Confidentiality Vs Possession/Control

You might also like

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

1(b).

For a very long time it was thought that if a security


design meets all of the components of the CIA triad, the data
is relatively secure. With reference to the CIA triad and the
Parkerian Hexad models, explain in detail why Parker deemed
it necessary to create a new security model?
The CIA Triad is a fundamental security model consisting of Confidentiality, Integrity and Availability. The
three pillars of the triad no longer address the basic requirement of the expanding responsibility of
information assurance. Data is more valuable and more complex than ever. Technology seems to have
surpassed the CIA Triad, hence why Parker deemed it necessary to create a new security model. The CIA
model is too limited as some elements are not covered properly. It seems to be very technology driven
and does not focus enough on the human element of information security. Humans are the biggest
threat to security of data today.

The Parkerian Hexad is a set of components added to the CIA Triad to make it more comprehensive and
complete. It is aimed to change how information security is understood and implemented, especially
when the elements are grouped together. In relation to the triad, the elements of the Hexad are
confidentiality and possession, Integrity and authenticity and availability and utility.

 Confidentiality-it refers to data being made available to only the authorised individuals.
 Possession/Control-having control or ownership of the information.
 Integrity-being correct or consistent with the intended state of information.
 Authenticity-correct description of information (genuine).
 Availability-accessibility of a system resource whenever it is needed.
 Utility-state of being useful, profitable or beneficial.

According to Parker, the CIA model is simply too simple a concept to secure today’s complex networks
and it may leave environments vulnerable to threats they are not prepared to handle. Parker aimed to
expand the view of security and include people

Confidentiality vs Possession/Control

Every breach of confidentiality is a breach of possession/control. Adversely, every breach of


possession/control is not a breach of confidentiality. Information security has to take into consideration
the human element when it comes to breaches. Security professionals can ensure data is confidential,
but they must also make sure that those with access to data handle it appropriately.

Integrity vs Authenticity

A breach of data integrity is any modification of data whether deliberate or accidental. This relies a lot
on technology and not enough on the human element. The CIA model overlooks the breach of
authenticity: if a criminal forges an email header makingit look like an innocent man sending threats.
The email is incorrectly attributed to someone else hence breach of authenticity.
Availability and Utility

Implementing failovers and clusters are great ways for ensuring availability. Protecting against hardware
failures and DOS attacks is very important in maintaining network functionality. Utility focuses on
content of data. The complexity of data has made the utility of data even more important. The CIA
model fails to acknowledge ad overlooks the idea of data utility.

Online capabilities have vastly expanded. People are now able to do anything from file taxes to looking
up their medical history. These new capabilities require a new way of thinking when it comes to security.
These are the reasons that the Parkerian Hexad model is a more complete model because it factors in
the human influence aspects.
Paul Marks: https://www.staffhosteurope.com/blog/2019/03/cybersecurity-and-the-parkerian-hexad

Bharat Prasai: https://medium.com/@bharat.skyinfotech/parkerian-hexad-alternate-perspectives-


of-properties-of-information-security-3d60fc93725d
THE PARKERIAN HEXAD By Georgie Pender-Bey :
http://cs.lewisu.edu/mathcs/msisprojects/papers/georgiependerbey.pdf
Josh More, in Assessing Vendors, 2013: https://www.sciencedirect.com/topics/computer-
science/parkerian-hexad

You might also like