ABSTRACT

The theoretical underpinnings of the information-centric McCumber Cube model have been explored in depth. The application of this methodology for security enforcement is now a straightforward process of defining and evaluating the elements of the model and applying it to the information security design problem at hand. The actual implementation of a structured analysis is admittedly a tedious and detail-oriented process, but without a structured methodology to follow, it becomes difficult to both justify and implement a comprehensive program. There are several aspects of a practical implementation of the model that will be discussed in this chapter.