<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: The Parkerian Hexad in Governance, Risk, Compliance</title>
    <link>https://community.isc2.org/t5/Governance-Risk-Compliance/The-Parkerian-Hexad/m-p/40316#M166</link>
    <description>&lt;P&gt;It's useful in so far as it extends the triad in ways that mightn't be immediately obvious to someone just starting out in InfoSec.&amp;nbsp; So when 'road warriors' have questioned what's this in the AUP about copying files back to the network or only storing them on one drive, you can think 'possession', if their device is lost/stolen/breaks then they haven't lost the only copy of their data.&amp;nbsp; You'd be surprised as the number of 'So how can IT get my data back?' questions these people ask.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 28 Oct 2020 16:09:46 GMT</pubDate>
    <dc:creator>Steve-Wilme</dc:creator>
    <dc:date>2020-10-28T16:09:46Z</dc:date>
    <item>
      <title>The Parkerian Hexad</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/The-Parkerian-Hexad/m-p/40272#M161</link>
      <description>&lt;P&gt;&lt;EM&gt;Hi All&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;What are peoples thoughts on the Donn Parker - The Parkerian Hexad above and beyond the traditional CIA model? &lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;&lt;A href="https://www.staffhosteurope.com/blog/2019/03/cybersecurity-and-the-parkerian-hexad" target="_blank"&gt;https://www.staffhosteurope.com/blog/2019/03/cybersecurity-and-the-parkerian-hexad&lt;/A&gt;&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Lend me your ears?&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Regards&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;EM&gt;Caute_cautim&lt;/EM&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 09 Oct 2023 09:40:16 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/The-Parkerian-Hexad/m-p/40272#M161</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2023-10-09T09:40:16Z</dc:date>
    </item>
    <item>
      <title>Re: The Parkerian Hexad</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/The-Parkerian-Hexad/m-p/40274#M162</link>
      <description>&amp;gt; Caute_cautim (Community Champion) posted a new topic in Governance, Risk, Compliance on 10-26-2020 03:21 PM in the (ISC)Â² Community :&lt;BR /&gt;&lt;BR /&gt;&amp;gt; &amp;nbsp; What are peoples thoughts on the Donn Parker - The Parkerian Hexad above and beyond the traditional CIA model?&lt;BR /&gt;&lt;BR /&gt;Anything Don writes tend to be provocative and worth thinking about. However,&lt;BR /&gt;I can't honestly say that I find it worth adding to the triad. (But then, I think that&lt;BR /&gt;integrity is just a special case of availability, and the triad is too long. It should&lt;BR /&gt;just be CA.)&lt;BR /&gt;&lt;BR /&gt;====================== (quote inserted randomly by Pegasus Mailer)&lt;BR /&gt;rslade@gmail.com rmslade@outlook.com rslade@computercrime.org&lt;BR /&gt;Morgan Philip: Remember, when you go out not to put on too much&lt;BR /&gt;makeup otherwise the boys will get the wrong idea and you know&lt;BR /&gt;how they are. They're only after one thing.&lt;BR /&gt;Giselle: What's that?&lt;BR /&gt;Morgan Philip: I don't know. Nobody will tell me. - Enchanted&lt;BR /&gt;victoria.tc.ca/techrev/rms.htm &lt;A href="http://twitter.com/rslade" target="_blank"&gt;http://twitter.com/rslade&lt;/A&gt;&lt;BR /&gt;&lt;A href="http://blogs.securiteam.com/index.php/archives/author/p1/" target="_blank"&gt;http://blogs.securiteam.com/index.php/archives/author/p1/&lt;/A&gt;&lt;BR /&gt;&lt;A href="https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413" target="_blank"&gt;https://community.isc2.org/t5/forums/recentpostspage/user-id/1324864413&lt;/A&gt;</description>
      <pubDate>Mon, 26 Oct 2020 19:38:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/The-Parkerian-Hexad/m-p/40274#M162</guid>
      <dc:creator>rslade</dc:creator>
      <dc:date>2020-10-26T19:38:52Z</dc:date>
    </item>
    <item>
      <title>Re: The Parkerian Hexad</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/The-Parkerian-Hexad/m-p/40287#M163</link>
      <description>&lt;P&gt;I find it to be duplicative and just clarifying a subset of the triad. Each of the extra 3 ideas just further explain one of the triad's main 3 points.&lt;/P&gt;&lt;P&gt;Possession or Control - Someone gets your data, OK you have a loss of confidentiality.&lt;/P&gt;&lt;P&gt;Authenticity - Is just Integrity with a fine tuning aspect turned on.&lt;/P&gt;&lt;P&gt;Utility - You encrypt your data and then lose the encryption key. Well the data isn't really available anymore then is it? The example they give in the article is a bad example. Saying that your data is still available AFTER you lose the decryption key? Being in possession of the data but not able to access it ,still means you have lost availability. Someone changes your salary data into another currency is a loss of Utility? No I think that would be that your data has lost it's integrity.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I feel the article did not make great arguments for adding these extra, CIA defining hexad elements.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 11:31:13 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/The-Parkerian-Hexad/m-p/40287#M163</guid>
      <dc:creator>CISOScott</dc:creator>
      <dc:date>2020-10-27T11:31:13Z</dc:date>
    </item>
    <item>
      <title>Re: The Parkerian Hexad</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/The-Parkerian-Hexad/m-p/40289#M164</link>
      <description>&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/809125741"&gt;@Caute_cautim&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;&lt;P&gt;&lt;EM&gt;...&lt;/EM&gt;&lt;EM&gt;What are peoples thoughts on the Donn Parker - The Parkerian Hexad above and beyond the traditional CIA model? &lt;/EM&gt;&lt;/P&gt;&lt;/BLOCKQUOTE&gt;&lt;P&gt;John,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Here is where I must differ with both Grandpa Rob &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;&amp;nbsp;and Scott &lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1602421967"&gt;@CISOScott&lt;/a&gt;&amp;nbsp;. I have for many years preferred Donn's expanded set over the basic C-I-A. I agree that it is possible to read the three added attributes as supplementing or fine tuning the basic triad, but that is only one approach, which I believe is inadequate. The three bring their own strengths to the table to round out fundamental evaluation of your security posture.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1. &lt;STRONG&gt;Possession or control&lt;/STRONG&gt;. Scott said this is just related to confidentiality. Well, not really. Particularly in this age of &lt;EM&gt;everything to the cloud&lt;/EM&gt;, who really has possession of and control over your data. Do you have legal contractual as well as technical provisions in place to ensure that the cloud service provider may not block you from our own data, either by accident or intentionally? As another example, who really owns your domain name? Did you contract with a hosting service that registered your domain name for you, and keeps the account in their name rather than yours? At renewal time will they hold you hostage for a price increase, or if you need to move to a higher-capacity provider, will they allow you to transfer the name away from their hosting servers?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2. &lt;STRONG&gt;Authenticity&lt;/STRONG&gt;. Data may pass all integrity checks of format validity and change-record and controls, but have you put in place procedures to ensure that the data came from legitimate and recognized sources? &lt;EM&gt;Integrity&lt;/EM&gt; focuses on not having existing data changed improperly. Authenticity has you considering how you got that data, from whom, and when.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;3. &lt;STRONG&gt;Utility&lt;/STRONG&gt;, also often called &lt;STRONG&gt;Usability&lt;/STRONG&gt;. This has always been high on my list as my interest, even long before I worked in to information security, has been on human factors: How easily usable is your information not only for machine-to-machine use, but also the expected human users. I really do not care whether you store telephone numbers in your database as 12 digits with no dividers (country code, area code, exchange, final number), or credit card numbers as 16 digits, but human perception absolutely guarantees that you will have extensive input and transcription errors if you insist that human users type in or read those data fields in that space-saving format. Allowing for multiple options of preferred human-friendly input and display formats is essential to supporting accurate transfer of the data when humans are in the input or transfer process.&lt;/P&gt;&lt;P&gt;Which format do you wish to see and type phone numbers?&lt;/P&gt;&lt;P&gt;013455551212&lt;/P&gt;&lt;P&gt;+01-345-555-1212&lt;/P&gt;&lt;P&gt;+01 (345) 555-1212&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;by the way, my favorite exposition of Donn's model is M. E. Kabay's presentation:&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.google.com/url?sa=t&amp;amp;rct=j&amp;amp;q=&amp;amp;esrc=s&amp;amp;source=web&amp;amp;cd=&amp;amp;ved=2ahUKEwjDzJ6m9tTsAhUCbq0KHUt2CfAQFjACegQIAxAC&amp;amp;url=http%3A%2F%2Fwww.mekabay.com%2Fcourses%2Facademic%2Fcsh6_lecture_notes%2Fcsh6_ch03_parkerian_hexad.pptx&amp;amp;usg=AOvVaw0U99U5mM39dTK4NC3Se-ys" target="_blank" rel="noopener"&gt;The Parkerian Hexad - ME Kabaywww.mekabay.com › csh6_ch03_parkerian_hexad&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Craig&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 13:58:58 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/The-Parkerian-Hexad/m-p/40289#M164</guid>
      <dc:creator>CraginS</dc:creator>
      <dc:date>2020-10-27T13:58:58Z</dc:date>
    </item>
    <item>
      <title>Re: The Parkerian Hexad</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/The-Parkerian-Hexad/m-p/40294#M165</link>
      <description>&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;The CIA Triad is usually in the first chapter of any intro to security textbook. There can't be any grey areas of, "well this may or may not fit here" because it's used to teach the basics of information security. The Triad is not a comprehensive "how to" or detailed list of all things to consider. It's a simple to use diagram that gets the point across of needing Confidentially, Integrity, and Availability for information security. It's broad for a reason.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;If you want to use it to expand security concepts, that's great but the Triad itself is perfectly succinct for beginners.&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Tue, 27 Oct 2020 15:14:31 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/The-Parkerian-Hexad/m-p/40294#M165</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-10-27T15:14:31Z</dc:date>
    </item>
    <item>
      <title>Re: The Parkerian Hexad</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/The-Parkerian-Hexad/m-p/40316#M166</link>
      <description>&lt;P&gt;It's useful in so far as it extends the triad in ways that mightn't be immediately obvious to someone just starting out in InfoSec.&amp;nbsp; So when 'road warriors' have questioned what's this in the AUP about copying files back to the network or only storing them on one drive, you can think 'possession', if their device is lost/stolen/breaks then they haven't lost the only copy of their data.&amp;nbsp; You'd be surprised as the number of 'So how can IT get my data back?' questions these people ask.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Oct 2020 16:09:46 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/The-Parkerian-Hexad/m-p/40316#M166</guid>
      <dc:creator>Steve-Wilme</dc:creator>
      <dc:date>2020-10-28T16:09:46Z</dc:date>
    </item>
    <item>
      <title>Re: The Parkerian Hexad</title>
      <link>https://community.isc2.org/t5/Governance-Risk-Compliance/The-Parkerian-Hexad/m-p/40324#M167</link>
      <description>&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;I get it and I'm all for using this to help explain concepts out or think about this in different ways. I think the biggest issue&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1602421967"&gt;@CISOScott&lt;/a&gt;&amp;nbsp; and myself have is that the added categories of possession/control, authenticity, and utility already fit into the current Triad. It's like making a detailed list of the different Integrity and Availability threats.&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="arial,helvetica,sans-serif"&gt;I believe more impact would come of making categories that don't fit. I'm even looking at Integrity a little differently because of&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1324864413"&gt;@rslade&lt;/a&gt;'s comment of it being a special case of Availability.&amp;nbsp; &amp;nbsp;&amp;nbsp;&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Oct 2020 18:58:10 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Governance-Risk-Compliance/The-Parkerian-Hexad/m-p/40324#M167</guid>
      <dc:creator>tmekelburg1</dc:creator>
      <dc:date>2020-10-28T18:58:10Z</dc:date>
    </item>
  </channel>
</rss>

