SlideShare ist ein Scribd-Unternehmen logo
1 von 11
INFORMATION
ASSURANCE
-By Akshay Pal
Defination:
Informatin Assurance (IA) is the term related to the
management of risks associated with the
information system of an organisation. IA is defined
as the set of measures Applied to protect
information systems and the information of an
organisation.it ensure
Availability,Integrity,Authentication,Confidentiality
and Non-repudiation of an organisation's information
and IS.
Defination According to the
Information System Security Committee
(NSTISSC)
" Information operation (IO) that protect and defend
information and information systems by ensuring their
Availability,Integrity,Authentication,Confidentiality and Non-
repudiation. This includes provides for restoration of
information systems by incorporating protection,detection
and reaction capabilities."
Difference between Information Security and IA
Information Assurance
■ Focuses mainly on strategy.
■ Covers information management
and protection in a larger domain.
■ Keeps focus on the overall risk
management for the security of an
organization.
Infromation Security
■ Focuses primarily on tools and
tactics.
■ Gives importance and priority to
technology and operation.
■ Concentrates on application and
infrastructure developed to provide
security.
Scope of IA :
 Integrety:
Integrity involves making sure that an information system remains unscathed and that no one has tampered
with it. IA takes steps to maintain integrity, such as having anti-virus software in place so that data will not be
altered or destroyed, and having policies in place so that users know how to properly utilize their systems to
minimize malicious code from entering them.
 Availability:
Availability is the facet of IA where information must be available for use by those that are allowed to
access it. Protecting the availability can involve protecting against malicious code, hackers and any other
threat that could block access to the information system.
 Authentication:
Authentication involves ensuring that users are who they say they are. Methods used for authentication are
user names, passwords, biometrics, tokens and other devices. Authentication is also used in other ways --
not just for identifying users, but also for identifying devices and data messages.
 Confidentiality:
IA involves keeping information confidential. This means that only those authorized to view information are
allowed access to it. Information needs to be kept confidential. This is commonly found, for example, in the
military, where information is classified or only people with certain clearance levels are allowed access to
highly confidential information.
 Non-repudiation:
The final pillar is nonrepudiation. This means that someone cannot deny having completed an action
because there will be proof that they did it.
3-D IA Model
IA is not limited to protection only,but
it expands to the point of taking
offensive measures also in order to
secure the information systems and
the information.The scope of IA is very
widespread.
IA is not a single discipline,as stated
earlier.it also covers multiple
dimensions.The 3-D IA model covers
information states,security services,
and security countermeasures that
are established over time.This model
can be represented as shown in
figure.
The three-dimensional IA model is explained as follows:
o Information states:
Information resides in a system in stored form,processed form or transmitted form. These
three forms are referred to as the states of information,which may also exist in more than one
state.For example,information being transmiited is usually stored in disks at the sender
end.so,this information would be in both transmitted and stored states.
o Security services:
Five essential security services are provided in the IA model.The services include
Availability,Integrity,Authentication,Confidentiality, and Non-repudiation.which we will discuss
already.
o Security countermeasures:
After the risks are assessed and analysed,it is time to react.Your systems must include
certain countermeasures for maintaining the security and IA.These security
countermeasures are applied against vulnerabilities through technology,people, and
operations.In terms of technology,you can use cryptography,firewalls,routers,intrusion
detection systems, and a number of other components for the maintenance of IA.
People
Roles,
Policy,and
Awareness
Incident
Response
Skills and
Training
Showing the Importance of People in IA
Infromation Assurance

Weitere ähnliche Inhalte

Was ist angesagt?

Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
Ali Habeeb
 
Information security management
Information security managementInformation security management
Information security management
UMaine
 

Was ist angesagt? (20)

Introduction to information security
Introduction to information securityIntroduction to information security
Introduction to information security
 
Computer security overview
Computer security overviewComputer security overview
Computer security overview
 
Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3Information Security Governance and Strategy - 3
Information Security Governance and Strategy - 3
 
Security management concepts and principles
Security management concepts and principlesSecurity management concepts and principles
Security management concepts and principles
 
Security Audit View
Security Audit ViewSecurity Audit View
Security Audit View
 
Domain 2 - Asset Security
Domain 2 - Asset SecurityDomain 2 - Asset Security
Domain 2 - Asset Security
 
information security management
information security managementinformation security management
information security management
 
Information System Security(lecture 1)
Information System Security(lecture 1)Information System Security(lecture 1)
Information System Security(lecture 1)
 
Information Security Management.Introduction
Information Security Management.IntroductionInformation Security Management.Introduction
Information Security Management.Introduction
 
Introduction to the management of information security
Introduction to the management of information security  Introduction to the management of information security
Introduction to the management of information security
 
system Security
system Security system Security
system Security
 
SECURITY AND CONTROL
SECURITY AND CONTROLSECURITY AND CONTROL
SECURITY AND CONTROL
 
Information security management
Information security managementInformation security management
Information security management
 
Information security-management-system
Information security-management-systemInformation security-management-system
Information security-management-system
 
What is ISO 27001 ISMS
What is ISO 27001 ISMSWhat is ISO 27001 ISMS
What is ISO 27001 ISMS
 
Information security
Information securityInformation security
Information security
 
Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005Information Security Management System ISO/IEC 27001:2005
Information Security Management System ISO/IEC 27001:2005
 
Physical security.ppt
Physical security.pptPhysical security.ppt
Physical security.ppt
 
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
Iso 27001 control a.12.1,a.12.2 & a.12.3 - by software outsourcing company in...
 
Security policy
Security policySecurity policy
Security policy
 

Ähnlich wie Infromation Assurance

Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
madunix
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
moggdede
 
Cryptography and Network Security Principles and PracticeEigh
Cryptography and Network Security Principles and PracticeEighCryptography and Network Security Principles and PracticeEigh
Cryptography and Network Security Principles and PracticeEigh
MargenePurnell14
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
Nicholas Davis
 
Information security background
Information security backgroundInformation security background
Information security background
Nicholas Davis
 

Ähnlich wie Infromation Assurance (20)

Unit 1 Information Security.docx
Unit 1 Information Security.docxUnit 1 Information Security.docx
Unit 1 Information Security.docx
 
internet security and cyber lawUnit1
internet security and  cyber lawUnit1internet security and  cyber lawUnit1
internet security and cyber lawUnit1
 
Infromation securiity
Infromation securiityInfromation securiity
Infromation securiity
 
Module -5 Security.pdf
Module -5 Security.pdfModule -5 Security.pdf
Module -5 Security.pdf
 
Lecture 1-2.pdf
Lecture 1-2.pdfLecture 1-2.pdf
Lecture 1-2.pdf
 
Fundamentals of-information-security
Fundamentals of-information-security Fundamentals of-information-security
Fundamentals of-information-security
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 
MIS 7.pptx
MIS 7.pptxMIS 7.pptx
MIS 7.pptx
 
Module 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptxModule 2 - Information Assurance Concepts.pptx
Module 2 - Information Assurance Concepts.pptx
 
Security Ch-1.pptx
Security Ch-1.pptxSecurity Ch-1.pptx
Security Ch-1.pptx
 
Cryptography and Network Security Principles and PracticeEigh
Cryptography and Network Security Principles and PracticeEighCryptography and Network Security Principles and PracticeEigh
Cryptography and Network Security Principles and PracticeEigh
 
Information Security
Information Security Information Security
Information Security
 
Introduction to cyber security.pptx
Introduction to cyber security.pptxIntroduction to cyber security.pptx
Introduction to cyber security.pptx
 
I0516064
I0516064I0516064
I0516064
 
Health Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptxHealth Informatics- Module 5-Chapter 1.pptx
Health Informatics- Module 5-Chapter 1.pptx
 
Information Security Background
Information Security BackgroundInformation Security Background
Information Security Background
 
Information security background
Information security backgroundInformation security background
Information security background
 
An Introduction to Cyber security
An Introduction to Cyber securityAn Introduction to Cyber security
An Introduction to Cyber security
 
1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf1678784047-mid_sem-2.pdf
1678784047-mid_sem-2.pdf
 
Data security
Data securityData security
Data security
 

Kürzlich hochgeladen

一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
ayvbos
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Monica Sydney
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
galaxypingy
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
pxcywzqs
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Monica Sydney
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
JOHNBEBONYAP1
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Monica Sydney
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
ydyuyu
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
ydyuyu
 

Kürzlich hochgeladen (20)

Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac RoomVip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
Vip Firozabad Phone 8250092165 Escorts Service At 6k To 30k Along With Ac Room
 
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency""Boost Your Digital Presence: Partner with a Leading SEO Agency"
"Boost Your Digital Presence: Partner with a Leading SEO Agency"
 
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
best call girls in Hyderabad Finest Escorts Service 📞 9352988975 📞 Available ...
 
Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.Meaning of On page SEO & its process in detail.
Meaning of On page SEO & its process in detail.
 
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
一比一原版(Curtin毕业证书)科廷大学毕业证原件一模一样
 
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime NagercoilNagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
Nagercoil Escorts Service Girl ^ 9332606886, WhatsApp Anytime Nagercoil
 
Real Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirtReal Men Wear Diapers T Shirts sweatshirt
Real Men Wear Diapers T Shirts sweatshirt
 
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi EscortsRussian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
Russian Escort Abu Dhabi 0503464457 Abu DHabi Escorts
 
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
20240507 QFM013 Machine Intelligence Reading List April 2024.pdf
 
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
APNIC Policy Roundup, presented by Sunny Chendi at the 5th ICANN APAC-TWNIC E...
 
PowerDirector Explination Process...pptx
PowerDirector Explination Process...pptxPowerDirector Explination Process...pptx
PowerDirector Explination Process...pptx
 
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
20240510 QFM016 Irresponsible AI Reading List April 2024.pdf
 
APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53APNIC Updates presented by Paul Wilson at ARIN 53
APNIC Updates presented by Paul Wilson at ARIN 53
 
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
一比一原版(Offer)康考迪亚大学毕业证学位证靠谱定制
 
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girlsRussian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
Russian Call girls in Abu Dhabi 0508644382 Abu Dhabi Call girls
 
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdfpdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
pdfcoffee.com_business-ethics-q3m7-pdf-free.pdf
 
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi EscortsIndian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
Indian Escort in Abu DHabi 0508644382 Abu Dhabi Escorts
 
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
哪里办理美国迈阿密大学毕业证(本硕)umiami在读证明存档可查
 
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查在线制作约克大学毕业证(yu毕业证)在读证明认证可查
在线制作约克大学毕业证(yu毕业证)在读证明认证可查
 
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
20240509 QFM015 Engineering Leadership Reading List April 2024.pdf
 

Infromation Assurance

  • 2. Defination: Informatin Assurance (IA) is the term related to the management of risks associated with the information system of an organisation. IA is defined as the set of measures Applied to protect information systems and the information of an organisation.it ensure Availability,Integrity,Authentication,Confidentiality and Non-repudiation of an organisation's information and IS.
  • 3. Defination According to the Information System Security Committee (NSTISSC) " Information operation (IO) that protect and defend information and information systems by ensuring their Availability,Integrity,Authentication,Confidentiality and Non- repudiation. This includes provides for restoration of information systems by incorporating protection,detection and reaction capabilities."
  • 4. Difference between Information Security and IA Information Assurance ■ Focuses mainly on strategy. ■ Covers information management and protection in a larger domain. ■ Keeps focus on the overall risk management for the security of an organization. Infromation Security ■ Focuses primarily on tools and tactics. ■ Gives importance and priority to technology and operation. ■ Concentrates on application and infrastructure developed to provide security.
  • 6.  Integrety: Integrity involves making sure that an information system remains unscathed and that no one has tampered with it. IA takes steps to maintain integrity, such as having anti-virus software in place so that data will not be altered or destroyed, and having policies in place so that users know how to properly utilize their systems to minimize malicious code from entering them.  Availability: Availability is the facet of IA where information must be available for use by those that are allowed to access it. Protecting the availability can involve protecting against malicious code, hackers and any other threat that could block access to the information system.  Authentication: Authentication involves ensuring that users are who they say they are. Methods used for authentication are user names, passwords, biometrics, tokens and other devices. Authentication is also used in other ways -- not just for identifying users, but also for identifying devices and data messages.
  • 7.  Confidentiality: IA involves keeping information confidential. This means that only those authorized to view information are allowed access to it. Information needs to be kept confidential. This is commonly found, for example, in the military, where information is classified or only people with certain clearance levels are allowed access to highly confidential information.  Non-repudiation: The final pillar is nonrepudiation. This means that someone cannot deny having completed an action because there will be proof that they did it.
  • 8. 3-D IA Model IA is not limited to protection only,but it expands to the point of taking offensive measures also in order to secure the information systems and the information.The scope of IA is very widespread. IA is not a single discipline,as stated earlier.it also covers multiple dimensions.The 3-D IA model covers information states,security services, and security countermeasures that are established over time.This model can be represented as shown in figure.
  • 9. The three-dimensional IA model is explained as follows: o Information states: Information resides in a system in stored form,processed form or transmitted form. These three forms are referred to as the states of information,which may also exist in more than one state.For example,information being transmiited is usually stored in disks at the sender end.so,this information would be in both transmitted and stored states. o Security services: Five essential security services are provided in the IA model.The services include Availability,Integrity,Authentication,Confidentiality, and Non-repudiation.which we will discuss already. o Security countermeasures: After the risks are assessed and analysed,it is time to react.Your systems must include certain countermeasures for maintaining the security and IA.These security countermeasures are applied against vulnerabilities through technology,people, and operations.In terms of technology,you can use cryptography,firewalls,routers,intrusion detection systems, and a number of other components for the maintenance of IA.