INFORMATION ASSURANCE AND SECURITY

INFORMATION ASSURANCE AND SECURITY

FA2DF9BE-F7FD-4293-988F-D851C14B90CB.jpeg

What is Information Assurance and Security?

Information Assurance and Security is the management and protection of knowledge, information and data. It combines two fields: Information Assurance and Information Security.

Information Assurance
Focuses on ensuring the availability, integrity, authentication, confidentiality and non-repudiation og informations and systems.

C2D4ABE8-4F6C-4EC2-8A6B-33C72884ABF0.png

Information Security
Centers on the protection of information and information systems for unauthorized access, use, disclosure, disruption, modification, or destruction - in order to provide confidentiality, integrity and availability.

01A8739E-3A4E-434E-A5C3-B1D445B4E9B0.png

What are the components of Information Assurance and Security?

Information Assurance and Security has a five (5) components or pillars, these pillars make up a specific information assurance strategy that ensures the highest level of success for organization that applies it to their daily operations.

EA10D0AF-AD55-4462-A0FB-7F8AB7F39988.png

These pillars represents the components of Information Assurance and Security which are:

  • Availability. Only the users can access the data stored in their networks.
  • Integrity.To set up safeguards that determined threats.
  • Authentication. Verify a user's identity before allowing them to access data.
  • Confidentiality. Protecting private information from disclosure to any unauthorized users systems.
  • Non-repudiation. To confirm the individual responsible for processing certain data.

It is important to implement these five (5) pillars of information assurance and security because they monitor the networks to keep tracks of any possible security breaches, and they investigate any that they find.

Governance and Risk Management

Governance. The overall system of rules, practices, and standards that guide a business.

FC920358-5BE6-40B9-80B5-E662F869A912.jpeg

Risk Management. The process of identifying potential hazards to the business and acting to reduce or eliminate their financial impact.

C960AB63-03EB-4A7B-844A-425ED6B9F132.jpeg

Security Architecture and Security Design

Security Architecture. A set of security principles, methods and models designed to align to your objectives and help keep your organization safe from cyber threats.

556E34CC-1312-430C-AAA3-81893681FD31.png

Security Design. Refers to the techniques and methods that position those hardware and software elements to facilitate security.

E1542A0C-1A6A-44AD-94BA-F639CB8E7A22.jpeg

Business Continuity and Disaster Recovery

The Business Continuity and Disaster Recovery is a set of processes and techniques used to help an organization to recover from a disaster and continue the routine business operation.

144CDAE9-9A78-4337-AF90-B914C6F75806.jpeg

What are their differences?

C51113B9-FCBA-4348-BCEB-D332788E8EC6.jpeg

Therefore, the key differences is when the plan takes effect.

What is Physical Security Control?
Physical Security Control is the implementation of security measures in a defined structure used to prevent unauthorized access to sensitive materials. (E.g. Surveillance camera, motion or thermal alarms, security guards.)

16170495-8D61-460C-8EFE-C0F83F354329.png

What is Operations Security?

Operations Security is a systematic process for is meant to access the importance of information assets and to determine the best way to protect it.

F02AA10C-BE3E-416F-ABE4-445763F3448C.jpeg

What is Law?

753527CB-0F8B-407F-B14E-E22D904E9924.jpeg

We all know that law is a rule made by government that states hoe people may and may not behave in society and in business.

What is Investigation?

AF0504FA-2BDC-492D-8556-1B5BF5E64A78.jpeg

What is Ethics?

Ethics is the rational reflection on what is right, what is wrong, what is just, what is unjust, what is good, what is bad in terms of human behavior.

4A12358F-2812-4018-AE0F-1C1BFF222098.png

I hope you've learned something. Thank you for your time reading this.

H2
H3
H4
3 columns
2 columns
1 column
Join the conversation now
Ecency