Security Concepts

Apart from the CIA triad, there are several other important security concepts that play a critical role in information systems security.

Among these, authenticity and non-repudiation are essential for ensuring trust and accountability in digital communications and transactions.


Authenticity

Authenticity refers to the assurance that a message, transaction, or any exchange of information originates from a trustworthy and verified source. It ensures that the entity involved is genuinely who or what it claims to be.

Authenticity is closely related to identity verification. It requires proof of identity, which is typically achieved through authentication mechanisms.

Key points about authenticity:

  • Ensures the source of information is genuine
  • Requires verification of identity
  • Achieved through authentication processes
  • Critical for establishing trust in communication

Authentication methods that support authenticity will be discussed further in later domains.


Non-Repudiation

Non-repudiation is the assurance that an individual or entity cannot deny the validity of an action or transaction. It is a legal and technical concept widely used in information security.

This concept ensures that once an action is performed or a message is sent, the responsible party cannot later deny their involvement.

Key aspects of non-repudiation:

  • Provides proof of the origin of data
  • Ensures the integrity of data
  • Prevents denial of actions or communications
  • Supports accountability in systems

Role of Cryptography

Cryptography plays a major role in enabling non-repudiation. One of the primary mechanisms used is the digital signature.

Digital signatures provide:

  • Evidence of the sender’s identity
  • Assurance that the message has not been altered
  • Proof that the transaction occurred

As a result, neither the sender nor the receiver can later deny the authenticity or integrity of the data involved in the communication.


Due Care and Due Diligence

Due care and due diligence are fundamental concepts in information security. They are closely related but serve different purposes. Together, they ensure that organizations both take the right actions and understand the risks behind those actions.


Due Care

Due care refers to the actions taken by a reasonable and prudent individual or organization to prevent security breaches and reduce potential damage. It is often described as doing the right thing under given circumstances.

This concept is based on the prudent man rule, which requires individuals, especially senior management, to act in good faith, in the best interest of the organization, and with the level of care that a reasonable person would exercise in a similar situation.

Due care ensures that proper controls and countermeasures are in place to protect systems and data.

Examples of Due Care

  • Deploying firewalls to protect organizational assets
  • Providing security awareness training for employees
  • Developing and enforcing security policies
  • Applying patches and updates to systems

Failure to exercise due care is often considered gross negligence and may be legally actionable in many countries.


Due Diligence

Due diligence refers to the process of identifying, understanding, and evaluating risks that an organization faces. It involves continuous monitoring and investigation of potential threats in the business, technical, and social environment.

Due diligence focuses on knowing the risks before acting.

Examples of Due Diligence

  • Performing audits to verify compliance
  • Conducting background checks during hiring
  • Performing credit checks on business partners
  • Conducting penetration testing
  • Testing backup and contingency plans regularly
  • Performing risk assessments

Relationship Between Due Care and Due Diligence

Due diligence and due care are interconnected concepts. Typically, due diligence activities are performed first to gather information and assess risks. Based on this understanding, due care actions are then implemented to mitigate those risks.

  • Due diligence is about investigation and understanding
  • Due care is about action and implementation

Together, they form a complete approach to managing security risks effectively.