All about information assurance security

Day ! It's been a while since the last time i posted my blog. Today my topic is all about Information Assurance Technology. To begin, what is an Information Security Assurance ?
The Information Security Assurance is focuses on ensuring the availability, integrity, authentication, confidentiality, and non-repudiation of information and systems. These measures may including providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.
2nd is the Components Information Security Assurance ?
The components Information Security Assurance are shown in the picture above. The confidentiality, integrity, availability, authenticity, and utility.
For the 3rd question, Differentiate the certification programs to Common body language?
A certification program is a defined set of components or training programs offered by your organization to members to prove that they have achieved a measured level of knowledge within a designated timeline while the body language is the process of communicating nonverbally through conscious or unconscious gestures and movements.
For the 4th question, Differentiate the Governance and Risk management?
Governance, or corporate governance, is the overall system of rules, practices, and standards that guide a business. Risk, or enterprise risk management, is the process of identifying potential hazards to the business and acting to reduce or eliminate their financial impact.
For the 5th question, Different between Security Architecture to Design?
Security architecture is the set of resources and components of a security system that allow it to function. Security design refers to the techniques and methods that position those hardware and software elements to facilitate security.
6th question was, Different between Business Continuity Planning to D-i-s-a-s-t-e-r Recovery Planning?
The business continuity requires you to keep operations functional during the event and immediately after while Disaster recovery focuses on how you respond after the event has completed and how you return to normal.
For question 7, What is Physical Security Control?
Physical control is the implementation of security measures in a defined structure used to deter or prevent unauthorized access to sensitive material. Examples of physical controls are: Closed-circuit surveillance cameras. Motion or thermal alarm systems ,Security guards, Picture IDs, Locked and dead-bolted steel doors, Biometrics (includes fingerprint, voice, face, iris, handwriting, and other automated methods used to recognize individuals).
The 8th question was,
Operational security (OPSEC), also known as procedural security, is a risk management process that encourages managers to view operations from the perspective of an adversary in order to protect sensitive information from falling into the wrong hands.
9th question was, What is Law?
Law is the system of rules which a particular country or community recognizes as regulating the actions of its members and which it may enforce by the imposition of penalties.
For the 10th question, What is Investigation?
Investigation is the action of investigating something or someone; formal or systematic examination or research.
11th question was, What is Ethics?
Ethics is based on well-founded standards of right and wrong that prescribe what humans ought to do, usually in terms of rights, obligations, benefits to society, fairness, or specific virtues.
For the last question, What is Information Security?
Information security, often shortened to infosec, is the practice, policies and principles to protect digital data and other kinds of information. infosec responsibilities include establishing a set of business processes that will protect information assets, regardless of how that information is formatted or whether it is in transit, is being processed or is at rest in storage.

That would be my explanation about Information Assurance Security, Thank you for taking your time reading my blog. Have a great day ! Godbless ans stay safe always .

H2
H3
H4
3 columns
2 columns
1 column
Join the conversation now
Logo
Center