Information Security: The John McCumber Model

1132 Words3 Pages

1) McCumber model:

There are number of different models proposed as framework for information security but one of the best model is McCumber model which was designed by John McCumber. In this model the elements to be studied are organized in a cube structure, in which each axis indicates a dissimilar viewpoint of some information security issue and there are three major modules in each axis. This model with 27 little cubes all organized together looks similar like a Rubik's cube. There are three axes in the cube they are: goals desired, Information states, and measures to be taken. At the intersection of three axes you can research on all angles of an information security problem.

Goals desired the three goals expected when you are dealing with information are
a) Confidentiality- permission to access the information is only given to authorized persons.
b) Integrity- information should not be corrupted.
c) Availability- information should be ready to access whenever it is needed.

If any of the goals is not achieved then there is flaw in the system and may result in bad outcomes.

Information States the three different states of information are
a) Storage- the information is in still state and can be accessed any time.
b) Transmission- the information is in motion and is being transmitted to get accessed.
c) Processing- the state in which the data is being changed or studied.

The information should be protected at all states.

Measures to be taken the approaches required to achieve the goals desired are
a) Technology- software and hardware upgrades are considered to minimize vulnerability towards threats.
b) Policy & Practice- proven methods and techniques are used to reduce risks and threats.
c) Education& Training- educatin...

... middle of paper ...

...thorized permission to access any authorized computer in the library or computer centre to access necessary subject information. The technology is updated to latest to maintain any interruption of accessing data.
25) Availability - Education& Training- Processing:
The subject data which is being used by the faculty and enrolled students should be available any time for use and the faculty and the students are educated to access the updated subject data at any point of the time.
26) Availability -Policy-Processing:
The university should implement a policy to provide the enrolled students and faculty with necessary updated subject information at any point of time while needed.
27) Availability -Technology-Processing:
The databases of the university is maintained and updated regularly to provide the updated subject information to the registered students and faculty.

Open Document