The McCumber Cube is a model that helps analyze and assess the security aspects of information systems. This security model is depicted as a three-dimensional Rubik’s Cube-like grid. It consists of three dimensions:

McCumber cube visualization

Desired goals

  • Confidentiality: assurance that sensitive information is not intentionally or accidentally disclosed to unauthorized individuals.
  • Integrity: assurance that information is not intentionally or accidentally modified in such a way as to call into question its reliability.
  • Availability: ensuring that authorized individuals have both timely and reliable access to data and other resources when needed.

Information states

  • Storage: in an information system, such as that stored in memory or on a magnetic tape or disk.
  • Transmission: transferring data between information systems – also known as data in transit.
  • Processing: performing operations on data in order to achieve the desired objective.

Safeguards

  • Policy and practices: administrative controls, such as management directives, that provide a foundation for how information assurance is to be implemented within an organization. (examples: acceptable use policies or incident response procedures) – also referred to as operations.
  • Human factors: ensuring that the users of information systems are aware of their roles and responsibilities regarding the protection of information systems and are capable of following standards. (example: end-user training on avoiding computer virus infections or recognizing social engineering tactics) – also referred to as personnel
  • Technology: software and hardware-based solutions designed to protect information systems (examples: anti-virus, firewalls, intrusion detection systems, etc.)

The McCumber Cube is a valuable tool for organizations to evaluate their overall information security posture by considering these three critical dimensions. It provides a comprehensive perspective on security, recognizing the importance of policies and practices, human factor, and technology in maintaining a secure environment.

Real life usage examples

Assume that a security model is needed for the protection of written work (homework) assignments for this Information Security class you are taking. Assume that a written work assignment is:

  • processed (created, formatted, prepared for submission) and stored on the student’s computer,
  • transmitted (uploaded) to the Virtual Learning Environment,
  • stored there,
  • transmitted (downloaded) to the teacher’s computer,
  • processed (checked) and stored there.

Below is a table of McCumber cube usage for information security. This table can be used as a template for performing information security tasks or designing an information system. Notice, some rows are empty on purpose.

No.Intersection ofIdentification of the cellControls
1Confidentiality, Transmission, Human factorsEducational controls for the teacher and the student to protect the confidentiality of written work, in transmission, to and from Virtual Learning Environment while being transmitted from the student‘s computer or to the teacher‘s computer.Student and teacher should be trained to identify malicious websites, that try to imitate Virtual Learning Environment and not submit any sensitive data, if not necessary.
2Confidentiality, Transmission, Policy and PracticesAdministrative controls to protect the confidentiality of written work while it is in transmission from the student’s computer to the Virtual Learning Environment (upload) and from the Virtual Learning Environment to the teacher’s computer (download).Policy that students and teachers should upload/download written work only using University VPN.
3Confidentiality, Transmission, TechnologyTechnological controls to protect the confidentiality of written work while in transmission from student’s and to teacher’s computers in Virtual Learning Environment.Use of secure communication protocols like TLS 1.3.
4Confidentiality, Storage, Human factorsEducational controls for the teacher and the student to protect the confidentiality of written work in Virtual Learning Environment storage.Encouraging students and teachers to use up to date software in their devices to decrease likelihood of malicious actions.
5Confidentiality, Storage, Policy and PracticesAdministrative controls to protect the confidentiality of written work while it is in storage in Virtual Learning Environment.Using data encryption algorithms for data at rest like AES-256.
6Confidentiality, Storage, TechnologyTechnological controls to protect the confidentiality of written work while in storage in Virtual Learning Environment.Implement a strong multi-factor authentication for accessing the written work, so that only student and teacher can access this resource.
7Confidentiality, Processing, Human factorsEducational controls for the student to protect the confidentiality of written work after work creation, but before uploading to Virtual Learning Environment.Educate (train) student to sanitize written work files, so that they don‘t contain personal information (metadata).
8Confidentiality, Processing, Policy and Practices  
9Confidentiality, Processing, TechnologyTechnological controls to protect the confidentiality of downloaded written work while processing in teacher‘s computer.Implement mechanism, that checks, if downloaded work files contain any sensitive information. Automatically remove this information, if it does.
10Integrity, Transmission, Human factors  
11Integrity, Transmission, Policy and Practices  
12Integrity, Transmission, TechnologyTechnological controls to ensure integrity of written work while in transmission from student‘s computer to Virtual Learning Environment and to teacher‘s computer.Implementing strong transmitted data integrity checking using hash functions, checksums.
13Integrity, Storage, Human factorsEducational controls for the teacher and the student to protect the integrity of written work while being stored by the student or the teacher on their respective computers.Encouraging student and teacher to encrypt created/downloaded work files using archives with predetermined password.
14Integrity, Storage, Policy and Practices  
15Integrity, Storage, TechnologyTechnological controls to protect the integrity of written work while in storage on student’s and teacher’s computers and in Virtual Learning Environment.A host intrusion detection system (HIDS), which would alert the student, the teacher, or the administrator of the Virtual Learning Environment when a written work file was modified or deleted.
16Integrity, Processing, Human factors  
17Integrity, Processing, Policy and Practices  
18Integrity, Processing, Technology  
19Availability, Transmission, Human factors  
20Availability, Transmission, Policy and Practices  
21Availability, Transmission, TechnologyTechnological controls to ensure availability of written work while in transmission from student‘s computer to Virtual Learning Environment and to teacher‘s computer.Using load balancing to ensure that loads are distributed evenly and in case of failure, switch to another working node.
22Availability, Storage, Human factors  
23Availability, Storage, Policy and Practices  
24Availability, Storage, TechnologyTechnological controls to ensure availability of written work while in storage in Virtual Learning Environment.Having distributed storage system with redundancy and fail over mechanisms.
25Availability, Processing, Human factorsEducational controls for the teacher and the student to protect the availability of written work while being processed by the student or the teacher on their respective computers.Educate (train) the student and the teacher on how to restore the written work if it got corrupted while being edited by them.
26Availability, Processing, Policy and Practices  
27Availability, Processing, Technology  

Sources:

By Owner

Related Post

One thought on “McCumber Cube usage for information security in real life with examples”

Leave a Reply

Your email address will not be published. Required fields are marked *