Chapter 5 – |
Toward a New Framework for Information Security |
Donn Parker
Chapter Contents:
|
5.1 |
|
Proposal for a New Information Security Framework
|
|
5.1.1 |
|
Six Essential Foundation Elements
|
|
5.1.1.1 |
|
Loss scenario 1: Availability
|
|
5.1.1.2 |
|
Loss scenario 2: Utility
|
|
5.1.1.3 |
|
Loss scenario 3: Integrity
|
|
5.1.1.4 |
|
Loss scenario 4: Authenticity
|
|
5.1.1.5 |
|
Loss scenario 5: Confidentiality
|
|
5.1.1.6 |
|
Loss scenario 6: Possession
|
|
5.1.1.7 |
|
Conclusions about the six elements
|
|
5.1.1.8 |
|
What the dictionaries say about the words we use
|
|
5.1.2 |
|
Comprehensive List of Information Losses
|
|
5.1.2.1 |
|
Complete list of potential information losses
|
|
5.1.2.2 |
|
Examples of loss and suggested controls
|
|
5.1.2.3 |
|
Physical Information and Systems Losses
|
|
5.1.2.4 |
|
Challenge of Complete Lists
|
|
5.1.3 |
|
Functions of Information Security
|
|
5.1.4 |
|
Selecting Safeguards Using a Standard of Due Care
|
|
5.1.5 |
|
Threats, Assets, Vulnerabilities Model
|
|
5.2 |
|
Clark-Wilson Integrity Model: A Framework for Business Applications Security
|
|
5.2.1 |
|
Clark-Wilson Integrity Model Mechanisms and Principles
|
|
5.2.1.1 |
|
Mechanisms
|
|
5.2.1.2 |
|
Principles
|
|
5.2.1.3 |
|
Additional Principles
|
|
5.2.2 |
|
Major Elements of the Clark-Wilson Integrity Model
|
|
5.2.3 |
|
Certification Rules
|
|
5.2.4 |
|
Model in Use
|
|
5.3 |
|
Conclusions
|
|
5.4 |
|
Notes
|
|
|
|