Confidentiality
Guards against a user without proper clearance accessing classified information.
Preserves authorized restrictions on information disclosure.
Protects personal privacy and proprietary information.
Confidentiality example
XX
Integrity
Guards against improper modification to or destruction of information.
Integrity Example
Prevents a user from improperly or maliciously modifying a database.
Availability
Ensures timely and reliable access to and use of information.
Availability Example
Ensures that an information system is accessible when an authorized user needs it.
Importance of Authentication
Mechanism that authorizes or allows access to computer systems and networks and the data that resides there.
Loss of or incorrect authentication services could allow unauthorized access to classified data.
Authentication Example
Common Access Card (CAC)
-provides system identification that authenticates the user
Non-Repudiation
Ensures that a party in an electronic exchange cannot deny…
Non-Repudiation Example
Digital signature
-confirms the identity of the sender of an email or the signer of a document
5 Attributes of Cybersecurity
Confidentiality
Integrity
Availability
Authentication
Non-Repudiation
2 Most Important Cybersecurity Attributes
Confidentiality
-Ensures the nation’s private information is contained.
Authentication
-One must prove who they are and why they need access before gaining access to the nation’s private information.
Importance of the 5 Attributes of Cybersecurity
Susceptible to threats and vulnerabilities.
Overlooking one attribute could create a vulnerability that leaves data susceptible to attack.
Must be aware of attributes to ensure risk is managed appropriately across all areas.
Must maintain these areas to prevent loss.
Main Points of Security Policy
DODI 8500.01 - Risk Management
DODI 8500.01 - Operational Resilience
DODI 8500.01 - Integration and Interoperability
DODI 8500.01 - Cyberspace Defense
DODI 8500.01 - Performance
DODI 8500.01 - DoD Information
-All DoD information in electronic format will be given an appropriate level of confidentiality, integrity, and availability.
DODI 8500.01 - Identity Assurance
DODI 8500.01 - Information Technology
DODI 8500.01 - Cybersecurity Workforce
DODI 8500.01 - Mission Partners