Information assurance

Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information. Information assurance includes protection of the integrity, availability, authenticity, non-repudiation and confidentiality of user data.[1] IA encompasses both digital protections and physical techniques. These methods apply to data in transit, both physical and electronic forms, as well as data at rest. IA is best thought of as a superset of information security (i.e. umbrella term), and as the business outcome of information risk management.

Overview

The McCumber Cube: one of the common information assurance schematics

Information assurance (IA) is the process of processing, storing, and transmitting the right information to the right people at the right time.[1] IA relates to the business level and strategic risk management of information and related systems, rather than the creation and application of security controls. IA is used to benefit business through the use of information risk management, trust management, resilience, appropriate architecture, system safety, and security, which increases the utility of information to only their authorized users.

Besides defending against malicious hackers and code (e.g., viruses), IA practitioners consider corporate governance issues such as privacy, regulatory and standards compliance, auditing, business continuity, and disaster recovery as they relate to information systems. Further, IA is an interdisciplinary field requiring expertise in business, accounting, user experience, fraud examination, forensic science, management science, systems engineering, security engineering, and criminology, in addition to computer science.

Evolution

With the growth of telecommunication networks also comes the dependency on networks, which makes communities increasing vulnerable to cyber attacks that could interrupt, degrade or destroy vital services.[2] Starting from the 1950s the role and use of information assurance has grown and evolved. These feedback loop practices were employed while developing WWMCCS military decision support systems.

OODA Feedback Loop Diagram

In the beginning information assurance involved just the backing up of data.[3] However once the volume of information increased, the act of information assurance began to become automated, reducing the use of operator intervention, allowing for the creation of instant backups.[3] The last main development of information assurance is implementing distributed systems for the processing and storage of data through techniques like SANs and NAS plus using cloud computing.[4][5][3]

These three main developments of information assurance parallel the three generations of information technologies, the first used to prevent intrusions, the 2nd to detect intrusion and the 3rd for survivability.[6][7] Information assurance is a collaborative effort of all sectors of life to allow a free and equal exchange of ideas.[citation needed]

Pillars

Information assurance is built between five pillars: availability, integrity, authentication, confidentiality and nonrepudiation.[8] These pillars are taken into account to protect systems while still allowing them to efficiently provide services; However, these pillars do not act independently from one another, rather they interfere with the goal of the other pillars.[8] These pillars of information assurance have slowly changed to become referred to as the pillars of Cyber Security. As an administrator it is important to emphasize the pillars that you want in order to achieve your desired result for their information system, balancing the aspects of service, and privacy.

Authentication

Authentication refers to the verification of the validity of a transmission, originator, or process within an information system.[9] Authentication provides the recipient confidence in the data senders validity as well as the validity of their message.[8] There exists many ways to bolster authentication, mainly breaking down into three main ways, personally identifiable information such as a person's name, address telephone number, access to a key token, or known information, like passwords.[10]

Integrity

Integrity refers to the protection of information from unauthorized alteration.[3] The goal of information integrity is to ensure data is accurate throughout its entire lifespan.[11][12] User authentication is a critical enabler for information integrity.[8] Information integrity is a function of the number of degrees-of-trust existing between the ends of an information exchange .[12] One way information integrity risk is mitigated is through the use of redundant chip and software designs.[13] A failure of authentication could pose a risk to information integrity as it would allow an unauthorized party to alter content. For example, if a hospital has inadequate password policies, an unauthorized user could gain access to an information systems governing the delivery of medication to patients and risk altering the treatment course to the detriment of a particular patient.[12]

Availability

The pillar of availability refers to the preservation of data to be retrieved or modified from authorized individuals. Higher availability is preserved through an increase in storage system or channel reliability.[8] Breaches in information availability can result from power outages, hardware failures, DDOS, etc. The goal of high availability is to preserve access to information. Availability of information can be bolstered by the use of backup power, spare data channels, off site capabilities and continuous signal.[12]

Confidentiality

Confidentiality is in essence the opposite of Integrity. Confidentiality is a security measure which protects against who is able to access the data, which is done by shielding who has access to the information.[8] This is different from Integrity as integrity is shielding who can change the information. Confidentiality is often ensured with the use of cryptography and steganography of data.[3] Confidentiality can be seen within the classification and information superiority with international operations such as NATO[14] Information assurance confidentiality in the United States need to follow HIPAA and healthcare provider security policy information labeling and need-to-know regulations to ensure nondisclosure of information.[12]

Non-repudiation

Nonrepudiation is the integrity of the data to be true to its origin, which prevents possible denial that an action occurred.[3][1] Increasing non-repudiation makes it more difficult to deny that the information comes from a certain source. In other words, it making it so that you can not dispute the source/ authenticity of data. Non-repudiation involves the reduction to data integrity while that data is in transit, usually through the use of a man-in-the-middle attack or phishing.[15]

Interactions of Pillars

As stated earlier the pillars do not interact independently of one another, with some pillars impeding on the functioning of other pillars or in the opposite case where they boost other pillars.[8] For example, the increasing the availability of information works directly against the goals of three other pillars: integrity, authentication and confidentiality.[8]

Process

The information assurance process typically begins with the enumeration and classification of the information assets to be protected. Next, the IA practitioner will perform a risk assessment for those assets.[16] Vulnerabilities in the information assets are determined in order to enumerate the threats capable of exploiting the assets. The assessment then considers both the probability and impact of a threat exploiting a vulnerability in an asset, with impact usually measured in terms of cost to the asset's stakeholders.[17] The sum of the products of the threats' impact and the probability of their occurring is the total risk to the information asset.

With the risk assessment complete, the IA practitioner then develops a risk management plan. This plan proposes countermeasures that involve mitigating, eliminating, accepting, or transferring the risks, and considers prevention, detection, and response to threats.

A framework published by a standards organization, such as NIST RMF, Risk IT, CobiT, PCI DSS or ISO/IEC 27002, may guide development. Countermeasures may include technical tools such as firewalls and anti-virus software, policies and procedures requiring such controls as regular backups and configuration hardening, employee training in security awareness, or organizing personnel into dedicated computer emergency response team (CERT) or computer security incident response team (CSIRT). The cost and benefit of each countermeasure is carefully considered. Thus, the IA practitioner does not seek to eliminate all risks; but, to manage them in the most cost-effective way.[18]

After the risk management plan is implemented, it is tested and evaluated, often by means of formal audits.[16] The IA process is an iterative one, in that the risk assessment and risk management plan are meant to be periodically revised and improved based on data gathered about their completeness and effectiveness.[2]

There are two meta-techniques with information assurance: audit and risk assessment.[16]

Business Risk Management

Business Risk Management breaks down into three main processes Risk Assessment, Risk Mitigation and Evaluation and assessment.[citation needed] Information Assurance is one of the methodologies which organizations use to implement business risk management. Through the use of information assurance policies like the "BRICK" frame work.[1] Additionally, Business Risk Management also occurs to comply with federal and international laws regarding the release and security of information such as HIPAA.[19]

Information assurance can be aligned with corporates strategies through training and awareness, senior management involvement and support, and intra-organizational communication allowing for greater internal control and business risk management.[20]

Many security executives in are firms are moving to a reliance on information assurance to protect intellectual property, protect against potential data leakage, and protect users against themselves.[17] While the use of information assurance is good ensuring certain pillars like, confidentiality, non-repudiation, etc. because of their conflicting nature an increase in security often comes at the expense of speed.[8][17] Using information assurance in the business model improves reliable management decision-making, customer trust, business continuity and good governance in both public and private sectors.[21]

Standards organizations and standards

There are a number of international and national bodies that issue standards on information assurance practices, policies, and procedures. In the UK, these include the Information Assurance Advisory Council and the Information Assurance Collaboration Group.[4]

See also

References

Notes
  1. ^ a b c d Sosin, Artur (2018-04-01). "HOW TO INCREASE THE INFORMATION ASSURANCE IN THE INFORMATION AGE". Journal of Defense Resources Management. 9 (1): 45–57. ISSN 2068-9403.
  2. ^ a b McConnell, M. (April 2002). "Information assurance in the twenty-first century". Computer. 35 (4): supl16–supl19. doi:10.1109/MC.2002.1012425. ISSN 0018-9162.
  3. ^ a b c d e f Cummings, R. (December 2002). "The evolution of information assurance". Computer. 35 (12): 65–72. doi:10.1109/MC.2002.1106181. ISSN 0018-9162.
  4. ^ a b Pringle, Nick; Burgess, Mikhaila (May 2014). "Information assurance in a distributed forensic cluster". Digital Investigation. 11: S36–S44. doi:10.1016/j.diin.2014.03.005.
  5. ^ Chakraborty, Rajarshi; Ramireddy, Srilakshmi; Raghu, T.S.; Rao, H.Raghav (July 2010). "The Information Assurance Practices of Cloud Computing Vendors". IT Professional. 12 (4): 29–37. doi:10.1109/mitp.2010.44. ISSN 1520-9202. S2CID 8059538.
  6. ^ Luenam, P.; Peng Liu (2003). "The design of an adaptive intrusion tolerant database system". Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems]. IEEE. pp. 14–21. doi:10.1109/fits.2003.1264925. ISBN 0-7695-2057-X. S2CID 14058057.
  7. ^ Liu, Peng; Zang, Wanyu (2003). "Incentive-based modeling and inference of attacker intent, objectives, and strategies". Proceedings of the 10th ACM conference on Computer and communications security. New York, New York, USA: ACM Press. p. 179. doi:10.1145/948109.948135. ISBN 1-58113-738-9. S2CID 3897784.
  8. ^ a b c d e f g h i Wilson, Kelce S. (July 2013). "Conflicts Among the Pillars of Information Assurance". IT Professional. 15 (4): 44–49. doi:10.1109/mitp.2012.24. ISSN 1520-9202. S2CID 27170966.
  9. ^ Sadiku, Matthew; Alam, Shumon; Musa, Sarhan (2017). "Information Assurance Benefits and Challenges: An Introduction". procon.bg. Retrieved 2020-11-28.
  10. ^ San Nicolas-Rocca, Tonia; Burkhard, Richard J (2019-06-17). "Information Security in Libraries". Information Technology and Libraries. 38 (2): 58–71. doi:10.6017/ital.v38i2.10973. ISSN 2163-5226.
  11. ^ Boritz, J. Efrim (December 2005). "IS practitioners' views on core concepts of information integrity". International Journal of Accounting Information Systems. 6 (4): 260–279. doi:10.1016/j.accinf.2005.07.001.
  12. ^ a b c d e Schou, C.D.; Frost, J.; Maconachy, W.V. (January 2004). "Information assurance in biomedical informatics systems". IEEE Engineering in Medicine and Biology Magazine. 23 (1): 110–118. doi:10.1109/MEMB.2004.1297181. ISSN 0739-5175. PMID 15154266. S2CID 7746947.
  13. ^ Yan, Aibin; Hu, Yuanjie; Cui, Jie; Chen, Zhili; Huang, Zhengfeng; Ni, Tianming; Girard, Patrick; Wen, Xiaoqing (2020-06-01). "Information Assurance Through Redundant Design: A Novel TNU Error-Resilient Latch for Harsh Radiation Environment". IEEE Transactions on Computers. 69 (6): 789–799. doi:10.1109/tc.2020.2966200. ISSN 0018-9340. S2CID 214408357.
  14. ^ Hanna, Michael; Granzow, David; Bolte, Bjorn; Alvarado, Andrew (2017). "NATO Intelligence and Information Sharing: Improving NATO Strategy for Stabilization and Reconstruction Operations". Connections: The Quarterly Journal. 16 (4): 5–34. doi:10.11610/connections.16.4.01. ISSN 1812-1098.
  15. ^ Chen, Chin-Ling; Chiang, Mao-Lun; Hsieh, Hui-Ching; Liu, Ching-Cheng; Deng, Yong-Yuan (2020-05-08). "A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing". Wireless Personal Communications. 113 (1): 575–598. doi:10.1007/s11277-020-07240-2. ISSN 0929-6212. S2CID 218934756.
  16. ^ a b c Such, Jose M.; Gouglidis, Antonios; Knowles, William; Misra, Gaurav; Rashid, Awais (July 2016). "Information assurance techniques: Perceived cost effectiveness". Computers & Security. 60: 117–133. doi:10.1016/j.cose.2016.03.009.
  17. ^ a b c Johnson, M. E.; Goetz, E.; Pfleeger, S. L. (May 2009). "Security through Information Risk Management". IEEE Security Privacy. 7 (3): 45–52. doi:10.1109/MSP.2009.77. ISSN 1558-4046. S2CID 30062820.
  18. ^ Singh, R.; Salam, A.F. (May 2006). "Semantic information assurance for secure distributed knowledge management: a business process perspective". IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans. 36 (3): 472–486. doi:10.1109/TSMCA.2006.871792. ISSN 1083-4427. S2CID 10191333.
  19. ^ Park, Insu; Sharman, Raj; Rao, H. Raghav (2015-02-02). "Disaster Experience and Hospital Information Systems: An Examination of Perceived Information Assurance, Risk, Resilience, and HIS Usefulness". MIS Quarterly. 39 (2): 317–344. doi:10.25300/misq/2015/39.2.03. ISSN 0276-7783.
  20. ^ McFadzean, Elspeth; Ezingeard, Jean-Noël; Birchall, David (2011-04-08). "Information Assurance and Corporate Strategy: A Delphi Study of Choices, Challenges, and Developments for the Future". Information Systems Management. 28 (2): 102–129. doi:10.1080/10580530.2011.562127. ISSN 1058-0530. S2CID 11624922.
  21. ^ Ezingeard, Jean-Noël; McFadzean, Elspeth; Birchall, David (March 2005). "A Model of Information Assurance Benefits". Information Systems Management. 22 (2): 20–29. doi:10.1201/1078/45099.22.2.20050301/87274.3. ISSN 1058-0530. S2CID 31840083.
Bibliography
  • Data Encryption; Scientists at Chang Gung University Target Data Encryption. (2011, May). Information Technology Newsweekly,149. Retrieved October 30, 2011, from ProQuest Computing. (Document ID: 2350804731).
  • Stephenson (2010). "Authentication: A pillar of information assurance". SC Magazine. 21 (1): 55.
  • Cummings, Roger (2002). "The Evolution of Information Assurance" (PDF). Computer. 35 (12): 65–72. doi:10.1109/MC.2002.1106181.[permanent dead link]

Documentation

Read other articles:

Para otros usos de este término, véase Comunidad (desambiguación). Un ejemplo de comunidad de intereses fue Stonehenge, en Inglaterra. Participantes de una actividad conjunta y, por ende, comunitaria Una comunidad es un grupo de seres humanos que tienen ciertos elementos en común, tales como el idioma, costumbres, valores, tareas, visión del mundo, edad, ubicación geográfica (un barrio, por ejemplo), estatus social o roles. Por lo general, en una comunidad se crea una identidad común,...

 

Ini adalah nama Korea; marganya adalah Park. Park Min-haLahir2 Juli 2007 (umur 16)Gunpo, Provinsi Gyeonggi, Korea SelatanPekerjaanAktrisTahun aktif2011–sekarangAgenCube EntertainmentOrang tuaPark Chan-min (ayah)Kim jin (ibu) Nama KoreaHangul박민하 Alih AksaraBak Min-haMcCune–ReischauerPak Min-ha Park Min-ha (lahir 2 Juli 2007) adalah seorang aktris Korea Selatan. Park memulai kariernya sebagai aktris cilik pada 2011, dan telah tampil dalam berbagai produksi seperti film benca...

 

Cierva C.8 Cierva C.8 en Berlín en septiembre de 1930. Tipo Autogiro experimentalFabricante Cierva Autogiro Company/ AvroDiseñado por Juan de la Cierva y CodorníuPrimer vuelo 1926Usuario principal Real Fuerza Aérea británicaProducción 1927N.º construidos 6[editar datos en Wikidata] El Cierva C.8 fue un autogiro experimental diseñado por el ingeniero español Juan de la Cierva y Codorníu en Gran Bretaña, en 1926, y construido con la empresa británica A.V. Roe (Avro). Desar...

Опис Весна Парун (1922-2010), хорватська поетеса Джерело Матиця Хорватська Час створення ? Автор зображення невідомий Ліцензія див. нижче Ліцензування Ця робота є невільною — тобто, не відповідає визначенню вільних творів культури. Згідно з рішенням фонду «Вікімедіа» від ...

 

日本 > 愛知県 > 名古屋市 > 南区 > 北内町 北内町 町丁 北内町北内町の位置愛知県の地図を表示北内町北内町 (名古屋市)名古屋市の地図を表示 北緯35度6分19.16秒 東経136度55分31.16秒 / 北緯35.1053222度 東経136.9253222度 / 35.1053222; 136.9253222国 日本都道府県 愛知県市町村 名古屋市区 南区町名制定[1] 1949年(昭和24年)8月18日面積[W...

 

تايشو-كو    خريطة الموقع تاريخ التأسيس 1 أكتوبر 1932  تقسيم إداري البلد اليابان  [1][2] التقسيم الأعلى أوساكا  خصائص جغرافية إحداثيات 34°39′01″N 135°28′22″E / 34.650402777778°N 135.4727°E / 34.650402777778; 135.4727  [3] المساحة 9.43 كيلومتر مربع السكان التعداد السكاني 64...

Hamlet in Friesland, NetherlandsSkûlenboarchHamletCountry NetherlandsProvince FrieslandPopulation • Total? Skûlenboarch (Dutch: Schuilenburg) is a hamlet in Tytsjerksteradiel in the province Friesland of the Netherlands. The hamlet lies south of Jistrum, every house north of Princess Margriet Canal falls officially under Jistrum. The houses south of the canal are officially part of Eastermar. A bridge connects the two halves of Skûlenboarch with each other. The Joost Wiersmawei...

 

Defunct flying squadron of the Royal Air Force No. 320 (Netherlands) Squadron RAFA Fokker T.VIII of No. 320 Squadron begins a patrol after taking off from Pembroke Dock, WalesActive1 June 1940 – 2 August 1945Country United KingdomAllegiance Dutch government in exileBranch Royal Air ForceTypeInactivePart ofRAF Coastal Command RAF Bomber Command RAF Second Tactical Air ForceNickname(s)NetherlandsMotto(s)Latin: Animo libre dirigimur(We are guided by the mind of liberty) Dutch: (Wij worden...

 

يسرى مارديني معلومات شخصية الاسم الكامل يسرى مارديني الميلاد 5 مارس 1998 (العمر 25 سنة)دمشق الطول 170 سنتيمتر  الإقامة برلين[1]  الجنسية سوريا الوزن 53 كيلوغرام  أخوة وأخوات سارة مارديني  الحياة العملية معلومات النادي النادي الحالي فاسافروند شبانداو المهنة سبّاحة،...

Ambassador of Luxembourg to the United StatesIncumbentNicole Bintner-Bakshiansince 2021StyleHer ExcellencyAppointerHenri, Grand Duke of LuxembourgFormation1940WebsiteEmbassy of Luxembourg in Washington The Ambassador of Luxembourg to the United States is the Grand Duchy of Luxembourg's foremost diplomatic representative in the United States of America, and in charge of Luxembourg's diplomatic mission in the United States. In addition, the ambassador serves concurrently as the non-residen...

 

 4   8 Terminal CangkiranHalte Trans SemarangLetakKecamatanMijenKelurahanCangkiranAlamatJl. RM. Hadisoebeno Sosrowardoyo, Cangkiran, Mijen, SemarangKode pos50216Koordinat geografis7°05′18″S 110°18′29″E / 7.0883163°S 110.3081461°E / -7.0883163; 110.3081461Koordinat: 7°05′18″S 110°18′29″E / 7.0883163°S 110.3081461°E / -7.0883163; 110.3081461Informasi lainStatusDibuka, Halte TerminusKonstruksi dan Fasilit...

 

Гірьов Іван ОлександровичIvan GirevЗагальна інформаціяГромадянство  РосіяНародження 29 червня 2000(2000-06-29)[1] (23 роки)Гаврилів-Ямd, Ярославська область, Росія[2]СпортВид спорту спортивне плавання[3]Команда Energy Standardd Участь і здобутки Нагороди Чемпіонат світу з водн...

This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed.Find sources: Madivala Machideva – news · newspapers · books · scholar · JSTOR (April 2021) (Learn how and when to remove this template message) Madivala MachidevaMachideva StatueBornDevara Hipparagi, Vijayapura district, KarnatakaDiedUlavi Karimana near Murgod in Belagavi D...

 

American comedy series This article is about the television series. For the Saturday Night Live sketch, see MacGruber. For the film, see MacGruber (film). MacGruberPromotional posterGenreAction comedyCreated by Will Forte Jorma Taccone John Solomon Based onMacGruberby Jorma TacconeStarring Will Forte Kristen Wiig Ryan Phillippe Sam Elliott Laurence Fishburne Billy Zane Timothy V. Murphy Country of originUnited StatesOriginal languageEnglishNo. of seasons1No. of episodes8ProductionExecutive pr...

 

Japanese anime television series Monster Hunter Stories: Ride OnMain visualモンスターハンター ストーリーズ RIDE ON(ライドオン)(Monsutā Hantā Sutōrīzu Raido On)GenreFantasy Anime television seriesDirected byMitsuru HongoProduced byYuka OkayasuWritten byNatsuko TakahashiMusic byMasaru YokoyamaStudioDavid ProductionLicensed byNA: FunimationOriginal networkFNS (Fuji TV)Original run October 2, 2016 – April 1, 2018Episodes75[1] (List of epi...

2022 film directed by Talia Osteen Sex AppealRelease posterDirected byTalia OsteenScreenplay byTate HanyokProduced by Jeremy Garelick Ryan Bennett Mark Fasano Mickey Liddell Will Phelps Pete Shilaimon Tobias Weymar Starring Mika Abdalla Jake Short CinematographySherri KaukEdited byGennady FridmanMusic byJeffrey BrodskyProductioncompanyAmerican HighDistributed byHuluRelease dateJanuary 14, 2022Running time90 minutesCountryUnited StatesLanguageEnglish Sex Appeal is a 2022 American teen sex come...

 

Czechoslovak writer This article includes a list of references, related reading, or external links, but its sources remain unclear because it lacks inline citations. Please help to improve this article by introducing more precise citations. (March 2012) (Learn how and when to remove this template message) You can help expand this article with text translated from the corresponding article in Czech. (April 2011) Click [show] for important translation instructions. Machine translation, lik...

 

Women's 20 kilometres walk at the 2023 World ChampionshipsVenueNational Athletics CentreDates20 AugustCompetitors48 from 23 nationsWinning time1:26:51Medalists  María Pérez   Spain Jemima Montag   Australia Antonella Palmisano   Italy← 20222025 → Events at the2023 World ChampionshipsTrack events100 mmenwomen200 mmenwomen400 mmenwomen800 mmenwomen1500 mmenwomen5000 mmenwomen10,000 mmenwomen100 m hurdl...

Cover of The Pencil of Nature, 1844 The Pencil of Nature is a book by William Henry Fox Talbot which was the first commercially published book to be illustrated with photographs.[1][2] Published by Longman, Brown, Green & Longmans in six fascicles between 1844 and 1846, the book detailed Talbot's development of the calotype photographic process and included 24 calotype prints, each one pasted in by hand, illustrating some of the possible applications of the new technology....

 

2002 American TV series or program Blood CrimeDVD CoverWritten byMark Lawrence Miller and Preston A. Whitmore IIDirected byWilliam A. GrahamStarring James Caan Johnathon Schaech Elizabeth Lackey David Field Sydney Jackson Music byChris BoardmanCountry of originUnited StatesOriginal languageEnglishProductionProducerPreston A. Whitmore IICinematographyRobert SteadmanEditorDrake SillimanRunning time88 minutesProduction companies Columbia TriStar Domestic Television Mandalay Television ...

 

Strategi Solo vs Squad di Free Fire: Cara Menang Mudah!