blog




  • Essay / Information Security: The John McCumber Model - 1132

    1) McCumber Model: There are a number of different models proposed as a framework for information security, but one of the best models is the McCumber model which was designed by John McCumber. In this model, the elements to be studied are organized in a cubic structure, in which each axis indicates a different point of view on an information security problem and there are three main modules in each axis. This model with 27 small cubes all organized looks like a Rubik's cube. There are three axes in the cube: desired objectives, information states and actions to be taken. At the intersection of three axes, you can research all angles of an information security problem. Desired Goals (the three expected goals when dealing with the information domain) Confidentiality – permission to access information is only granted to authorized individuals. b) Integrity – information should not be corrupted.c) Availability – information should be ready to be accessed whenever required. If any of the objectives are not achieved, there is a fault in the system and may result in poor results. information area) Storage – information is in a stationary state and can be accessed at any time.b) Transmission – information is in motion and is transmitted to access it.c) Processing – the state in which data is changed or studied.Information must be protected in all states.Steps to achieve the desired objectives (domain))Technology: Software and hardware upgrades are considered to minimize vulnerability to threats.b)Methods and proven techniques in policy and practice are used to reduce risks and threats.c) Education and training - education...... middle of paper ...... authorized permission to access any authorized computer in the library or computer center to access the necessary information on the subject. Technology is updated at the latest to maintain any interruption in access to data.25) Availability - Education and Training - Processing: Subject data that is used by faculty and registered students must be available to all time to be used and the faculty and students are trained to access the updated data on the subject at any time. 26) Availability - Processing Policy: The university shall implement a policy to provide students and faculty registered the necessary updated information on the subject at any time when necessary.27) Availability - Technology-Processing: The databases of the university are maintained and updated regularly to provide updated information on the subject to the registered students and teachers..