Unit 8 Security
Unit 8 Security
NDAYAMBAJE Simeon
6/25/2021 2
What is Security?
2. DAD Triad -
Goals for
defeating the
security of an
organization.
CIA Triad
1. Confidentiality – Confidential information
should not be accessible to unauthorized
users.
2. Integrity – Data may only be modified
through an authorized mechanism.
3. Availability – Authorized users should be
able to access data for legitimate purposes
as necessary.
DAD Triad
1. Disclosure – Unauthorized individuals gain
access to confidential information.
2. Alteration – Data is modified through
some unauthorized mechanism.
3. Denial – Authorized users cannot gain
access to a system for legitimate
purposes.
6 dimensions of System security
• 1.Integrity: prevention against unauthorized data
modification
• 2.Nonrepudiation: prevention against any one party from
reneging on an agreement after the fact
• 3.Authenticity: authentication of data source
• 4.Confidentiality: protection against unauthorized data
disclosure
• 5.Privacy: provision of data control and disclosure
• 6.Availability: prevention against data delays or removal
Threats
What is Threats?: is anyone (foreign or
domestic, internal or external, Terrorists, insiders,
employees, hackers state-sponsored or a single
element) with the capability, technology,
opportunity, and intent to do harm or
interrupt the system functionality.
Hardware threat
4. Maintenance
• this threats includes lack of spare parts, poor cabling, incorrect or
no labeling on components.