19.11.2014 Views

Towards a Baltic Sea Region Strategy in Critical ... - Helsinki.fi

Towards a Baltic Sea Region Strategy in Critical ... - Helsinki.fi

Towards a Baltic Sea Region Strategy in Critical ... - Helsinki.fi

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

CHAPTER III: INFORMATION AND COMMUNICATION TECHNOLOGY<br />

Table III—7 Threats def<strong>in</strong>ed <strong>in</strong> ITU-T X.805 framework and correspond<strong>in</strong>g security<br />

dimensions proposed to address them (a thumbs-up sign implies the threat is<br />

countered by a security dimension <strong>in</strong> the correspond<strong>in</strong>g row).<br />

SECURITY<br />

DIMENSIONS<br />

Access control<br />

Authentication<br />

Non-repudiation<br />

Data con<strong>fi</strong>dentiality<br />

Communication<br />

security<br />

Data <strong>in</strong>tegrity<br />

Availability<br />

Privacy<br />

Destruction of<br />

<strong>in</strong>fo & resources<br />

Corruption<br />

of <strong>in</strong>fo<br />

SECURITY THREATS<br />

Removal of <strong>in</strong>fo<br />

& resources<br />

Disclosure<br />

of <strong>in</strong>fo<br />

Interruption<br />

of services<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

<br />

FigureIII—17 N<strong>in</strong>e unique perspectives or modules of the ITU-T X.805 security architecture.<br />

NORDREGIO REPORT 2007:5 113

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!