Page 66 - (ISC)² CISSP Certified Information Systems Security Professional Official Study Guide
P. 66

personally identifiable or that might cause harm, embarrassment, or
               disgrace to someone if revealed.

               Seclusion Seclusion involves storing something in an out-of-the-way

               location. This location can also provide strict access controls.
               Seclusion can help enforcement of confidentiality protections.

               Isolation Isolation is the act of keeping something separated from
               others. Isolation can be used to prevent commingling of information
               or disclosure of information.

               Each organization needs to evaluate the nuances of confidentiality

               they wish to enforce. Tools and technology that implements one form
               of confidentiality might not support or allow other forms.


               Integrity

               The second principle of the CIA Triad is integrity. Integrity is the
               concept of protecting the reliability and correctness of data. Integrity

               protection prevents unauthorized alterations of data. It ensures that
               data remains correct, unaltered, and preserved. Properly implemented
               integrity protection provides a means for authorized changes while
               protecting against intended and malicious unauthorized activities
               (such as viruses and intrusions) as well as mistakes made by
               authorized users (such as mistakes or oversights).

               For integrity to be maintained, objects must retain their veracity and

               be intentionally modified by only authorized subjects. If a security
               mechanism offers integrity, it offers a high level of assurance that the
               data, objects, and resources are unaltered from their original protected
               state. Alterations should not occur while the object is in storage, in
               transit, or in process. Thus, maintaining integrity means the object
               itself is not altered and the operating system and programming
               entities that manage and manipulate the object are not compromised.


               Integrity can be examined from three perspectives:

                    Preventing unauthorized subjects from making modifications

                    Preventing authorized subjects from making unauthorized
                    modifications, such as mistakes
   61   62   63   64   65   66   67   68   69   70   71