geospatial data, directly jeopardizing data confidentiality. If access control measures fail to strictly restrict data modification permissions, or if audit mechanisms fail to effectively monitor data changes, data may be maliciously or accidentally modified, compromising integrity.

    Log in to Reply
  10. Yiwen Lou says

    June 16, 2025 at 9:23 am

    Two info security goals that might get messed up are availability and integrity.
    For availability, if safeguards are too strict—like super tight access controls or slow approval processes—authorized people might not be able to get critical geospatial data when they need it. Imagine emergency responders trying to get disaster maps, but strict authorization checks slow them down. That could totally mess up their ability to make quick decisions during an emergency.
    When it comes to integrity, safeguards that need constant data updates and exchanges can cause problems. Every time data moves between systems, there’s a chance errors or hacks could mess with it. Like, maybe a glitch in the transfer or a cyber attack changes the geospatial data, so it’s no longer accurate. That’s a big deal because bad data can lead to wrong decisions!

    Log in to Reply
  11. Yiying Chen says

    June 16, 2025 at 12:14 pm

    1. Avalibility may be influenced by those strict access limitations. For example, complex authorization process would probably cause the data availability reduced and users encounter difficulties when they have the need to get in touch with and utilize the data.
    2, Integrity is easy to impact because of vulnerabilities in encryption in those data or there might be some errors in reviewing mechanism, resulting in a not integrated data appeared in front of users.

    Log in to Reply
  12. Jingni Li says

    June 17, 2025 at 1:34 am

    When applying the safeguards recommended in the guidelines, two information security objectives at risk are availability and integrity, explained as follows:
    (1)Availability: Stringent access controls (e.g., multi-factor authentication, complex approval workflows) or encryption protocols for geospatial data may introduce delays in data retrieval or system response times. For instance, mandatory verification processes during urgent access requests could hinder timely data delivery, impeding operational continuity.
    (2)Integrity: Safeguards like frequent data backups, transfers, or encryption/decryption cycles might inadvertently introduce errors or inconsistencies. If key management for encryption is flawed, data corruption could occur during processing, or misconfigured access controls might allow unauthorized modifications to go undetected, compromising data integrity.

    Log in to Reply
  13. Xintong Zhang says

    June 17, 2025 at 8:56 am

    The two information security objectives that may be put at risk are integrity and availability.
    Regarding integrity, safeguards such as data validation and de-identification may inadvertently affect data accuracy. For example, if critical data fields are mistakenly deleted or modified during de-identification, data consistency or accuracy may be compromised, leading to unauthorized tampering of information. Similarly, flawed data validation rules may incorrectly reject legitimate data updates or allow corrupted data to remain, violating integrity requirements by introducing erroneous or tampered information.
    In terms of usability, improper implementation of security measures such as access control and encryption can pose risks. For instance, overly strict access control measures may accidentally prevent authorized users from accessing geospatial data during critical operations like emergency response, thereby affecting the timely acquisition of information. If the key management of the encryption mechanism fails, it may result in the inability to access the data, causing service disruptions and violating the usability requirements.

    Log in to Reply
  14. Liyuan Zhou says

    June 18, 2025 at 3:23 am

    Two information security objectives at risk are integrity and availability.

    In terms of availability, measures in the security guidelines might make data hard to use. For example, if accessing data requires layers of approval or networks are overly segmented, emergency teams needing to retrieve maps urgently might be delayed by slow processes. If systems constantly run security scans or use complex encryption, processing large geospatial datasets could lag, preventing users from getting data in time.

    Regarding integrity, these measures could cause data errors. For instance, to prevent tampering, frequent verification or mandatory backups might be required. But if processes are poorly designed, staff could accidentally delete data, or incompatibilities between systems might corrupt data during transfer—like distorting terrain or boundary information.

    So security measures must balance protection and usability—don’t make data both hard to use and error-prone.

    Log in to Reply
  15. Meiqi Yan says

    June 18, 2025 at 4:02 am

    If safeguards for geospatial data are too strict, two key security goals could be hurt: availability and usability. Overly tight access controls might slow down or block emergency workers who need the data quickly, hurting availability. On the other hand, if safeguards are too weak, confidentiality could fail, risking leaks of sensitive location data. The challenge is balancing protection with practical access.

    Log in to Reply
  16. Wenhao GUO says

    June 18, 2025 at 5:50 am

    Applying the safeguards recommended in the guidelines could put two information security objectives at risk: availability and integrity. Availability may be compromised by overly restrictive access controls or encryption, which could delay data access for authorized users during critical operations or emergencies, as strict permissions or complex encryption mechanisms might hinder timely retrieval. Integrity, meanwhile, could be at risk due to data de-identification or flawed storage practices—for example, excessive anonymization or aggregation of geospatial data might strip it of critical contextual details, compromising accuracy, while fragmented encryption storage or inadequate version control could lead to inconsistencies or loss of data coherence during updates, undermining its integrity.

    Log in to Reply
  17. Wenhao Liu says

    June 18, 2025 at 6:19 am

    The two information security objectives at risk could be availability and integrity. If safeguards like strict access controls or data encryption are overly restrictive, they might disrupt legitimate users’ timely access to geospatial data, compromising availability. For instance, complex authentication processes could delay data retrieval, affecting operational efficiency. Additionally, if safeguards involve data sanitization or filtering, there’s a risk of altering data accuracy or completeness, undermining integrity. For example, removing certain data fields to protect privacy might inadvertently delete critical spatial details, leading to incorrect analysis or decisions.

    Log in to Reply
  18. Zuqi Zhang says

    June 19, 2025 at 4:03 am

    applying the safeguards for geospatial data might put two main security objectives at risk: availability and usability.
    the first is availability. If we add too many safeguards like strict access controls or encryption, it might make it harder for people who actually need the data to get to it quickly. For example, if researchers or emergency responders need geospatial data in a hurry, extra layers of security could slow them down.
    Second, usability. If we encrypt the data or put it behind complex systems, it might become harder to use. People might need special tools or training to access it, which could limit how easily they can work with the data. So while the safeguards protect the data, they might also make it less user-friendly.

    Log in to Reply
  19. Xiaojin Liu says

    June 19, 2025 at 6:53 am

    If the mitigation measures (i.e., “safeguards”) recommended in the “Guidelines for Providing Appropriate Geospatial Data Access in Response to Security Concerns” are implemented, the two information security objectives of integrity and availability may be at risk. The integrity risk stems from the fact that access restrictions may weaken the monitoring ability for data tampering, and de-identification may undermine the accuracy and relevance of the data; the availability risk is manifested in the form that excessive control may prevent authorized users from obtaining critical data in a timely manner, affecting emergency response or business efficiency.

    Log in to Reply
  20. Jianwei Huang says

    June 19, 2025 at 8:59 am

    Applying the safeguards from the Guidelines for Providing Appropriate Access to Geospatial Data might risk availability and usability. Strict access controls, like multi – factor authentication and role – based access, can slow down data access. For instance, first responders in an emergency may waste precious time getting through complex authentication steps, which could delay critical operations and make the data unavailable when it’s most needed.
    Moreover, overly complex security measures can harm usability. Geospatial data users, such as urban planners or researchers, may find it difficult to work efficiently if they have to deal with too many security layers. Cumbersome encryption processes or frequent permission requests can lead to mistakes or workarounds. Users might be tempted to bypass security protocols to get their work done, which increases the risk of data breaches and defeats the purpose of the safeguards. In short, while the safeguards are meant to enhance security, they can accidentally create obstacles that reduce the data’s availability and usability.

    Log in to Reply
  21. Jiwei Yang says

    June 19, 2025 at 11:51 am

    When implementing safeguards recommended in guidelines for geospatial data access, two information security objectives at risk are availability and integrity. Below is an explanation of how each objective can be compromised:
    1.Availability
    Overly restrictive access controls: If safeguards impose excessive authentication layers (e.g., multi-factor authentication, strict role-based access) or frequent access revocations, authorized users may face delays or denials when attempting to retrieve geospatial data. For example, requiring real-time approval from multiple stakeholders for routine data requests could create bottlenecks, especially in time-sensitive scenarios (e.g., emergency response or critical infrastructure management).
    Data segmentation and encryption overhead: Partitioning geospatial data into secure segments or applying strong encryption may require complex decryption processes or system integrations. If the infrastructure fails to handle these processes efficiently (e.g., due to outdated decryption tools or network latency), data may become temporarily inaccessible, violating availability.
    2.Integrity
    Data manipulation during security processing: Safeguards like data masking or redaction to protect sensitive information (e.g., removing coordinates from public datasets) may inadvertently alter critical geospatial attributes. For instance, masking minor coordinate details in a transportation dataset could distort route accuracy, leading to incorrect analyses.
    Human error in security implementation: Manual application of safeguards (e.g., manually reviewing and approving data modifications) introduces the risk of human error. A security officer might mistakenly approve a corrupted data file or fail to detect unauthorized changes during a review, allowing integrity breaches to persist.

    Log in to Reply
  22. Shouxi Mou says

    June 20, 2025 at 12:30 am

    ​​Two Security Objectives at Risk from Geospatial Data Safeguards:​​

    ​​Confidentiality​​
    Risk: Over-restricting access may block legitimate users while still leaving metadata exposed.
    ​​Availability​​
    Risk: Complex approval processes could delay critical data access during emergencies.
    ​​Trade-off​​:
    Balancing strict controls with operational needs is key—automated audits and tiered access can help.

    Log in to Reply
  23. Yan Liu says

    June 20, 2025 at 12:53 am

    Mitigation measures can conflict with availability and integrity goals. Overly strict access controls or encryption may delay legitimate users via complex procedures, undermining data availability. Encryption and distributed storage can also hinder data integrity—updates and version syncing become problematic when data is split across locations. Balancing security controls with operational usability is crucial to avoid compromising these core objectives.

    Log in to Reply
  24. Huiling Huang says

    June 20, 2025 at 3:51 am

    First, FIPS 199 helps you figure out how important your geospatial data is. You look at three things: how bad it would be if the data’s confidentiality (kept secret) is broken, its integrity (accuracy and trustworthiness) is messed up, or its availability (being there when you need it) is lost.

    For each safeguard in the guidelines, you ask yourself: Does this help protect the data’s confidentiality? For example, if it’s a rule about who can see the data, it probably does. Or does it keep the data accurate and whole (integrity), like a check to make sure the data isn’t changed by mistake? Or does it make sure the data is always ready when people need it (availability), like having a backup plan?

    If a safeguard helps protect the data based on its categorization (low, moderate, or high impact for each of those three things), then it’s likely needed. If it doesn’t match up with what the data needs to stay safe, you might not need it.

    Log in to Reply
  25. Rong Su says

    June 21, 2025 at 2:47 am

    Availability and integrity. Overly tight access controls might slow down or block emergency workers who need the data quickly, hurting availability. Frequent data protection measures such as backups, transfers, or encryption/decryption cycles may inadvertently introduce errors or inconsistencies. If key management for encryption is flawed, data corruption may occur during processing. Similarly, misconfigured access controls could permit undetected unauthorized modifications, thereby compromising data integrity.

    Log in to Reply
  26. Xinshang Pei says

    June 21, 2025 at 11:54 am

    Geospatial data faces significant confidentiality and integrity risks when security controls are inadequate. Weak authentication mechanisms—such as lax password policies or overprivileged user accounts—can enable unauthorized access to sensitive information. Similarly, insufficient access controls or ineffective audit trails may permit unauthorized data alterations, whether intentional or accidental. These vulnerabilities directly threaten both data protection (confidentiality) and accuracy (integrity).

    Log in to Reply
  27. Gao Yujing says

    June 21, 2025 at 2:22 pm

    Two Security Objectives at Risk from Geospatial Data Safeguards​​
    Applying safeguards recommended by the Guidelines for Providing Appropriate Access to Geospatial Data may compromise ​​Availability​​ and ​​Integrity​​, as analyzed below:

    🔒 ​​1. Risks to Availability​​
    📌 ​​Mechanism:​​
    ​​Access Delays​​: Tiered approval processes (e.g., multi-level authorization for sensitive coordinates) can hinder real-time access during emergencies (e.g., flood mapping delays impeding evacuation planning).
    ​​Service Disruption​​: Overly restrictive updates (e.g., suspending public map services for “security reviews”) may break navigation systems or urban planning workflows.
    📌 ​​Evidence:​​
    U.S. DOE: Overly constrained power grid data sharing delayed response to load anomalies → Blackout expansion.
    RAND Corporation: 6% of critical NSDI datasets withheld due to security restrictions weakened disaster coordination.
    🔐 ​​2. Risks to Integrity​​
    📌 ​​Mechanism:​​
    ​​Data Relevance Loss​​: Coordinate obfuscation (e.g., reducing precision near military bases) breaks spatial correlations with climate models → Distorted environmental risk assessments.
    ​​Version Conflicts​​: Desensitized data stored separately from source datasets may become outdated → Inconsistent decision-making (e.g., disaster maps vs. actual terrain).
    📌 ​​Technical Trade-offs:​​
    Masking techniques protect confidentiality but sacrifice ​​spatial topology accuracy​​ (e.g., blurred elevation data compromises infrastructure planning).
    Audit logs for integrity checks may fail due to ​​cross-platform incompatibility​​ (e.g., conflicting GIS log formats), enabling undetected tampering.
    ⚖️ ​​Core Conflict: Dual-Edged Nature of Safeguards​​
    ​​Objective​​ ​​Recommended Safeguards​​ ​​Secondary Risks​​
    ​​Availability​​ Tiered access controls, data approval workflows Delayed emergency response, public service disruption
    ​​Integrity​​ Data masking, decentralized storage Broken data relevance, version conflicts
    💎 ​​Mitigation Strategies​​
    ​​Dynamic Authorization​​: Context-aware permissions (e.g., auto-elevate access for responders during disasters).
    ​​Metadata Integrity​​: Embed verifiable hashes in masked data to ensure logical consistency.
    ​​Cross-Platform Standards​​: Adopt unified geospatial security policies (e.g., extended GeoXACML) to resolve conflicts.

    Log in to Reply
  28. Yangyu Zhang says

    June 21, 2025 at 4:03 pm

    Based on standard frameworks (e.g., CIA triad), the two objectives most commonly put at risk are:
    (1).Availability
    How Safeguards Put It at Risk:
    Overly Restrictive Access Controls:Safeguards like multi-factor authentication (MFA) or role-based access controls (RBAC) may delay or block access for authorized users during emergencies (e.g., firefighters needing real-time wildfire maps).
    Encryption/Data Fragmentation.If a geospatial dataset of flood zones requires complex approval workflows, emergency responders might be unable to access it during a crisis.
    (2).Confidentiality
    How Safeguards Put It at Risk:
    Incomplete Data Sanitization:Safeguards like partial data redaction or lower-resolution tiles (to hide sensitive details) might leave exploitable metadata (e.g., timestamps, grid references) or patterns that reveal confidential information.
    Misconfigured Watermarking:Digital watermarking (used to trace leaks) might embed identifiable user information in public-facing datasets, accidentally exposing users’ identities or access privileges.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (3)
  • 1b: Data Classification Process and Models (4)
  • 1c: Risk Evaluation (4)
  • 2a: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 2b: Creating a Security Aware Organization (4)
  • 2c: Physical and Environmental Security (3)
  • 3b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 3c: Business Continuity and Disaster Recovery (4)
  • 4a: Team Project Instructions (1)
  • 4b: Network Security (4)
  • 4c: Cryptography Public Key Encryption and Digital Signatures (4)
  • 5a: Identity Management and Access Control (4)
  • 5b: Computer Application Security (4)

Copyright © 2026 · Course News Pro on Genesis Framework · WordPress · Log in