• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Protection of Information Assets

Temple University

Protection of Information Assets

MIS 5206.951 ■ Summer 2026 ■ Kelly McKain-D'Andria
  • Welcome
  • Instructor
  • Syllabus with Readings (Start reading now!)
  • Team Project Preparation

Question 2

April 29, 2025 by Kelly McKain-D'Andria 28 Comments

Suppose an organization is only able to filter and selectively block either: a) network traffic coming into its intranet from the internet (incoming) or b) network traffic going out to the internet (outbound).  With respect to each of the 3 information system security objectives (i.e. confidentiality, integrity, and availability), if you could only filter and selectively block one network traffic direction which one you would you concentrate on and why?

Filed Under: 4b: Network Security Tagged With:

Reader Interactions

Comments

  1. Yingyu Wang says

    June 17, 2025 at 3:18 am

    Filtering inbound traffic is more critical.
    Inbound traffic filtering can block external scanning and reconnaissance, intercept the injection of malicious code, and enhance the defense against DDoS attacks by 57%. While filtering outbound traffic is more direct in preventing data exfiltration, outbound controls are necessary if the internal network has already been compromised.
    In general, under resource constraints, inbound filtering provides higher protection efficacy, but it should still be complemented by endpoint security measures to mitigate potential gaps.

    Log in to Reply
  2. Changyang Sui says

    June 17, 2025 at 5:19 am

    Recommended Choice: Filter Outbound Traffic
    1. Confidentiality is hardest to recover once lost—data leaks cause long-term harm (regulatory fines, reputational damage).
    2. Malware control: Many attacks (ransomware, spyware) require outbound communication to succeed.
    3. Insider threats are a major risk—outbound filtering limits malicious or accidental data exposure.

    Log in to Reply
  3. Xinran Wu says

    June 17, 2025 at 10:12 am

    I would prefer to block inbound traffic.
    For confidentiality, filtering inbound traffic can prevent external attackers from infiltrating the organization’s internal network through the network, thereby protecting confidential information from being stolen.
    For integrity, by controlling inbound traffic, it can reduce the risk of malicious software or attackers tampering with the internal systems, ensuring the integrity of data and systems.
    For availability, filtering inbound traffic can prevent DDoS and block botnets.

    Log in to Reply
  4. Siyu Li says

    June 17, 2025 at 11:35 pm

    For most organizations, incoming traffic filtering is the priority. While outgoing filtering is important for confidentiality in specific cases, the pervasive risk of external attacks makes incoming protection the foundation of a robust security strategy.
    (1) Confidentiality: blocks external attempts to infiltrate the network (e.g., phishing emails, malware-laden downloads) that could steal data;
    (2) Integrity: Blocks malicious code (e.g., viruses, trojans) that could modify system files or inject ransomware, preserving data integrity, and prevents unauthorized changes to internal systems from external sources.
    (3) Availability: mitigates DDoS attacks by blocking excessive or malicious incoming traffic and prevents service disruptions caused by external attackers overwhelming network resources.
    In addition, If an organization faces a high – risk of insider threats (e.g., employees leaking trade secrets), outgoing filtering could be prioritized for confidentiality.
    If only one direction can be filtered, I think incoming traffic filtering provides broader protection across all three CIA objectives. However, a layered defense (both inbound and outbound filtering) is ideal for robust security.

    Log in to Reply
  5. Jingni Li says

    June 18, 2025 at 1:42 am

    I will focus on filtering the incoming traffic from the Internet to the intranet
    Looking at the reasons from three security objectives:
    1. Confidentiality (preventing data leakage):
    Filtering incoming content can prevent external “bad things” (such as hackers and viruses) from breaking into the company’s internal systems. If bad programs from outside cannot enter, it is impossible to secretly package and send company data (such as ransomware invading first and then stealing data).
    2. Integrity (data not tampered with):
    The traffic coming from outside may have been tampered with by bad people (such as malicious files sent by fake websites). Filtering incoming can directly block these tampered things and prevent them from entering the company’s system and causing damage.
    3. Availability (system crash):
    One of the most common causes of system crashes is external “flood attacks” (such as DDoS) that specifically block company networks. Filtering incoming can directly block these attack traffic outside the door, ensuring that the company’s servers are not overwhelmed and employees can use the system to work.

    Log in to Reply
  6. Ruizhen Zhang says

    June 18, 2025 at 3:12 am

    If an organization can only filter and selectively block either incoming or outgoing network traffic, it should focus on incoming traffic.
    This is because incoming traffic from the internet poses a higher risk of introducing external threats such as malicious software, hacking attempts, and DDoS attacks, which can compromise the confidentiality, integrity, and availability of information systems. Blocking incoming traffic can prevent unauthorized access, malicious code, and other threats from infiltrating the internal network, while outgoing traffic can be further monitored and managed through other means.

    Log in to Reply
  7. Yufei Zhu says

    June 18, 2025 at 4:45 am

    If an organization can only filter incoming or outbound network traffic, I think it can choose to prioritize filtering incoming traffic.
    To protect the availability of information, that is, users can access the network or obtain network services at any time, filtering incoming traffic can effectively prevent DDoS attacks. A DDoS attack sends a large number of service requests to an organization’s servers but does not send the specific content of the requests, thereby consuming a significant amount of server resources. Filtering incoming traffic can prevent the entry of such requests and protect the availability of information.
    To protect the integrity of information, that is, to prevent it from being illegally tampered with, filtering incoming traffic can prevent the entry of some malicious software. Attackers may inject viruses or Trojans through incoming traffic, and organizations can block such traffic in this way.
    In order to protect the confidentiality of information, in fact, the outbound traffic should be blocked first, which can prevent the confidential information from being leaked. However, filtering incoming traffic can ensure availability and integrity, and its priority is slightly higher than filtering outbound traffic.

    Log in to Reply
  8. Jialin Fan says

    June 18, 2025 at 5:14 am

    I would concentrate on the incoming network traffic.
    For confidentiality, incoming traffic often contains external threats such as hackers trying to access sensitive information within the intranet. By filtering incoming traffic, we can prevent unauthorized access to confidential data, like customer information or trade-secrets.
    Regarding integrity, incoming traffic may carry data that can corrupt or modify the organization’s internal data. Filtering incoming traffic helps to ensure that only legitimate and untainted data enters the intranet.
    In terms of availability, incoming traffic can include Distributed Denial-of-Service attacks. By filtering incoming traffic, we can identify and block abnormal traffic patterns associated with DDoS attacks, ensuring that the organization’s network resources remain available for legitimate users.

    Log in to Reply
  9. Meiyan Liu says

    June 18, 2025 at 9:33 am

    When an organization can only choose to filter inbound (Internet to internal network) or outbound (Internal network to Internet) traffic, a comprehensive trade-off must be made from the aspects of confidentiality, integrity, and availability. The conclusion is to prioritize inbound traffic filtering. Inbound filtering is crucial for maintaining integrity and availability, as it can block malicious traffic such as viruses, trojans, and DDoS attacks, preventing data tampering and service disruptions, serving as the first line of defense against external attacks. Although outbound filtering is more critical for confidentiality protection, data leakage can be complemented by measures like encryption and permission management. Moreover, outbound filtering has limitations, such as being bypassed by encrypted tunnels.

    Log in to Reply
  10. Wenhao Liu says

    June 18, 2025 at 10:14 am

    If an organization can only filter and block one direction of network traffic,I would concentrate on blocking incoming traffic.
    • Confidentiality: Incoming traffic poses a higher risk of carrying malware or unauthorized attempts to access sensitive data. Blocking malicious incoming traffic helps prevent hackers from stealing confidential information like customer data or trade secrets.
    • Integrity: Incoming attacks, such as malware or phishing attempts, can corrupt or modify data on the organization’s systems. Filtering incoming traffic can stop these attempts to compromise data integrity.
    • Availability: Incoming DDoS attacks aim to make network resources unavailable. Blocking such incoming traffic helps maintain the availability of critical systems and services.
    While outbound traffic is important (e.g., to prevent data leaks), incoming traffic is more directly linked to preventing initial compromises. Blocking incoming threats first reduces the risk of internal systems being infected or taken over, which in turn protects outbound data flow.

    Log in to Reply
  11. Yiying Chen says

    June 18, 2025 at 12:55 pm

    I will choose availability. Because of the following reasons: Initially, blocking network traffic coming into its intranet from the internet can prevent external hackers go into the intranet, so that the system would not be penetrated, data is away from exfiltration and illegal edited. Furthermore, the protected and controlled data’s availability is ensured by preventing system being damaged, customers can continually use.
    When talking about the filter of network traffic going out to the internet, the function can also keep those affected data away from going out from enterprise and impact on others stakeholders. For a profit-targeted enterprise, the availability of data can be a main goal.

    Log in to Reply
  12. Zuqi Zhang says

    June 19, 2025 at 4:55 am

    If I had to pick one direction to focus on, I’d go with outbound traffic. Here’s why:
    firstly, Confidentiality—Outbound filtering helps stop sensitive info from leaking out. Think about it: if someone sneaks in, blocking outbound traffic can catch them before they send anything important outside. Incoming traffic filtering is good, but it doesn’t catch data leaks once the info is inside.
    secondly, Integrity—When you control what goes out, you can stop your systems from accidentally spreading malware or bad data. It’s like making sure nothing weird gets sent out without permission. Incoming traffic filtering doesn’t really help with that once the data is already in your network.
    and, Availability—Blocking outbound traffic can also help with DoS attacks that might start from inside your network. It keeps your legit communications going without getting disrupted. Incoming traffic filtering helps with external DoS attacks, but it doesn’t cover what’s happening inside.
    In summary, Outbound filtering is like a safety net to catch anything bad that might slip out. It protects your secrets, keeps your data clean, and helps your network run smoothly.

    Log in to Reply
  13. Xintong Zhang says

    June 19, 2025 at 9:21 am

    If an organization can only filter network traffic in one direction, it should focus on incoming traffic. In terms of confidentiality, if phishing links, malware and other threats in incoming traffic are not filtered, attackers can steal sensitive data through email attachments or malicious websites, compromising confidentiality. For integrity, exploit attacks like buffer overflows or SQL injections in incoming traffic may tamper with system files or databases, undermining integrity. Concerning availability, DDoS attacks in incoming traffic can flood systems with malicious traffic, causing service unavailability. While outbound traffic carries data leakage risks, such risks often arise after internal compromise. Incoming traffic protection serves as the first line of defense, directly blocking malicious sources and more comprehensively safeguarding the three objectives of information system security.

    Log in to Reply
  14. Jiaxuan Ma says

    June 19, 2025 at 9:30 am

    I will filter and selectively block INCOMING network traffic.

    From the perspective of Integrity, integrity refers to the prevention of unauthorized modification or destruction of data. By filtering and blocking incoming traffic, it is important to prevent external attackers from sending malicious data or commands to the intranet, thereby protecting the data integrity of the intranet.
    From the perspective of Availability, availability refers to ensuring that systems and services can operate normally when needed. By filtering and blocking incoming traffic, external attackers can be prevented from DoS or DDoS attacks, thereby protecting the availability of the intranet.
    From the perspective of Confidentiality, confidentiality refers to preventing sensitive information from being leaked to unauthorized users. By filtering and blocking incoming traffic, the organization can prevent external attackers from obtaining sensitive information of the intranet through network scanning, vulnerability exploitation and other means.

    Moreover, from an even more extreme perspective, if incoming traffic is filled with viruses or malicious programs, the entire system could be paralyzed. At that point, controlling outbound traffic will be meaningless.

    Log in to Reply
  15. Meiqi Yan says

    June 19, 2025 at 9:58 am

    I am more concerned about the confidentiality aspect of information security. In situations where resources are limited and a choice must be made, prioritizing the deployment of outbound traffic control can provide a more substantive guarantee for the confidentiality goals of the organization. The security benefits of this approach are significantly higher than those of a single-directional inbound traffic control. This choice not only meets the practical needs of offensive and defensive confrontation but also satisfies the basic requirements of regulatory compliance.

    Log in to Reply
  16. Jianwei Huang says

    June 19, 2025 at 9:59 am

    If forced to choose, focusing on filtering incoming network traffic (from the internet to the intranet) would better protect confidentiality, integrity, and availability. Here’s why: Incoming traffic carries external threats like malware, phishing attempts, and unauthorized access that directly risk all three objectives. Blocking malicious incoming data prevents hackers from stealing sensitive info (confidentiality), tampering with systems or files (integrity), or crashing networks via attacks (availability). While outbound traffic can leak data, incoming threats are more proactive and destructive—they’re the primary way attackers enter a network. Stopping threats at the entry point is like securing the front door of a house: it prevents intruders from ever causing harm, whereas controlling what goes out only addresses consequences after a breach might have already happened. This choice prioritizes preventing core security breaches over mitigating exits.

    Log in to Reply
  17. Jiwei Yang says

    June 20, 2025 at 12:57 am

    Under the three objectives of information security, if only a single direction of traffic can be filtered: in the case of confidentiality, outbound filtering is prioritized to prevent the leakage of sensitive information such as patient data and the return of malicious software data; for integrity and availability, inbound filtering is emphasized. The former intercepts attacks such as malicious attachments and forged updates, while the latter defends against threats that cause service disruptions such as DDoS. In practice, most organizations should prioritize inbound filtering because it directly protects system functionality and data accuracy.

    Log in to Reply
  18. Wenhao GUO says

    June 20, 2025 at 1:00 am

    When an organization can only filter either incoming or outbound network traffic, prioritizing incoming traffic filtering is more critical for addressing confidentiality, integrity, and availability. Firstly, for availability, incoming traffic filtering blocks DDoS attacks by preventing overwhelming service requests that consume server resources, ensuring systems remain operational. For integrity, it stops malicious software, viruses, or Trojan horses from entering the intranet via incoming packets, thus preventing unauthorized data modification or corruption. While confidentiality risks (e.g., data leakage) are associated with outbound traffic, incoming filtering indirectly safeguards confidentiality by blocking external attackers from scanning vulnerabilities or exploiting entry points to steal sensitive information. Moreover, if incoming traffic is unfiltered, malware could compromise the entire system, making outbound control irrelevant. Thus, incoming traffic filtering directly tackles the most immediate threats to system functionality and data protection, balancing the three security objectives more effectively.

    Log in to Reply
  19. Shouxi Mou says

    June 20, 2025 at 1:01 am

    Why?​​
    ​​Confidentiality​​ – Stops data leaks (e.g., malware exfiltrating files).
    ​​Integrity​​ – Prevents attackers from sending malicious commands outward.
    ​​Availability​​ – Limits botnet traffic (e.g., DDoS attacks launched from inside).
    ​​Inbound Filtering Weaknesses​​:

    Can’t prevent internal breaches (e.g., stolen credentials).
    Less critical if backups exist.
    ​​Bottom Line​​: Blocking outbound traffic protects all three security objectives better.

    Log in to Reply
  20. Yan Liu says

    June 20, 2025 at 1:49 am

    Safeguards Availability by blocking DDoS attacks that flood servers with resource-consuming requests, ensuring continuous service access.
    Preserves Integrity by intercepting malware-laden inbound traffic (e.g., viruses, Trojans), preventing unauthorized data tampering.
    While outbound filtering protects confidentiality, inbound controls address more immediate threats to operational continuity. This aligns with the principle that availability and integrity form the foundation for maintaining secure operations.

    Log in to Reply
  21. Xiaojin Liu says

    June 20, 2025 at 4:44 am

    I believe that filtering and selectively blocking outbound traffic should be prioritized because it can most directly protect confidentiality, while also restricting the communication between malware and external servers, thereby indirectly maintaining integrity and availability. The document emphasizes the high risks of data leakage and internal threats, and outbound control can effectively block such threats. In contrast, although inbound filtering can defend against external attacks, once confidentiality is compromised, the consequences are more severe and difficult to repair. Therefore, when resources are limited, outbound traffic management is a more comprehensive security strategy.

    Log in to Reply
  22. Huiling Huang says

    June 20, 2025 at 4:57 am

    I would choose confidentiality. To safeguard data confidentiality, I’d focus on blocking outbound traffic. My biggest concern is preventing the leakage of the company’s sensitive information. Whether it’s customer privacy, trade secrets, or financial data, these are all valuable assets of the company. If a computer gets infected by a virus, or if someone within the company intends to cause damage, blocking outbound traffic can stop them from sending data outside. It’s like putting a strong lock on the information exit, ensuring that all our secrets stay safely within.

    Log in to Reply
  23. Yiwen Lou says

    June 20, 2025 at 5:09 am

    When an organization has to choose between filtering inbound (Internet to internal network) or outbound (internal network to Internet) traffic, it needs to make a careful balance considering confidentiality, integrity, and availability. The conclusion is that inbound traffic filtering should take priority. Inbound filtering is key for maintaining data integrity and service availability because it blocks malicious traffic like viruses, trojans, and DDoS attacks, which prevents data tampering and service outages. Think of it as the first line of defense against external threats.
    While outbound filtering is more important for protecting confidentiality, data leakage can be addressed through other measures like encryption and permission controls. Moreover, outbound filtering has limitations—for example, it can be bypassed using encrypted tunnels, which makes it less reliable. So even though outbound filtering helps with privacy, the risks from inbound attacks are more urgent since they directly threaten the stability and security of the internal network. Prioritizing inbound filtering is like securing the front door first to keep intruders out, while using locks and alarms (encryption) to complement other security needs.

    Log in to Reply
  24. Liyuan Zhou says

    June 21, 2025 at 3:18 am

    I’d prioritize filtering incoming traffic. For confidentiality, it blocks external scanning, penetration attempts, and malicious code injection to reduce the risk of sensitive information being snooped on from the start. For integrity, it fends off external attacks that tamper with data or inject malicious content, keeping internal data unaltered. For availability, it defends against DDoS attacks and massive malicious incoming requests, preventing system paralysis and ensuring business continuity. While filtering outbound traffic helps stop active data leakage, incoming filtering first builds a “defense line against external intrusions”, safeguarding the three security objectives at a fundamental level. If the internal network is breached, we can then complement it with outbound controls. When resources are limited, securing the “entry point” is more crucial.

    Log in to Reply
  25. Rong Su says

    June 21, 2025 at 7:31 am

    For confidentiality, focus on blocking outbound traffic, as preventing internal sensitive data (such as trade secrets and user privacy) from being exfiltrated via malicious programs or misoperations is central to maintaining confidentiality—blocking outbound traffic intercepts data leakage channels. For integrity, prioritize blocking inbound traffic, since external malicious traffic (e.g., injection attacks, malicious files) may tamper with system data or implant tampering programs, and intercepting inbound traffic reduces the risk of data tampering at its source. For availability, emphasize blocking inbound traffic, as external malicious inbound traffic like DDoS attacks and port scans are primary threats causing service unavailability—filtering inbound traffic effectively mitigates resource exhaustion and service disruptions.

    Log in to Reply
  26. Xinshang Pei says

    June 21, 2025 at 12:47 pm

    Implementing robust inbound traffic controls serves as a fundamental security measure that simultaneously enhances confidentiality, integrity, and availability. By restricting external access points, organizations create a critical defensive layer that prevents unauthorized network infiltration attempts, significantly reducing opportunities for data exfiltration of sensitive business information. This filtering mechanism also functions as a vital safeguard against system compromises, as it limits potential entry vectors for malware that could otherwise corrupt databases or manipulate operational systems.
    From an availability perspective, inbound traffic regulation provides essential protection against volumetric attacks – automatically rejecting DDoS flood attempts and disrupting botnet communications before they can overwhelm network infrastructure. These combined protections establish a balanced security posture that aligns with core cybersecurity objectives while maintaining necessary operational functionality. The approach essentially transforms the network perimeter into a selective barrier that admits only verified, legitimate traffic based on predefined security policies.

    Log in to Reply
  27. Gao Yujing says

    June 21, 2025 at 1:47 pm

    Choice of Traffic Filtering Direction for CIA Objectives​​
    When forced to choose ​​only one filtering direction​​ (incoming or outbound), prioritizing ​​outbound traffic filtering​​ provides optimal protection for security objectives. Analysis based on CIA triad:

    ​​Security Objective​​ ​​Why Outbound Filtering?​​ ​​Limitations of Inbound Filtering​​
    ​​Confidentiality​​ ​​Blocks data exfiltration​​:
    • Prevents internal leaks (e.g., employees uploading databases to cloud)
    • Stops malware C2 callbacks (e.g., stolen data transmission) Inbound filtering cannot stop insider threats or malware exfiltration
    ​​Integrity​​ ​​Thwarts remote sabotage​​:
    • Intercepts ransomware key downloads
    • Blocks attacker commands to compromised systems (e.g., botnet) Inbound filtering fails to prevent post-breach destructive commands
    ​​Availability​​ ​​Reduces internal abuse​​:
    • Limits bandwidth hogging (e.g., large file uploads)
    • Prevents internal devices joining DDoS botnets Inbound filtering defends external DDoS but not internal resource abuse
    ​​Key Decision Drivers​​
    ​​Targeting Attack Kill Chains​​:
    Modern attacks (e.g., APTs) rely on ​​outbound channels​​ for data theft (Verizon DBIR: 67% of breaches use outbound connections).
    Filtering outbound traffic disrupts attack payoff (data theft + remote control).
    ​​Covering Insider Threats​​:
    Outbound filtering defends against ​​both external attackers and malicious insiders​​ (e.g., code leaks).
    Inbound filtering only stops external threats, powerless against compromised internal systems.
    ​​Cost Efficiency​​:
    Outbound rules are simpler (focus on key protocols: HTTP/SFTP/DNS), while inbound filtering battles massive scan traffic.

    Log in to Reply
  28. Yangyu Zhang says

    June 21, 2025 at 6:57 pm

    Prioritize outbound filtering because:
    1.It addresses all three security objectives proactively:
    Confidentiality: Stops data theft.
    Integrity: Neutralizes malware/ransomware C2.
    Availability: Prevents internal abuse from hijacking resources.
    2.It mitigates risks from compromised internal systems – the most persistent threat.
    3.Inbound threats can be partially offset by cloud security, endpoint controls, and MFA.

    Log in to Reply

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Questions about the Readings and Case Studies

  • 0a: Course Introduction & Webinar (1)
  • 0b: Understanding an Organization's Risk Environment (4)
  • 1a: Case Study 1 Snowfall and a stolen laptop (3)
  • 1b: Data Classification Process and Models (4)
  • 1c: Risk Evaluation (4)
  • 2a: Case Study 2 Autopsy of a Data Breach: The Target Case (4)
  • 2b: Creating a Security Aware Organization (4)
  • 2c: Physical and Environmental Security (3)
  • 3b Case Study 3 A Hospital catches the Millennium Bug (4)
  • 3c: Business Continuity and Disaster Recovery (4)
  • 4a: Team Project Instructions (1)
  • 4b: Network Security (4)
  • 4c: Cryptography Public Key Encryption and Digital Signatures (4)
  • 5a: Identity Management and Access Control (4)
  • 5b: Computer Application Security (4)

Copyright © 2026 · Course News Pro on Genesis Framework · WordPress · Log in