Information Assurance Flashcards
(107 cards)
is data endowed with relevance and purpose
Information
Useful characteristics that the information should possess
Timely
Accurate
Complete
Verifiable
Consistent
Available
the following are all aspects of
system quality:
functionality
adequacy
interoperability
correctness
security
reliability
usability
efficiency
maintainability
portability
what characteristics should information possess to be useful?
accurate,
timely,
complete,
verifiable,
consistent,
available
all distinct
conceptual resources:
Noise
Data
Information
Knowledge
raw facts with an unknown coding system
Noise
raw facts with a known coding system
Data
processed data
Information
: accepted facts, principles, or rules of thumb that are
useful for specific domains. Knowledge can be the
result of inferences and implications produced from
simple information facts.
Knowledge
Actions taken that protect and defend information and
information systems by ensuring their availability,
integrity, authentication, confidentiality and
non-repudiation. This includes providing for restoration
of information systems by incorporating protection,
detection and reaction capabilities.
IA
is the study of how to protect your
information assets from destruction, degradation, manipulation and
exploitation. But also, how to recover should any of those happen.
Notice that it is both proactive and reactive.
Information Assurance
According to the DoD definition, these are some aspects of
information needing protection:
Availability
Integrity
Confidentiality
Authentication
Non-repudation
assurance that the sender is provided with proof
of a data delivery and recipient is provided with proof
of the sender’s identity, so that neither can later deny
having processed the data.
Non-repudiation:
security measures to establish the validity of a
transmission, message, or originator.
Authentication:
assurance that information is not disclosed to
unauthorized persons;
Confidentiality:
protection against unauthorized modification or
destruction of information;
Integrity:
timely, reliable access to data and information
services for authorized users;
Availability:
According to Debra Herrmann (Complete Guide to Security and
Privacy Metrics), IA should be viewed as spanning four security
engineering domains:
physical security
personnel security
IT security
operational security
The simple truth is that IT security cannot be
accomplished in a vacuum, because there are a multitude
of dependencies and interactions among all four security
engineering domains
(Herrmann, p. 10
refers to the protection of hardware, software,
and data against physical threats to reduce or prevent disruptions
to operations and services and loss of assets.
“Physical security
is a variety of ongoing measures taken to
reduce the likelihood and severity of accidental and intentional
alteration, destruction, misappropriation, misuse, misconfiguration,
unauthorized distribution, and unavailability of an organization’s
logical and physical assets, as the result of action or inaction by
insiders and known outsiders, such as business partners.”
“Personnel security
is the inherent technical features and functions that
collectively contribute to an IT infrastructure achieving and
sustaining confidentiality, integrity, availability, accountability,
authenticity, and reliability.
“IT security
involves the implementation of standard
operational security procedures that define the nature and
frequency of the interaction between users, systems, and system
resources, the purpose of which is to
1 achieve and sustain a known secure system state at all times,
and
2 prevent accidental or intentional theft, release, destruction,
alteration, misuse, or sabotage of system resources.”
Operational security
According to Raggad’s taxonomy of information security, a
computing environment is made up of five continuously interacting
components:
activities,
people,
data,
technology,
networks.