Professional Documents
Culture Documents
Confidentiality Vs Possession/Control
Confidentiality Vs Possession/Control
Confidentiality Vs Possession/Control
The Parkerian Hexad is a set of components added to the CIA Triad to make it more comprehensive and
complete. It is aimed to change how information security is understood and implemented, especially
when the elements are grouped together. In relation to the triad, the elements of the Hexad are
confidentiality and possession, Integrity and authenticity and availability and utility.
Confidentiality-it refers to data being made available to only the authorised individuals.
Possession/Control-having control or ownership of the information.
Integrity-being correct or consistent with the intended state of information.
Authenticity-correct description of information (genuine).
Availability-accessibility of a system resource whenever it is needed.
Utility-state of being useful, profitable or beneficial.
According to Parker, the CIA model is simply too simple a concept to secure today’s complex networks
and it may leave environments vulnerable to threats they are not prepared to handle. Parker aimed to
expand the view of security and include people
Confidentiality vs Possession/Control
Integrity vs Authenticity
A breach of data integrity is any modification of data whether deliberate or accidental. This relies a lot
on technology and not enough on the human element. The CIA model overlooks the breach of
authenticity: if a criminal forges an email header makingit look like an innocent man sending threats.
The email is incorrectly attributed to someone else hence breach of authenticity.
Availability and Utility
Implementing failovers and clusters are great ways for ensuring availability. Protecting against hardware
failures and DOS attacks is very important in maintaining network functionality. Utility focuses on
content of data. The complexity of data has made the utility of data even more important. The CIA
model fails to acknowledge ad overlooks the idea of data utility.
Online capabilities have vastly expanded. People are now able to do anything from file taxes to looking
up their medical history. These new capabilities require a new way of thinking when it comes to security.
These are the reasons that the Parkerian Hexad model is a more complete model because it factors in
the human influence aspects.
Paul Marks: https://www.staffhosteurope.com/blog/2019/03/cybersecurity-and-the-parkerian-hexad