Confidentiality, integrity and availability are the pillars of information assurance. When combined with the concept of authentication, these tenants provide administrators with the focus needed to protect information systems from adversaries. If you were building a learning management system similar to WebTycho for Booz Allen, it would be critical to integrate these security goals when developing the collaboration tool. Privacy is the concept of making data available only to people or systems authorized to do so. access it (Pfleeger & Pfleeger, 2006, p. 256). For a learning management system, this would require that an individual's personal data such as grade information, communications, and activity logs not be made available to other users. Access control systems often allow administrators to build a level of confidentiality into an information system. More specifically, the Bell-LaPadula model is particularly well-known for ensuring data privacy. The Bell-LaPadula system was proposed by David Bell and Len LaPadula in response to concerns expressed by the United States Air Force regarding the security of its information systems (Blanton, 2010). In 1973, engineers developed the model with a specific focus on protecting data privacy (Blanton, 2010). The Bell-LaPadula security model assigns subjects and objects within an information system a label indicating their security classification (Balon & Thabet, 2004). Essentially, security labels are used to identify the minimum levels of security required to access resources. The Bell-LaPadula access control model follows two properties, the simple security property and the star property… in the middle of the card… two or all three of the above-mentioned authentication factors should be integrated. If the new system mirrored that of WebTycho, a simple username/password authentication process would be sufficient. By carefully addressing confidentiality, integrity, availability, and authentication throughout the learning management system development process, administrators can ensure a greater sense of security within the tool. Works Cited Balon, N., & Thabet, I. (2004). The Biba security model (p 1-4). The University of MichiganBlanton, M. (2010). Cyber security: multi-layered security (p 3-27). The University of Notre Dame Pfleeger, C. P., & Pfleeger, S. L. (2006). IT security. Upper Saddle River, NJ: Pearson Education, Inc. Vacca, J. R. (2009). Computer and Information Security Handbook. Burlington, MA: Morgan Kaufmann Publishers.
tags