IAS102 Assignment

  1. What is Information Security Assurance?
    -The Role of Information assurance and security is to protect your information data. and it has two fields Information assurance, which focuses on ensuring availability, integrity, authentication, confidentiality, and information and systems.
  2. Components Information Security Assurance?
    What is the definition of information assurance? In a nutshell, information assurance refers to the safeguarding of data and how it is processed, used, transferred, and kept.
    1.) Availability
    The way people are provided access to sensitive information within your company's infrastructure is referred to as availability.
    2.) Integrity
    As an information assurance principle, integrity means that your sensitive data is not interfered with in any way.
    Antivirus software, penetration tests, and other security measures are frequently used to ensure that hackers do not undermine the integrity of your data.
    3.) Confidentiality
    Confidentiality is perhaps the most crucial principle of information assurance. Only users who require access to sensitive data should be allowed to view, store, modify in approved ways, or transmit it. Privy information should not be easily accessible, as this makes it too easy for hackers to obtain.
  3. Authentication
    Authentication necessitates the implementation of rules to ensure that users are who they say they are. Before accessing any personal material, users must give proof of their identity.
    Passwords, scannable cards, and multifactor authentication are examples of common and simple authentication techniques.

3.)Differentiate the certification programs to Common body language?
Eye contact, gestures, and facial expressions make up the majority of our nonverbal communication; they can send significant messages. However, there are significant cultural variances in how people communicate through body language. It can be quite visible, or it can be very subtle.

  1. Differentiate the Governance and Risk management?
    The whole set of rules, policies, and standards that guide a firm is known as governance, or corporate governance. Risk management, often known as enterprise risk management, is the process of recognizing potential company risks and taking steps to mitigate or eliminate their financial impact.

  2. Different between Security Architecture to Design?
    We need to look at the relationship between the two terms. Specifically, the difference between architecture, and design.
    On the other hand, architecture is utilized to decide the general shape a set of arrangements must take. It’s comparable to “Strategy”, the investigation and arranging of an arrangement of engagements and fights to win a war, in that it takes into consideration cost-benefit examinations, future development, and tries to figure how a certain set of trade needs can be solved while posing the organization within the most advantageous way conceivable to require advantage of future alter.
    In the context of security, Security design looks at all the components of a framework, and the potential dangers to that framework, and decides the set of issues to be fathomed to diminish those dangers within the most effective and coordinates mold. It doesn’t make sense, for occurrence, to decide that examining is essential, so an examining arrangement is secured and spun up, as it were to discover the output is unusable within the system’s ticketing arrangement.

  3. What is Physical Security Control?
    Securing premises and devices from physical attacks can be just as challenging as defending against cyber threats. Automation and AI are increasingly used to shore up defenses.
    Physical security is the protection of people, property, and physical assets from actions and events that could cause damage or loss. Though often overlooked in favor of cybersecurity, physical security is equally important.

  4. What is Operations Security?
    Operational security is a process that organizations deploy to prevent sensitive information from getting into the wrong hands. Identifies actions that may seem innocuous but could inadvertently result in critical or sensitive data being revealed or leaked to a potential attacker.

  5. What is Law?
    Law is a set of rules decided by a particular place or authority meant to keep the peace and security of society.

Courts or police may enforce this system of rules and punish people who break the laws, such as by paying a fine, or another penalty including jail. In ancient societies, leaders wrote laws to set out rules on how people can live, work, and do business with each other. But many times in history when laws have been on a false basis to benefit a few at the expense of society, they have resulted in conflict.

  1. What is an Investigation?
    The reason for an Investigation is to set up significant truths to demonstrate or discredit affirmations of fraud and debasement. It may be a legitimately built-up fact-finding process conducted in a fair-minded and objective way, with the point to set up the significant realities and make suggestions in this association.

  2. What is Ethics?
    Ethics is based on well-founded standards of right and wrong that prescribe what humans ought to do, usually in terms of rights, obligations, benefits to society, fairness, or specific virtues.
    At its simplest, ethics is a system of moral principles. They affect how people make decisions and lead their lives. Ethics is concerned with what is good for individuals and society and is also described as moral philosophy

  3. What is Information Security?
    The term information security implies securing data and data frameworks from unauthorized get to, utilize, divulgence, disturbance, adjustment, or pulverization in arrange to supply astuteness, secrecy, and accessibility.

H2
H3
H4
3 columns
2 columns
1 column
Join the conversation now
Logo
Center