IAS Flashcards
(107 cards)
is the study of how to protect your information assets from destruction, degradation, manipulation and exploitation
Information Assurance (IA)
study on how to recover should any of those happen.
Information Assurance
5 aspects of information needed protection
Availability, Integrity, Confidentiality, Authentication, Non-repudiation
timely, reliable access to data and information services for authorized users;
Availability
protection against unauthorized modification or destruction of information;
integrity
assurance that information is not disclosed to unauthorized persons;
Confidentiality
security measures to establish the validity of a transmission, message, or originator.
Authentication
assurance that the sender is provided with proof of a data delivery
Non- repudiation
True or False: IT security cannot be accomplished in a vacuum
TRUE
Four Major categories of Information Assurance
Physical Security, personnel security, IT security, Operational Security
refers to the protection of hardware, software, and data against physical threats to reduce or prevent disruptions to operations and services and loss of assets.
Physical Security
6 Proper Practice of Information Assurance
-enforcing hard-to-guess passwords
- encrypting hard drives
- locking sensitive documents in a safe
- assigning security clearances to staffers
- using SSL for data transfer
- having off-site back up of documents
is a variety of ongoing measures taken to reduce the likelihood and severity of accidental and intentional alteration, destruction,
Personnel Security
action or inaction by insiders and known outsiders, such as business partners.
Personnel Security
is the inherent technical features and functions that collectively contribute to an IT infrastructure
IT security
involves the implementation of standard operational security procedures
Operational Security
Purpose of operational security
achieve and sustain a known secure system state at all times
-prevent accidental or intentional theft, release, destruction, alteration, misuse, or sabotage of system resources.
According to _________, a computing environment is made up of five continuously interacting components
Raggad’s taxonomy of information security
5 continuously interacting components
activities, people, data. technology and network
According to ______, IA can be thought of as protecting information at three distinct levels
Blyth and Kovacich
3 distinct levels
Physical
-information infrastructure
- perceptual
data and data processing activities in physical space;
Physical
information and data manipulation abilities in cyberspace;
information infrastructure
knowledge and understanding in human decision space.
Perceptual