Information Assurance refers to the practice of ensuring the confidentiality, integrity, availability, and non-repudiation of important information and information systems.
https://www.infosectrain.com/courses/red-team-certification-online-training/
What is Information Assurance Model in Cyber Security.pptx
1. What is Information Assurance
Model in Cyber Security
www.infosectrain.com | sales@infosectrain.com
2. www.infosectrain.com | sales@infosectrain.com
What is Information Assurance?
Information Assurance refers to the practice of ensuring the confidentiality, integrity,
availability, and non-repudiation of important information and information systems.
It's a long-term strategy that prioritizes policy implementation over infrastructure
development.
Information Assurance Model in Cyber Security
The information assurance security model is a multi-dimensional model which is
based on four dimensions:
4. www.infosectrain.com | sales@infosectrain.com
1. Information States
Information states are defined as the interpretation of data, which exists in three
states: stored, processed, and transmitted.
โ Storage: It specifies the amount of time that data is saved on a device such as
a hard drive.
โ Processing: It specifies the amount of time when data is being processed.
โ Transmission: It specifies the period when data is transferred between two
parties.
2. Security Services
Security services are the assurance model's fundamental component that delivers
system security and includes the following services: Confidentiality, Integrity,
Availability, Authentication, and Non-repudiation.
โ Confidentiality: Confidentiality ensures that unauthorized parties do not
access system information, and only those who are permitted can read and interpret
it. Confidentiality protection prevents malicious access and unintended information
leakage.
โ Integrity: It ensures that personal information is reliable and accurate and
that it can't be formed, altered, or deleted without authorization.
5. www.infosectrain.com | sales@infosectrain.com
โ Availability: It ensures that only authorized users have consistent and
reliable access to sensitive data. It entails taking steps to maintain data access in
the face of system problems and other sources of intervention.
โ Authentication: It is a protective measure that establishes the
authenticity of message transmission by verifying an individual's identity in order
to collect a specific type of information.
โ Non-repudiation: It is a method of ensuring that neither the sender nor
the receiver can deny their participation in data transmission. When a
communicator sends data to a recipient, the recipient receives a delivery
verification. When a recipient receives a message, it contains all of the
information about the sender.
3. Security Countermeasures
This dimension includes features and functionality that protect the system from
immediate vulnerability by considering technology, policy, practice, and people.
โ Technology: To protect the system from vulnerabilities and threats,
appropriate firewalls, routers, and intrusion detection must be used.
โ Policy and Practice: Every firm has policies that establish norms that
everyone who works there must follow. If a system is breached, these policies
must be followed to handle sensitive data.
6. www.infosectrain.com | sales@infosectrain.com
โ People: The human being is at the center of the information system. Users
and administrators of information systems must adhere to policies and
procedures to create effective systems. They must be trained about the
information system regularly and be prepared to act effectively to protect it.
4. Time
This component can be interpreted in a variety of ways. Data may be available
offline or online at any time, and information and systems may be in turmoil,
posing a risk of unauthorized access. As a result, to limit the risk of security
breaches, every component of the Information Assurance model must be
thoroughly specified and executed at every level of the System Development
Cycle.
Cyber Security with InfosecTrain
InfosecTrain is well-known training company that offers information security
training courses. Join us for a great experience with our industry experts to gain a
solid understanding of cybersecurity concepts.
7. About InfosecTrain
โข Established in 2016, we are one of the finest
Security and Technology Training and
Consulting company
โข Wide range of professional training programs,
certifications & consulting services in the IT
and Cyber Security domain
โข High-quality technical services, certifications
or customized training programs curated with
professionals of over 15 years of combined
experience in the domain
www.infosectrain.com | sales@infosectrain.com
9. Why InfosecTrain Global Learning Partners
Flexible modes
of Training
Tailor Made
Training
Post training
completion
Certified and
Experienced Instructors
Access to the
recorded
sessions
www.infosectrain.com | sales@infosectrain.com
12. Contact us
Get your workforce reskilled
by our certified and
experienced instructors!
IND: 1800-843-7890 (Toll Free) / US: +1 657-722-11127 /
UK : +44 7451 208413
sales@infosectrain.com
www.infosectrain.com