Topic > Information Security: The John McCumber Model - 1132

1) McCumber Model: There are many different models proposed as a framework for information security, but one of the best models is the McCumber Model designed by John McCumber. In this model, the elements to be studied are organized in a cubic structure, in which each axis indicates a dissimilar point of view of some information security problems, and there are three main modules in each axis. This model with 27 cubes all organized together resembles a Rubik's cube. There are three axes in the cube: desired objectives, information states and measures to be taken. At the intersection of three axes, all aspects of an information security problem can be researched. Desired Objectives (the three expected objectives when dealing with the information area) Confidentiality: Permission to access information is granted only to authorized persons. b) Integrity: Information should not be corrupted.c) Availability: Information should be accessible whenever it is needed. If any of the objectives are not achieved, there is a flaw in the system and it could lead to unfavorable outcomes. Information indicates the three different states of information area) Storage: The information is stationary and can be accessed at any time.b) Transmission: The information is moving and is being transmitted to be accessed.c) Processing: The state in which data is modified or studied. Information should be protected in all states. Measures to be taken to achieve the desired objectives (desired area) Technology: Software and hardware updates are considered to minimize vulnerability to threats. b) Policy and practice: proven methods and techniques are used to reduce risks and threats.c) Education and training - educan...... middle of paper ......permission authorized to access any authorized computer in the library or center IT to access the necessary information on the topic. The technology is updated to the latest to maintain any interruption in data access.25) Availability - Education and Training - Processing: Subject data used by faculty and enrolled students should be available at all times for use and faculty and students are instructed to access updated subject data at any time.26) Availability - Policy Making: The university should implement a policy to provide enrolled students and faculty with the necessary updated subject information at any time, if necessary.27) Availability -Technology-Processing: University databases are maintained and updated regularly to provide up-to-date information on the subject to registered students and faculty.