The Cybersecurity Cube

Nadia Saraswati
IT Paragon
Published in
5 min readFeb 21, 2021

--

Fig 1. Photo by Glenn Carstens-Peters on Unsplash

Nowadays, everyone uses secured or unsecured computer networks to communicate. This condition makes the possibility of cyber-attacks happen is higher.

So, what is a cyber-attack?

Cyber-attacks is a criminal activity that either targets or uses a computer, a computer network, or a networked device. The attacks are carried out by individuals or organizations.

Some methods that cyber criminals usually use to conduct cyber-attacks are:

  • Malware: Malware is short for “malicious software”. This type of software is employed to bring damage to computing devices and stored content. Malware is a term used to refer to any malicious software such as viruses, worms, trojan horses, spyware, ransomware.
  • DDoS attacks: type of cybercrime attack that cybercriminals use to bring down a system or network. Cybercriminals who are carrying out cyberextortion may use the threat of a DDoS attack to demand money. Alternatively, a DDoS may be used as a distraction tactic while another type of cybercrime takes place.
  • Phishing: type of online scam where criminals send out fraudulent email messages that appear to come from a legitimate source. The email is designed to trick the recipient into entering confidential information (ex: account numbers, passwords, pin, birthday) into a fake website by clicking on a link. The email will include a link or attachment which once clicked, will steal sensitive information or infect a computer with malware. The cybercriminals will use this information to commit identity fraud or sell it to another criminal third party

Cyberattacks are not only increasing in frequency but also in complexity and severity as well. That’s why we need to build good management information security. In 1991, John Mc Cumbers created a comprehensive security model called McCumbers cube or the CyberSecurity Cube.

Fig 2. CyberSecurity Cube

Cybersecurity cube is a tool developed to help manage the protection of networks, domains, and the Internet. The first dimension of the Cybersecurity Cube is the three principles of information security. The second dimension identifies the three states of information or data. The third dimension of the cube identifies the expertise required to provide protection. All three dimensions representing areas that must be addressed to secure the information system.

Let's dive into each dimension!

1. First Dimension

The first dimension is what we called the Principles of Cybersecurity. This principle is also commonly referred to as the CIA Triad.

C: Confidentiality

Another term for confidentiality is privacy. Confidentiality is about preventing the unauthorized disclosure of sensitive information.

An example of a method used to ensure the security of privacy is Access Control. Controlling access use the AAA concepts of security services. The AAA stands for Authentication (verifies the identity of a user to prevent unauthorized access); Authorization (services determine which resources users can access, along with the operations that users can perform); Accounting (keeps track of what users do, including what they access, the amount of time they access resources, and any changes made)

I : Integrity

Another term for integrity is quality. Integrity is about maintaining the consistency, accuracy, and trustworthiness of information over its entire life cycle. Protecting the integrity of data is challenging, loss of data integrity can make entire data resources unreliable and unusable.

Methods used to ensure data integrity including data consistency checks, access control, hashing, data validation.

A: Availability

Assures that a system’s authorized users have timely and uninterrupted access to the information in the system and the network.

We can ensure availability by following these activities such as a plan for disasters, test backups, equipment maintenance, monitor unusual activity.

2. Second Dimension

The next dimension is the Information States or the States of Data, cybersecurity cubes focus on the problem of protecting data in three possible states. The possible state of data are:

a. Storage (Stored data)

Stored data often refers to Data at rest. Data at rest means that a type of storage device retains the data when no user or process is using it.

b. Transmission

Transmission involves sending information from one device to another. The challenges in this process are: protecting data confidentiality, protecting data integrity, protecting data availability

c. Process

Data in process refers to data during initial input, modification, compilation, or output.

3. Third Dimension

This dimension is often called cybersecurity safeguards. Three layers of cybersecurity safeguards are:

a. Technologies

Some technology that can be used to safe us from cyber-attacks are Content Filtering, Firewall Appliances, Virtual Private Network (VPN), Network Access Control (NAC), etc.

b. Education, training, and awareness.

Technologies tools are not enough to defeat cyber criminals. The user also needs to follow good practices to stay safe.

Well maybe it works, but i know it’s impossible for us to not check our email while drinking our fresh brewed coffee in the morning, right?

So, what can we do to stay away from a cyber attack?

  • You can open your emails but do not click on links in spam emails or untrusted websites.
  • Never open attachments in spam emails or sender you do not know
  • Be mindful of which website URLs you visit
  • Keep your software and Operating System updated
  • Use a strong password.
  • Do not give out personal information (unless you are completely sure the line of the email is secure)
  • Contact companies directly about a suspicious request

c. Policies and Procedures

Good policies, procedures, and guidelines are needed to enable users to stay safe in cyberspace. ISO published ISO 27000, even though it's not mandatory but most countries use ISO 27000 as a de facto framework for implementing their information security management.

To develop a secure system, one must consider not only key security goals (CIA Triad) but also how these principles relate to various states in which information resides and a full range of available security measures.

--

--