480:
67:
173:
302:
information. Confidentiality is often ensured with the use of cryptography and steganography of data. Confidentiality can be seen within the classification and information superiority with international operations such as NATO Information assurance confidentiality in the United States need to follow HIPAA and healthcare provider security policy
229:. These pillars are taken into account to protect systems while still allowing them to efficiently provide services; However, these pillars do not act independently from one another, rather they interfere with the goal of the other pillars. These pillars of information assurance have slowly changed to become referred to as the
449:
non-repudiation, etc. because of their conflicting nature an increase in security often comes at the expense of speed. Using information assurance in the business model improves reliable management decision-making, customer trust, business continuity and good governance in both public and private sectors.
325:
is the integrity of the data to be true to its origin, which prevents possible denial that an action occurred. Increasing non-repudiation makes it more difficult to deny that the information comes from a certain source. In other words, it making it so that you can not dispute the source/ authenticity
180:
In the beginning information assurance involved just the backing up of data. However once the volume of information increased, the act of information assurance began to become automated, reducing the use of operator intervention, allowing for the creation of instant backups. The last main development
276:
The pillar of availability refers to the preservation of data to be retrieved or modified from authorized individuals. Higher availability is preserved through an increase in storage system or channel reliability. Breaches in information availability can result from power outages, hardware failures,
164:
With the growth of telecommunication networks also comes the dependency on networks, which makes communities increasing vulnerable to cyber attacks that could interrupt, degrade or destroy vital services. Starting from the 1950s the role and use of information assurance has grown and evolved. These
245:
Authentication refers to the verification of the validity of a transmission, originator, or process within an information system. Authentication provides the recipient confidence in the data senders validity as well as the validity of their message. There exists many ways to bolster authentication,
200:
These three main developments of information assurance parallel the three generations of information technologies, the first used to prevent intrusions, the 2nd to detect intrusion and the 3rd for survivability. Information assurance is a collaborative effort of all sectors of life to allow a free
417:
After the risk management plan is implemented, it is tested and evaluated, often by means of formal audits. The IA process is an iterative one, in that the risk assessment and risk management plan are meant to be periodically revised and improved based on data gathered about their completeness and
363:
for those assets. Vulnerabilities in the information assets are determined in order to enumerate the threats capable of exploiting the assets. The assessment then considers both the probability and impact of a threat exploiting a vulnerability in an asset, with impact usually measured in terms of
262:
Integrity refers to the protection of information from unauthorized alteration. The goal of information integrity is to ensure data is accurate throughout its entire lifespan. User authentication is a critical enabler for information integrity. Information integrity is a function of the number of
448:
Many security executives in are firms are moving to a reliance on information assurance to protect intellectual property, protect against potential data leakage, and protect users against themselves. While the use of information assurance is good ensuring certain pillars like, confidentiality,
346:
As stated earlier the pillars do not interact independently of one another, with some pillars impeding on the functioning of other pillars or in the opposite case where they boost other pillars. For example, the increasing the availability of information works directly against the goals of three
267:
existing between the ends of an information exchange . One way information integrity risk is mitigated is through the use of redundant chip and software designs. A failure of authentication could pose a risk to information integrity as it would allow an unauthorized party to alter content. For
436:
breaks down into three main processes Risk
Assessment, Risk Mitigation and Evaluation and assessment. Information Assurance is one of the methodologies which organizations use to implement business risk management. Through the use of information assurance policies like the "BRICK" frame work.
301:
Confidentiality is in essence the opposite of
Integrity. Confidentiality is a security measure which protects against who is able to access the data, which is done by shielding who has access to the information. This is different from Integrity as integrity is shielding who can change the
268:
example, if a hospital has inadequate password policies, an unauthorized user could gain access to an information systems governing the delivery of medication to patients and risk altering the treatment course to the detriment of a particular patient.
444:
Information assurance can be aligned with corporates strategies through training and awareness, senior management involvement and support, and intra-organizational communication allowing for greater internal control and business risk management.
463:
There are a number of international and national bodies that issue standards on information assurance practices, policies, and procedures. In the UK, these include the
Information Assurance Advisory Council and the
1550:
Data
Encryption; Scientists at Chang Gung University Target Data Encryption. (2011, May). Information Technology Newsweekly,149. Retrieved October 30, 2011, from ProQuest Computing. (Document ID: 2350804731).
233:
As an administrator it is important to emphasize the pillars that you want in order to achieve your desired result for their information system, balancing the aspects of service, and
77:
Information assurance (IA) is the process of processing, storing, and transmitting the right information to the right people at the right time. IA relates to the business level and
402:, policies and procedures requiring such controls as regular backups and configuration hardening, employee training in security awareness, or organizing personnel into dedicated
81:
risk management of information and related systems, rather than the creation and application of security controls. IA is used to benefit business through the use of information
371:. This plan proposes countermeasures that involve mitigating, eliminating, accepting, or transferring the risks, and considers prevention, detection, and response to threats.
410:). The cost and benefit of each countermeasure is carefully considered. Thus, the IA practitioner does not seek to eliminate all risks; but, to manage them in the most
251:
364:
cost to the asset's stakeholders. The sum of the products of the threats' impact and the probability of their occurring is the total risk to the information asset.
1612:
437:
Additionally, Business Risk
Management also occurs to comply with federal and international laws regarding the release and security of information such as
438:
591:
89:, resilience, appropriate architecture, system safety, and security, which increases the utility of information to only their authorized users.
1415:"Disaster Experience and Hospital Information Systems: An Examination of Perceived Information Assurance, Risk, Resilience, and HIS Usefulness"
1607:
1630:
281:, etc. The goal of high availability is to preserve access to information. Availability of information can be bolstered by the use of
525:
465:
1625:
1143:
Yan, Aibin; Hu, Yuanjie; Cui, Jie; Chen, Zhili; Huang, Zhengfeng; Ni, Tianming; Girard, Patrick; Wen, Xiaoqing (2020-06-01).
86:
1568:
1636:
515:
247:
1454:"Information Assurance and Corporate Strategy: A Delphi Study of Choices, Challenges, and Developments for the Future"
983:
894:
849:
1192:"NATO Intelligence and Information Sharing: Improving NATO Strategy for Stabilization and Reconstruction Operations"
1145:"Information Assurance Through Redundant Design: A Novel TNU Error-Resilient Latch for Harsh Radiation Environment"
403:
833:
Foundations of
Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems]
1500:
355:
The information assurance process typically begins with the enumeration and classification of the information
485:
1368:"Semantic information assurance for secure distributed knowledge management: a business process perspective"
117:
26:) is the practice of assuring information and managing risks related to the use, processing, storage, and
1661:
55:
124:
as they relate to information systems. Further, IA is an interdisciplinary field requiring expertise in
458:
303:
93:
42:
of user data. IA encompasses both digital protections and physical techniques. These methods apply to
580:
565:
520:
505:
391:
1231:
Chen, Chin-Ling; Chiang, Mao-Lun; Hsieh, Hui-Ching; Liu, Ching-Cheng; Deng, Yong-Yuan (2020-05-08).
331:
311:
190:
1453:
1233:"A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing"
1516:
1284:
1049:
510:
1283:
Such, Jose M.; Gouglidis, Antonios; Knowles, William; Misra, Gaurav; Rashid, Awais (July 2016).
830:
Luenam, P.; Peng Liu (2003). "The design of an adaptive intrusion tolerant database system".
585:
109:
530:
395:
368:
230:
149:
101:
51:
8:
399:
182:
145:
1528:
1481:
1395:
1348:
1260:
1172:
1125:
964:
900:
875:"Incentive-based modeling and inference of attacker intent, objectives, and strategies"
855:
812:
141:
783:
Chakraborty, Rajarshi; Ramireddy, Srilakshmi; Raghu, T.S.; Rao, H.Raghav (July 2010).
1520:
1473:
1434:
1387:
1340:
1264:
1252:
1213:
1176:
1164:
1117:
1109:
1030:
956:
890:
845:
804:
729:
679:
637:
575:
570:
550:
494:
356:
290:
121:
27:
1532:
1485:
1399:
1352:
968:
859:
1583:
1512:
1465:
1430:
1426:
1379:
1332:
1296:
1244:
1203:
1156:
1129:
1101:
1061:
1020:
948:
904:
882:
837:
816:
796:
763:
721:
671:
264:
137:
1469:
1208:
1191:
1065:
433:
360:
322:
226:
222:
194:
82:
43:
39:
35:
1620:
1414:
1232:
1372:
IEEE Transactions on
Systems, Man, and Cybernetics - Part A: Systems and Humans
1367:
1320:
1300:
1248:
1089:
831:
768:
751:
709:
659:
411:
327:
218:
186:
31:
1383:
1105:
879:
Proceedings of the 10th ACM conference on
Computer and communications security
841:
1655:
1524:
1477:
1438:
1391:
1344:
1256:
1217:
1168:
1144:
1113:
1034:
1025:
1008:
960:
808:
733:
683:
641:
535:
387:
70:
1587:
1160:
725:
675:
1121:
874:
307:
286:
282:
210:
47:
936:
886:
784:
952:
800:
153:
1554:
Stephenson (2010). "Authentication: A pillar of information assurance".
1499:
Ezingeard, Jean-Noël; McFadzean, Elspeth; Birchall, David (March 2005).
1452:
McFadzean, Elspeth; Ezingeard, Jean-Noël; Birchall, David (2011-04-08).
1336:
1190:
Hanna, Michael; Granzow, David; Bolte, Bjorn; Alvarado, Andrew (2017).
367:
With the risk assessment complete, the IA practitioner then develops a
129:
545:
374:
A framework published by a standards organization, such as NIST RMF,
214:
1050:"IS practitioners' views on core concepts of information integrity"
540:
335:
125:
78:
626:"HOW TO INCREASE THE INFORMATION ASSURANCE IN THE INFORMATION AGE"
560:
383:
375:
234:
105:
30:
of information. Information assurance includes protection of the
1285:"Information assurance techniques: Perceived cost effectiveness"
984:"Information Assurance Benefits and Challenges: An Introduction"
785:"The Information Assurance Practices of Cloud Computing Vendors"
66:
16:
Multi-disciplinary methods for decision support systems security
1615:
Risk management and accreditation of information systems (2005)
479:
250:
such as a person's name, address telephone number, access to a
185:
for the processing and storage of data through techniques like
166:
113:
347:
other pillars: integrity, authentication and confidentiality.
499:
422:
407:
379:
133:
97:
1007:
San
Nicolas-Rocca, Tonia; Burkhard, Richard J (2019-06-17).
782:
330:
while that data is in transit, usually through the use of a
172:
1649:
Information assurance has also evolved due to social media
555:
278:
1498:
1451:
421:
There are two meta-techniques with information assurance:
359:
to be protected. Next, the IA practitioner will perform a
1282:
1189:
1090:"Information assurance in biomedical informatics systems"
1006:
752:"Information assurance in a distributed forensic cluster"
1088:
Schou, C.D.; Frost, J.; Maconachy, W.V. (January 2004).
452:
1413:
Park, Insu; Sharman, Raj; Rao, H. Raghav (2015-02-02).
1319:
Johnson, M. E.; Goetz, E.; Pfleeger, S. L. (May 2009).
1054:
International
Journal of Accounting Information Systems
165:
feedback loop practices were employed while developing
1642:
937:"Conflicts Among the Pillars of Information Assurance"
209:
Information assurance is built between five pillars:
54:(i.e. umbrella term), and as the business outcome of
1318:
982:
Sadiku, Matthew; Alam, Shumon; Musa, Sarhan (2017).
625:
475:
459:
IT risk § Standards Organizations and Standards
406:(CERT) or computer security incident response team (
73:: one of the common information assurance schematics
1087:
881:. New York, New York, USA: ACM Press. p. 179.
660:"Information assurance in the twenty-first century"
326:of data. Non-repudiation involves the reduction to
1230:
592:Hawaii International Conference on System Sciences
1094:IEEE Engineering in Medicine and Biology Magazine
46:, both physical and electronic forms, as well as
1653:
1626:Information Assurance XML Schema Markup Language
1412:
1321:"Security through Information Risk Management"
981:
829:
749:
750:Pringle, Nick; Burgess, Mikhaila (May 2014).
1142:
1501:"A Model of Information Assurance Benefits"
428:
246:mainly breaking down into three main ways,
1553:
1365:
341:
1207:
1024:
767:
657:
526:Information Assurance Vulnerability Alert
466:Information Assurance Collaboration Group
181:of information assurance is implementing
50:. IA is best thought of as a superset of
1569:"The Evolution of Information Assurance"
1566:
1517:10.1201/1078/45099.22.2.20050301/87274.3
710:"The evolution of information assurance"
707:
254:, or known information, like passwords.
171:
65:
872:
630:Journal of Defense Resources Management
1654:
1047:
934:
1314:
1312:
1310:
1278:
1276:
1274:
1083:
1081:
1079:
1077:
1075:
623:
453:Standards organizations and standards
1013:Information Technology and Libraries
930:
928:
926:
924:
922:
920:
918:
916:
914:
745:
743:
703:
701:
699:
697:
695:
693:
653:
651:
619:
617:
615:
613:
394:may include technical tools such as
92:Besides defending against malicious
1366:Singh, R.; Salam, A.F. (May 2006).
1009:"Information Security in Libraries"
516:Factor Analysis of Information Risk
248:personally identifiable information
169:military decision support systems.
156:, in addition to computer science.
13:
1307:
1271:
1196:Connections: The Quarterly Journal
1072:
1048:Boritz, J. Efrim (December 2005).
317:
296:
14:
1673:
1596:
911:
740:
690:
648:
610:
240:
1645:Archive of Information Assurance
1643:Archive of Information Assurance
1601:
1237:Wireless Personal Communications
478:
404:computer emergency response team
1492:
1445:
1406:
1359:
1224:
1183:
1136:
1041:
1000:
873:Liu, Peng; Zang, Wanyu (2003).
271:
1505:Information Systems Management
1458:Information Systems Management
1149:IEEE Transactions on Computers
975:
935:Wilson, Kelce S. (July 2013).
866:
823:
776:
708:Cummings, R. (December 2002).
588:for cyber security investments
34:, availability, authenticity,
1:
598:
486:Business and economics portal
201:and equal exchange of ideas.
100:), IA practitioners consider
1470:10.1080/10580530.2011.562127
1209:10.11610/connections.16.4.01
1066:10.1016/j.accinf.2005.07.001
658:McConnell, M. (April 2002).
289:, off site capabilities and
257:
159:
7:
624:Sosin, Artur (2018-04-01).
471:
108:, regulatory and standards
61:
56:information risk management
10:
1678:
1613:HMG INFOSEC STANDARD NO. 2
1431:10.25300/misq/2015/39.2.03
1301:10.1016/j.cose.2016.03.009
1249:10.1007/s11277-020-07240-2
769:10.1016/j.diin.2014.03.005
456:
350:
231:pillars of Cyber Security.
204:
176:OODA Feedback Loop Diagram
1384:10.1109/TSMCA.2006.871792
1106:10.1109/MEMB.2004.1297181
842:10.1109/fits.2003.1264925
566:Risk management framework
521:Fair information practice
506:Countermeasure (computer)
390:, may guide development.
1567:Cummings, Roger (2002).
1289:Computers & Security
1026:10.6017/ital.v38i2.10973
836:. IEEE. pp. 14–21.
434:Business Risk Management
429:Business Risk Management
332:man-in-the-middle attack
1588:10.1109/MC.2002.1106181
1161:10.1109/tc.2020.2966200
726:10.1109/MC.2002.1106181
676:10.1109/MC.2002.1012425
511:Decision support system
342:Interactions of Pillars
310:regulations to ensure
177:
74:
1633:Information Assurance
1631:DoD Directive 8500.01
1325:IEEE Security Privacy
887:10.1145/948109.948135
756:Digital Investigation
425:and risk assessment.
175:
69:
20:Information assurance
953:10.1109/mitp.2012.24
801:10.1109/mitp.2010.44
670:(4): supl16–supl19.
531:Information security
369:risk management plan
304:information labeling
150:security engineering
102:corporate governance
52:information security
1639:DoD IA Policy Chart
1637:DoD IA Policy Chart
1337:10.1109/MSP.2009.77
400:anti-virus software
183:distributed systems
146:systems engineering
132:, user experience,
118:business continuity
1662:IT risk management
178:
142:management science
75:
586:Gordon–Loeb model
571:Security controls
551:Mission assurance
495:Asset (computing)
291:continuous signal
122:disaster recovery
71:The McCumber Cube
1669:
1591:
1573:
1563:
1537:
1536:
1496:
1490:
1489:
1449:
1443:
1442:
1410:
1404:
1403:
1363:
1357:
1356:
1316:
1305:
1304:
1280:
1269:
1268:
1228:
1222:
1221:
1211:
1187:
1181:
1180:
1140:
1134:
1133:
1085:
1070:
1069:
1045:
1039:
1038:
1028:
1004:
998:
997:
995:
994:
979:
973:
972:
932:
909:
908:
870:
864:
863:
827:
821:
820:
780:
774:
773:
771:
747:
738:
737:
705:
688:
687:
655:
646:
645:
621:
488:
483:
482:
314:of information.
265:degrees-of-trust
138:forensic science
96:and code (e.g.,
87:trust management
1677:
1676:
1672:
1671:
1670:
1668:
1667:
1666:
1652:
1651:
1604:
1599:
1594:
1571:
1541:
1540:
1497:
1493:
1450:
1446:
1411:
1407:
1364:
1360:
1317:
1308:
1281:
1272:
1229:
1225:
1188:
1184:
1141:
1137:
1086:
1073:
1046:
1042:
1005:
1001:
992:
990:
980:
976:
941:IT Professional
933:
912:
897:
871:
867:
852:
828:
824:
789:IT Professional
781:
777:
748:
741:
706:
691:
656:
649:
622:
611:
601:
596:
484:
477:
474:
461:
455:
431:
418:effectiveness.
392:Countermeasures
361:risk assessment
353:
344:
320:
318:Non-repudiation
299:
297:Confidentiality
274:
260:
243:
223:confidentiality
207:
195:cloud computing
162:
104:issues such as
83:risk management
64:
44:data in transit
40:confidentiality
36:non-repudiation
17:
12:
11:
5:
1675:
1665:
1664:
1647:
1646:
1640:
1634:
1628:
1623:
1618:
1617:
1616:
1603:
1600:
1598:
1597:External links
1595:
1593:
1592:
1564:
1551:
1547:
1546:
1545:
1539:
1538:
1491:
1464:(2): 102–129.
1444:
1425:(2): 317–344.
1405:
1378:(3): 472–486.
1358:
1306:
1270:
1243:(1): 575–598.
1223:
1182:
1155:(6): 789–799.
1135:
1100:(1): 110–118.
1071:
1060:(4): 260–279.
1040:
999:
974:
910:
895:
865:
850:
822:
775:
739:
689:
647:
608:
607:
606:
605:
600:
597:
595:
594:
589:
583:
578:
573:
568:
563:
558:
553:
548:
543:
538:
533:
528:
523:
518:
513:
508:
503:
497:
491:
490:
489:
473:
470:
457:Main article:
454:
451:
430:
427:
412:cost-effective
352:
349:
343:
340:
328:data integrity
323:Nonrepudiation
319:
316:
298:
295:
273:
270:
259:
256:
242:
241:Authentication
239:
227:nonrepudiation
219:authentication
206:
203:
161:
158:
63:
60:
15:
9:
6:
4:
3:
2:
1674:
1663:
1660:
1659:
1657:
1650:
1644:
1641:
1638:
1635:
1632:
1629:
1627:
1624:
1622:
1621:IA References
1619:
1614:
1611:
1610:
1609:
1608:UK Government
1606:
1605:
1602:Documentation
1589:
1585:
1582:(12): 65–72.
1581:
1577:
1570:
1565:
1561:
1557:
1552:
1549:
1548:
1543:
1542:
1534:
1530:
1526:
1522:
1518:
1514:
1510:
1506:
1502:
1495:
1487:
1483:
1479:
1475:
1471:
1467:
1463:
1459:
1455:
1448:
1440:
1436:
1432:
1428:
1424:
1420:
1419:MIS Quarterly
1416:
1409:
1401:
1397:
1393:
1389:
1385:
1381:
1377:
1373:
1369:
1362:
1354:
1350:
1346:
1342:
1338:
1334:
1330:
1326:
1322:
1315:
1313:
1311:
1302:
1298:
1294:
1290:
1286:
1279:
1277:
1275:
1266:
1262:
1258:
1254:
1250:
1246:
1242:
1238:
1234:
1227:
1219:
1215:
1210:
1205:
1201:
1197:
1193:
1186:
1178:
1174:
1170:
1166:
1162:
1158:
1154:
1150:
1146:
1139:
1131:
1127:
1123:
1119:
1115:
1111:
1107:
1103:
1099:
1095:
1091:
1084:
1082:
1080:
1078:
1076:
1067:
1063:
1059:
1055:
1051:
1044:
1036:
1032:
1027:
1022:
1018:
1014:
1010:
1003:
989:
985:
978:
970:
966:
962:
958:
954:
950:
946:
942:
938:
931:
929:
927:
925:
923:
921:
919:
917:
915:
906:
902:
898:
896:1-58113-738-9
892:
888:
884:
880:
876:
869:
861:
857:
853:
851:0-7695-2057-X
847:
843:
839:
835:
834:
826:
818:
814:
810:
806:
802:
798:
794:
790:
786:
779:
770:
765:
761:
757:
753:
746:
744:
735:
731:
727:
723:
720:(12): 65–72.
719:
715:
711:
704:
702:
700:
698:
696:
694:
685:
681:
677:
673:
669:
665:
661:
654:
652:
643:
639:
635:
631:
627:
620:
618:
616:
614:
609:
603:
602:
593:
590:
587:
584:
582:
581:Vulnerability
579:
577:
574:
572:
569:
567:
564:
562:
559:
557:
554:
552:
549:
547:
544:
542:
539:
537:
536:ISO/IEC 27001
534:
532:
529:
527:
524:
522:
519:
517:
514:
512:
509:
507:
504:
501:
498:
496:
493:
492:
487:
481:
476:
469:
467:
460:
450:
446:
442:
440:
435:
426:
424:
419:
415:
413:
409:
405:
401:
397:
393:
389:
388:ISO/IEC 27002
385:
381:
377:
372:
370:
365:
362:
358:
348:
339:
337:
333:
329:
324:
315:
313:
312:nondisclosure
309:
305:
294:
292:
288:
287:data channels
284:
280:
269:
266:
255:
253:
249:
238:
236:
232:
228:
224:
220:
216:
212:
202:
198:
196:
192:
188:
184:
174:
170:
168:
157:
155:
151:
147:
143:
139:
136:examination,
135:
131:
127:
123:
119:
115:
111:
107:
103:
99:
95:
90:
88:
84:
80:
72:
68:
59:
57:
53:
49:
45:
41:
37:
33:
29:
25:
21:
1648:
1579:
1575:
1559:
1555:
1544:Bibliography
1511:(2): 20–29.
1508:
1504:
1494:
1461:
1457:
1447:
1422:
1418:
1408:
1375:
1371:
1361:
1331:(3): 45–52.
1328:
1324:
1292:
1288:
1240:
1236:
1226:
1199:
1195:
1185:
1152:
1148:
1138:
1097:
1093:
1057:
1053:
1043:
1019:(2): 58–71.
1016:
1012:
1002:
991:. Retrieved
987:
977:
947:(4): 44–49.
944:
940:
878:
868:
832:
825:
795:(4): 29–37.
792:
788:
778:
759:
755:
717:
713:
667:
663:
636:(1): 45–57.
633:
629:
462:
447:
443:
432:
420:
416:
373:
366:
354:
345:
321:
308:need-to-know
300:
283:backup power
275:
272:Availability
261:
244:
211:availability
208:
199:
179:
163:
91:
76:
48:data at rest
28:transmission
23:
19:
18:
1556:SC Magazine
1295:: 117–133.
1202:(4): 5–34.
762:: S36–S44.
502:(benchmark)
193:plus using
154:criminology
993:2020-11-28
599:References
130:accounting
110:compliance
1525:1058-0530
1478:1058-0530
1439:0276-7783
1392:1083-4427
1345:1558-4046
1265:218934756
1257:0929-6212
1218:1812-1098
1177:214408357
1169:0018-9340
1114:0739-5175
1035:2163-5226
988:procon.bg
961:1520-9202
809:1520-9202
734:0018-9162
684:0018-9162
642:2068-9403
546:ISO 17799
396:firewalls
258:Integrity
252:key token
215:integrity
160:Evolution
79:strategic
32:integrity
1656:Category
1576:Computer
1562:(1): 55.
1533:31840083
1486:11624922
1400:10191333
1353:30062820
1122:15154266
969:27170966
860:14058057
714:Computer
664:Computer
541:ISO 9001
472:See also
336:phishing
285:, spare
126:business
114:auditing
62:Overview
1130:7746947
905:3897784
817:8059538
561:Risk IT
384:PCI DSS
376:Risk IT
351:Process
235:privacy
205:Pillars
106:privacy
98:viruses
94:hackers
1531:
1523:
1484:
1476:
1437:
1398:
1390:
1351:
1343:
1263:
1255:
1216:
1175:
1167:
1128:
1120:
1112:
1033:
967:
959:
903:
893:
858:
848:
815:
807:
732:
682:
640:
576:Threat
357:assets
167:WWMCCS
152:, and
120:, and
1572:(PDF)
1529:S2CID
1482:S2CID
1396:S2CID
1349:S2CID
1261:S2CID
1173:S2CID
1126:S2CID
965:S2CID
901:S2CID
856:S2CID
813:S2CID
604:Notes
500:COBIT
439:HIPAA
423:audit
414:way.
408:CSIRT
380:CobiT
134:fraud
1521:ISSN
1474:ISSN
1435:ISSN
1388:ISSN
1341:ISSN
1253:ISSN
1214:ISSN
1165:ISSN
1118:PMID
1110:ISSN
1031:ISSN
957:ISSN
891:ISBN
846:ISBN
805:ISSN
730:ISSN
680:ISSN
638:ISSN
556:Risk
398:and
306:and
279:DDOS
225:and
189:and
187:SANs
38:and
1584:doi
1513:doi
1466:doi
1427:doi
1380:doi
1333:doi
1297:doi
1245:doi
1241:113
1204:doi
1157:doi
1102:doi
1062:doi
1021:doi
949:doi
883:doi
838:doi
797:doi
764:doi
722:doi
672:doi
386:or
334:or
191:NAS
1658::
1580:35
1578:.
1574:.
1560:21
1558:.
1527:.
1519:.
1509:22
1507:.
1503:.
1480:.
1472:.
1462:28
1460:.
1456:.
1433:.
1423:39
1421:.
1417:.
1394:.
1386:.
1376:36
1374:.
1370:.
1347:.
1339:.
1327:.
1323:.
1309:^
1293:60
1291:.
1287:.
1273:^
1259:.
1251:.
1239:.
1235:.
1212:.
1200:16
1198:.
1194:.
1171:.
1163:.
1153:69
1151:.
1147:.
1124:.
1116:.
1108:.
1098:23
1096:.
1092:.
1074:^
1056:.
1052:.
1029:.
1017:38
1015:.
1011:.
986:.
963:.
955:.
945:15
943:.
939:.
913:^
899:.
889:.
877:.
854:.
844:.
811:.
803:.
793:12
791:.
787:.
760:11
758:.
754:.
742:^
728:.
718:35
716:.
712:.
692:^
678:.
668:35
666:.
662:.
650:^
632:.
628:.
612:^
468:.
441:.
382:,
378:,
338:.
293:.
237:.
221:,
217:,
213:,
197:.
148:,
144:,
140:,
128:,
116:,
112:,
85:,
58:.
24:IA
1590:.
1586::
1535:.
1515::
1488:.
1468::
1441:.
1429::
1402:.
1382::
1355:.
1335::
1329:7
1303:.
1299::
1267:.
1247::
1220:.
1206::
1179:.
1159::
1132:.
1104::
1068:.
1064::
1058:6
1037:.
1023::
996:.
971:.
951::
907:.
885::
862:.
840::
819:.
799::
772:.
766::
736:.
724::
686:.
674::
644:.
634:9
22:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.