Skip to main content

Information Assurance(IA)

                               Information Assurance(IA)

1.Introduction:

                 Now-a-days Internet clients has increased which is over the world 200 million.This Internet is accessed via mobile telephone,computer,PDA, games machine etc,. So its also need to protect the data,information as well as security  of data and all other things related to the security.
Hence the Information Assurance is very important concept which is related to the Information Security.
                   

2.What is Information Assurance ?

  1.   Information Assurance is one process or its is a one activity which help us to protecting our data,our system or network.
  2. Its also getting the right data to the right persons at the right time.
  3. It protects the information,hardware,software and data from damage or theft.
  4. The measure pillars of the Information Assurance Integrity, Availability Confidentiality.
                                               

3. Pillars of the AI:

      The pillars of the AI is Confidentiality,Availability and Integrity its also called "CIA".

    Confidentiality:

  • confidentiality means privacy.Keep our data secure. protect from the unauthorized access.
  • in short hiding the sensitive data itself from the unauthorized users.
  •  loss of confidentiality is called "disclosure".

Integrity:

  • Integrity is a property that ensures authorized or unauthorized user of the system do not change the data that will result into loss of company' s accounting records or assets.
  • In short information can change only is specified or authenticated manner.
  • loss of integrity is called "modification".

Availability:-

  • Its most of related to the hardware
  • Hardware repairs immediately when needed and maintaining 
  • The authorized parties access  only data.

  1. Information Assurance is only focus only data and business.
  2. It just focus on data and business not the operating system or kernal.
  3. It estimate the susceptibility those information of attack.









Comments

Post a Comment

Popular posts from this blog

Piconet and Scatternet

                                 Piconet and Scatternet         Transfer a data to various people  its become most important now a days. There are a lots of methods are available to  share to data or transfer to data.But I explain here about the Bluetooth  Piconet and Scatternet. Piconet:           Piconet gets its name fro the world "pico". Pico means a very small.         A piconet is nothing but small network. Using this network we can share the data or transfer the data .Its one ad-hoc network.Which links a wireless user group of devices,using Bluetooth  technology.         Piconet is formed at least two devices such as portable PC and a cellular phone to connect. Ad maximum 8 to need to make this network.When network is established, one device act as master and other as sa...

Basic Network Concepts

                           Basic Network Concept (Part 1) What is Network?  Network is two or more peoples or systems want to communicate with each other. Another  way  we can say, network is any interconnection of two or more stations that wish to communicate with each other.    2. Computer Network Computer network is connection of computers the are interconnected with each other using a single technology. In computer network not only computers are connected with each other . The resources like a printer,scanner etc.and connecting device like hub, switch also connected with each other. These interconnected device are able to the communicate with each other means share a files,folders or exchange the information.   3. Components required for Networking: For networking two types of component are required:              ...

Dumpster Diving

                                     Dumpster Diving        Attacker does not launch their attack without any information. This information gets from targets trash.        If attacker gets the information from the targets trash is called Dumpster Diving.Its belongs to the Social Engineering.      In the dumpster diving the attacker search the small data in trash and it get very sticky information like a pin number,username,password etc,.       In computer security dumpster diving is like a dumping. That means the rubbish unwanted waste,unwanted materials etc,.           How to avoid Dumpster Diving? Avoid throwing sensitive information in the trash. Company should have some polices about to destroy trash. Company should contain trash container.