Uploaded by Geronimo, Zildjian C.

Information assurrance

advertisement
Assignment 1
Information and Assurance Security
Submitted by: Geronimo, Zildjian C.
Submitted to; Mrs. Evangelista, Jermyn G.
Introduction
Information assurance and security is the
management and protection of knowledge,
information, and data. It combines two fields:
Information assurance, which focuses on ensuring
the
availability,
integrity,
authentication,
confidentiality, and non-repudiation of information
and systems.
Information assurance focuses on gathering data.
Information security is about keeping that data
safe. In most organizations, these two jobs are
combined into one department or even one worker.
You’ll need to understand cyber security, database
management and security engineering to succeed in
this field.
Concepts and Terms across Information
Security Management
Confidentiality is a requirement whose purpose is to keep
sensitive information from being disclosed to unauthorized
recipients. The secrets might be important for reasons of
national security (nuclear weapons data), law enforcement
(the identities of undercover drug agents), competitive
advantage (manufacturing costs or bidding plans), or personal
privacy (credit histories)
Integrity is a requirement meant to ensure that information and
programs are changed only in a specified and authorized manner.
It may be important to keep data consistent (as in double-entry
bookkeeping) or to allow data to be changed only in an approved
manner (as in withdrawals from a bank account). It may also be
necessary to specify the degree of the accuracy of data.
Availability is a requirement intended to ensure that
systems work promptly and service is not denied to
authorized users. From an operational standpoint, this
requirement refers to adequate response time and/or
guaranteed bandwidth.
Network Security
Network security encompasses all the steps taken to protect the integrity
of a computer network and the data within it. Network security is
important because it keeps sensitive data safe from cyber attacks and
ensures the network is usable and trustworthy.
Computer Security
Computer security started becoming increasingly essential
since modems were introduced and hackers illegally broke into
major computer systems from their homes. This called for the
development of advanced computer security techniques that
aimed to diminish such threats and attacks in the systems.
Threat
A threat refers to a new or newly discovered incident that has the potential to harm a
system or your company overall. There are three main types of threats:
Natural threats, such as floods, hurricanes, or tornadoes
Unintentional threats, like an employee mistakenly accessing the wrong information
Intentional threats, such as spyware, malware, adware companies, or the actions of a
disgruntled employee
Vulnerability
A vulnerability refers to a known weakness of an asset (resource)
that can be exploited by one or more attackers. In other words, it is a
known issue that allows an attack to succeed.
Risk
Risk is defined as the potential for loss or damage when a threat exploits
a vulnerability. Examples of risk include:
Financial losses
Loss of privacy
Damage to your reputation Rep
Legal implications
Even loss of life
Download