Knowledge

Information assurance

Source 📝

480: 67: 173: 302:
information. Confidentiality is often ensured with the use of cryptography and steganography of data. Confidentiality can be seen within the classification and information superiority with international operations such as NATO Information assurance confidentiality in the United States need to follow HIPAA and healthcare provider security policy
229:. These pillars are taken into account to protect systems while still allowing them to efficiently provide services; However, these pillars do not act independently from one another, rather they interfere with the goal of the other pillars. These pillars of information assurance have slowly changed to become referred to as the 449:
non-repudiation, etc. because of their conflicting nature an increase in security often comes at the expense of speed. Using information assurance in the business model improves reliable management decision-making, customer trust, business continuity and good governance in both public and private sectors.
325:
is the integrity of the data to be true to its origin, which prevents possible denial that an action occurred. Increasing non-repudiation makes it more difficult to deny that the information comes from a certain source. In other words, it making it so that you can not dispute the source/ authenticity
180:
In the beginning information assurance involved just the backing up of data. However once the volume of information increased, the act of information assurance began to become automated, reducing the use of operator intervention, allowing for the creation of instant backups. The last main development
276:
The pillar of availability refers to the preservation of data to be retrieved or modified from authorized individuals. Higher availability is preserved through an increase in storage system or channel reliability. Breaches in information availability can result from power outages, hardware failures,
164:
With the growth of telecommunication networks also comes the dependency on networks, which makes communities increasing vulnerable to cyber attacks that could interrupt, degrade or destroy vital services. Starting from the 1950s the role and use of information assurance has grown and evolved. These
245:
Authentication refers to the verification of the validity of a transmission, originator, or process within an information system. Authentication provides the recipient confidence in the data senders validity as well as the validity of their message. There exists many ways to bolster authentication,
200:
These three main developments of information assurance parallel the three generations of information technologies, the first used to prevent intrusions, the 2nd to detect intrusion and the 3rd for survivability. Information assurance is a collaborative effort of all sectors of life to allow a free
417:
After the risk management plan is implemented, it is tested and evaluated, often by means of formal audits. The IA process is an iterative one, in that the risk assessment and risk management plan are meant to be periodically revised and improved based on data gathered about their completeness and
363:
for those assets. Vulnerabilities in the information assets are determined in order to enumerate the threats capable of exploiting the assets. The assessment then considers both the probability and impact of a threat exploiting a vulnerability in an asset, with impact usually measured in terms of
262:
Integrity refers to the protection of information from unauthorized alteration. The goal of information integrity is to ensure data is accurate throughout its entire lifespan. User authentication is a critical enabler for information integrity. Information integrity is a function of the number of
448:
Many security executives in are firms are moving to a reliance on information assurance to protect intellectual property, protect against potential data leakage, and protect users against themselves. While the use of information assurance is good ensuring certain pillars like, confidentiality,
346:
As stated earlier the pillars do not interact independently of one another, with some pillars impeding on the functioning of other pillars or in the opposite case where they boost other pillars. For example, the increasing the availability of information works directly against the goals of three
267:
existing between the ends of an information exchange . One way information integrity risk is mitigated is through the use of redundant chip and software designs. A failure of authentication could pose a risk to information integrity as it would allow an unauthorized party to alter content. For
436:
breaks down into three main processes Risk Assessment, Risk Mitigation and Evaluation and assessment. Information Assurance is one of the methodologies which organizations use to implement business risk management. Through the use of information assurance policies like the "BRICK" frame work.
301:
Confidentiality is in essence the opposite of Integrity. Confidentiality is a security measure which protects against who is able to access the data, which is done by shielding who has access to the information. This is different from Integrity as integrity is shielding who can change the
268:
example, if a hospital has inadequate password policies, an unauthorized user could gain access to an information systems governing the delivery of medication to patients and risk altering the treatment course to the detriment of a particular patient.
444:
Information assurance can be aligned with corporates strategies through training and awareness, senior management involvement and support, and intra-organizational communication allowing for greater internal control and business risk management.
463:
There are a number of international and national bodies that issue standards on information assurance practices, policies, and procedures. In the UK, these include the Information Assurance Advisory Council and the
1550:
Data Encryption; Scientists at Chang Gung University Target Data Encryption. (2011, May). Information Technology Newsweekly,149. Retrieved October 30, 2011, from ProQuest Computing. (Document ID: 2350804731).
233:
As an administrator it is important to emphasize the pillars that you want in order to achieve your desired result for their information system, balancing the aspects of service, and
77:
Information assurance (IA) is the process of processing, storing, and transmitting the right information to the right people at the right time. IA relates to the business level and
402:, policies and procedures requiring such controls as regular backups and configuration hardening, employee training in security awareness, or organizing personnel into dedicated 81:
risk management of information and related systems, rather than the creation and application of security controls. IA is used to benefit business through the use of information
371:. This plan proposes countermeasures that involve mitigating, eliminating, accepting, or transferring the risks, and considers prevention, detection, and response to threats. 410:). The cost and benefit of each countermeasure is carefully considered. Thus, the IA practitioner does not seek to eliminate all risks; but, to manage them in the most 251: 364:
cost to the asset's stakeholders. The sum of the products of the threats' impact and the probability of their occurring is the total risk to the information asset.
1612: 437:
Additionally, Business Risk Management also occurs to comply with federal and international laws regarding the release and security of information such as
438: 591: 89:, resilience, appropriate architecture, system safety, and security, which increases the utility of information to only their authorized users. 1415:"Disaster Experience and Hospital Information Systems: An Examination of Perceived Information Assurance, Risk, Resilience, and HIS Usefulness" 1607: 1630: 281:, etc. The goal of high availability is to preserve access to information. Availability of information can be bolstered by the use of 525: 465: 1625: 1143:
Yan, Aibin; Hu, Yuanjie; Cui, Jie; Chen, Zhili; Huang, Zhengfeng; Ni, Tianming; Girard, Patrick; Wen, Xiaoqing (2020-06-01).
86: 1568: 1636: 515: 247: 1454:"Information Assurance and Corporate Strategy: A Delphi Study of Choices, Challenges, and Developments for the Future" 983: 894: 849: 1192:"NATO Intelligence and Information Sharing: Improving NATO Strategy for Stabilization and Reconstruction Operations" 1145:"Information Assurance Through Redundant Design: A Novel TNU Error-Resilient Latch for Harsh Radiation Environment" 403: 833:
Foundations of Intrusion Tolerant Systems, 2003 [Organically Assured and Survivable Information Systems]
1500: 355:
The information assurance process typically begins with the enumeration and classification of the information
485: 1368:"Semantic information assurance for secure distributed knowledge management: a business process perspective" 117: 26:) is the practice of assuring information and managing risks related to the use, processing, storage, and 1661: 55: 124:
as they relate to information systems. Further, IA is an interdisciplinary field requiring expertise in
458: 303: 93: 42:
of user data. IA encompasses both digital protections and physical techniques. These methods apply to
580: 565: 520: 505: 391: 1231:
Chen, Chin-Ling; Chiang, Mao-Lun; Hsieh, Hui-Ching; Liu, Ching-Cheng; Deng, Yong-Yuan (2020-05-08).
331: 311: 190: 1453: 1233:"A Lightweight Mutual Authentication with Wearable Device in Location-Based Mobile Edge Computing" 1516: 1284: 1049: 510: 1283:
Such, Jose M.; Gouglidis, Antonios; Knowles, William; Misra, Gaurav; Rashid, Awais (July 2016).
830:
Luenam, P.; Peng Liu (2003). "The design of an adaptive intrusion tolerant database system".
585: 109: 530: 395: 368: 230: 149: 101: 51: 8: 399: 182: 145: 1528: 1481: 1395: 1348: 1260: 1172: 1125: 964: 900: 875:"Incentive-based modeling and inference of attacker intent, objectives, and strategies" 855: 812: 141: 783:
Chakraborty, Rajarshi; Ramireddy, Srilakshmi; Raghu, T.S.; Rao, H.Raghav (July 2010).
1520: 1473: 1434: 1387: 1340: 1264: 1252: 1213: 1176: 1164: 1117: 1109: 1030: 956: 890: 845: 804: 729: 679: 637: 575: 570: 550: 494: 356: 290: 121: 27: 1532: 1485: 1399: 1352: 968: 859: 1583: 1512: 1465: 1430: 1426: 1379: 1332: 1296: 1244: 1203: 1156: 1129: 1101: 1061: 1020: 948: 904: 882: 837: 816: 796: 763: 721: 671: 264: 137: 1469: 1208: 1191: 1065: 433: 360: 322: 226: 222: 194: 82: 43: 39: 35: 1620: 1414: 1232: 1372:
IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans
1367: 1320: 1300: 1248: 1089: 831: 768: 751: 709: 659: 411: 327: 218: 186: 31: 1383: 1105: 879:
Proceedings of the 10th ACM conference on Computer and communications security
841: 1655: 1524: 1477: 1438: 1391: 1344: 1256: 1217: 1168: 1144: 1113: 1034: 1025: 1008: 960: 808: 733: 683: 641: 535: 387: 70: 1587: 1160: 725: 675: 1121: 874: 307: 286: 282: 210: 47: 936: 886: 784: 952: 800: 153: 1554:
Stephenson (2010). "Authentication: A pillar of information assurance".
1499:
Ezingeard, Jean-Noël; McFadzean, Elspeth; Birchall, David (March 2005).
1452:
McFadzean, Elspeth; Ezingeard, Jean-Noël; Birchall, David (2011-04-08).
1336: 1190:
Hanna, Michael; Granzow, David; Bolte, Bjorn; Alvarado, Andrew (2017).
367:
With the risk assessment complete, the IA practitioner then develops a
129: 545: 374:
A framework published by a standards organization, such as NIST RMF,
214: 1050:"IS practitioners' views on core concepts of information integrity" 540: 335: 125: 78: 626:"HOW TO INCREASE THE INFORMATION ASSURANCE IN THE INFORMATION AGE" 560: 383: 375: 234: 105: 30:
of information. Information assurance includes protection of the
1285:"Information assurance techniques: Perceived cost effectiveness" 984:"Information Assurance Benefits and Challenges: An Introduction" 785:"The Information Assurance Practices of Cloud Computing Vendors" 66: 16:
Multi-disciplinary methods for decision support systems security
1615:
Risk management and accreditation of information systems (2005)
479: 250:
such as a person's name, address telephone number, access to a
185:
for the processing and storage of data through techniques like
166: 113: 347:
other pillars: integrity, authentication and confidentiality.
499: 422: 407: 379: 133: 97: 1007:
San Nicolas-Rocca, Tonia; Burkhard, Richard J (2019-06-17).
782: 330:
while that data is in transit, usually through the use of a
172: 1649:
Information assurance has also evolved due to social media
555: 278: 1498: 1451: 421:
There are two meta-techniques with information assurance:
359:
to be protected. Next, the IA practitioner will perform a
1282: 1189: 1090:"Information assurance in biomedical informatics systems" 1006: 752:"Information assurance in a distributed forensic cluster" 1088:
Schou, C.D.; Frost, J.; Maconachy, W.V. (January 2004).
452: 1413:
Park, Insu; Sharman, Raj; Rao, H. Raghav (2015-02-02).
1319:
Johnson, M. E.; Goetz, E.; Pfleeger, S. L. (May 2009).
1054:
International Journal of Accounting Information Systems
165:
feedback loop practices were employed while developing
1642: 937:"Conflicts Among the Pillars of Information Assurance" 209:
Information assurance is built between five pillars:
54:(i.e. umbrella term), and as the business outcome of 1318: 982:
Sadiku, Matthew; Alam, Shumon; Musa, Sarhan (2017).
625: 475: 459:
IT risk § Standards Organizations and Standards
406:(CERT) or computer security incident response team ( 73:: one of the common information assurance schematics 1087: 881:. New York, New York, USA: ACM Press. p. 179. 660:"Information assurance in the twenty-first century" 326:of data. Non-repudiation involves the reduction to 1230: 592:Hawaii International Conference on System Sciences 1094:IEEE Engineering in Medicine and Biology Magazine 46:, both physical and electronic forms, as well as 1653: 1626:Information Assurance XML Schema Markup Language 1412: 1321:"Security through Information Risk Management" 981: 829: 749: 750:Pringle, Nick; Burgess, Mikhaila (May 2014). 1142: 1501:"A Model of Information Assurance Benefits" 428: 246:mainly breaking down into three main ways, 1553: 1365: 341: 1207: 1024: 767: 657: 526:Information Assurance Vulnerability Alert 466:Information Assurance Collaboration Group 181:of information assurance is implementing 50:. IA is best thought of as a superset of 1569:"The Evolution of Information Assurance" 1566: 1517:10.1201/1078/45099.22.2.20050301/87274.3 710:"The evolution of information assurance" 707: 254:, or known information, like passwords. 171: 65: 872: 630:Journal of Defense Resources Management 1654: 1047: 934: 1314: 1312: 1310: 1278: 1276: 1274: 1083: 1081: 1079: 1077: 1075: 623: 453:Standards organizations and standards 1013:Information Technology and Libraries 930: 928: 926: 924: 922: 920: 918: 916: 914: 745: 743: 703: 701: 699: 697: 695: 693: 653: 651: 619: 617: 615: 613: 394:may include technical tools such as 92:Besides defending against malicious 1366:Singh, R.; Salam, A.F. (May 2006). 1009:"Information Security in Libraries" 516:Factor Analysis of Information Risk 248:personally identifiable information 169:military decision support systems. 156:, in addition to computer science. 13: 1307: 1271: 1196:Connections: The Quarterly Journal 1072: 1048:Boritz, J. Efrim (December 2005). 317: 296: 14: 1673: 1596: 911: 740: 690: 648: 610: 240: 1645:Archive of Information Assurance 1643:Archive of Information Assurance 1601: 1237:Wireless Personal Communications 478: 404:computer emergency response team 1492: 1445: 1406: 1359: 1224: 1183: 1136: 1041: 1000: 873:Liu, Peng; Zang, Wanyu (2003). 271: 1505:Information Systems Management 1458:Information Systems Management 1149:IEEE Transactions on Computers 975: 935:Wilson, Kelce S. (July 2013). 866: 823: 776: 708:Cummings, R. (December 2002). 588:for cyber security investments 34:, availability, authenticity, 1: 598: 486:Business and economics portal 201:and equal exchange of ideas. 100:), IA practitioners consider 1470:10.1080/10580530.2011.562127 1209:10.11610/connections.16.4.01 1066:10.1016/j.accinf.2005.07.001 658:McConnell, M. (April 2002). 289:, off site capabilities and 257: 159: 7: 624:Sosin, Artur (2018-04-01). 471: 108:, regulatory and standards 61: 56:information risk management 10: 1678: 1613:HMG INFOSEC STANDARD NO. 2 1431:10.25300/misq/2015/39.2.03 1301:10.1016/j.cose.2016.03.009 1249:10.1007/s11277-020-07240-2 769:10.1016/j.diin.2014.03.005 456: 350: 231:pillars of Cyber Security. 204: 176:OODA Feedback Loop Diagram 1384:10.1109/TSMCA.2006.871792 1106:10.1109/MEMB.2004.1297181 842:10.1109/fits.2003.1264925 566:Risk management framework 521:Fair information practice 506:Countermeasure (computer) 390:, may guide development. 1567:Cummings, Roger (2002). 1289:Computers & Security 1026:10.6017/ital.v38i2.10973 836:. IEEE. pp. 14–21. 434:Business Risk Management 429:Business Risk Management 332:man-in-the-middle attack 1588:10.1109/MC.2002.1106181 1161:10.1109/tc.2020.2966200 726:10.1109/MC.2002.1106181 676:10.1109/MC.2002.1012425 511:Decision support system 342:Interactions of Pillars 310:regulations to ensure 177: 74: 1633:Information Assurance 1631:DoD Directive 8500.01 1325:IEEE Security Privacy 887:10.1145/948109.948135 756:Digital Investigation 425:and risk assessment. 175: 69: 20:Information assurance 953:10.1109/mitp.2012.24 801:10.1109/mitp.2010.44 670:(4): supl16–supl19. 531:Information security 369:risk management plan 304:information labeling 150:security engineering 102:corporate governance 52:information security 1639:DoD IA Policy Chart 1637:DoD IA Policy Chart 1337:10.1109/MSP.2009.77 400:anti-virus software 183:distributed systems 146:systems engineering 132:, user experience, 118:business continuity 1662:IT risk management 178: 142:management science 75: 586:Gordon–Loeb model 571:Security controls 551:Mission assurance 495:Asset (computing) 291:continuous signal 122:disaster recovery 71:The McCumber Cube 1669: 1591: 1573: 1563: 1537: 1536: 1496: 1490: 1489: 1449: 1443: 1442: 1410: 1404: 1403: 1363: 1357: 1356: 1316: 1305: 1304: 1280: 1269: 1268: 1228: 1222: 1221: 1211: 1187: 1181: 1180: 1140: 1134: 1133: 1085: 1070: 1069: 1045: 1039: 1038: 1028: 1004: 998: 997: 995: 994: 979: 973: 972: 932: 909: 908: 870: 864: 863: 827: 821: 820: 780: 774: 773: 771: 747: 738: 737: 705: 688: 687: 655: 646: 645: 621: 488: 483: 482: 314:of information. 265:degrees-of-trust 138:forensic science 96:and code (e.g., 87:trust management 1677: 1676: 1672: 1671: 1670: 1668: 1667: 1666: 1652: 1651: 1604: 1599: 1594: 1571: 1541: 1540: 1497: 1493: 1450: 1446: 1411: 1407: 1364: 1360: 1317: 1308: 1281: 1272: 1229: 1225: 1188: 1184: 1141: 1137: 1086: 1073: 1046: 1042: 1005: 1001: 992: 990: 980: 976: 941:IT Professional 933: 912: 897: 871: 867: 852: 828: 824: 789:IT Professional 781: 777: 748: 741: 706: 691: 656: 649: 622: 611: 601: 596: 484: 477: 474: 461: 455: 431: 418:effectiveness. 392:Countermeasures 361:risk assessment 353: 344: 320: 318:Non-repudiation 299: 297:Confidentiality 274: 260: 243: 223:confidentiality 207: 195:cloud computing 162: 104:issues such as 83:risk management 64: 44:data in transit 40:confidentiality 36:non-repudiation 17: 12: 11: 5: 1675: 1665: 1664: 1647: 1646: 1640: 1634: 1628: 1623: 1618: 1617: 1616: 1603: 1600: 1598: 1597:External links 1595: 1593: 1592: 1564: 1551: 1547: 1546: 1545: 1539: 1538: 1491: 1464:(2): 102–129. 1444: 1425:(2): 317–344. 1405: 1378:(3): 472–486. 1358: 1306: 1270: 1243:(1): 575–598. 1223: 1182: 1155:(6): 789–799. 1135: 1100:(1): 110–118. 1071: 1060:(4): 260–279. 1040: 999: 974: 910: 895: 865: 850: 822: 775: 739: 689: 647: 608: 607: 606: 605: 600: 597: 595: 594: 589: 583: 578: 573: 568: 563: 558: 553: 548: 543: 538: 533: 528: 523: 518: 513: 508: 503: 497: 491: 490: 489: 473: 470: 457:Main article: 454: 451: 430: 427: 412:cost-effective 352: 349: 343: 340: 328:data integrity 323:Nonrepudiation 319: 316: 298: 295: 273: 270: 259: 256: 242: 241:Authentication 239: 227:nonrepudiation 219:authentication 206: 203: 161: 158: 63: 60: 15: 9: 6: 4: 3: 2: 1674: 1663: 1660: 1659: 1657: 1650: 1644: 1641: 1638: 1635: 1632: 1629: 1627: 1624: 1622: 1621:IA References 1619: 1614: 1611: 1610: 1609: 1608:UK Government 1606: 1605: 1602:Documentation 1589: 1585: 1582:(12): 65–72. 1581: 1577: 1570: 1565: 1561: 1557: 1552: 1549: 1548: 1543: 1542: 1534: 1530: 1526: 1522: 1518: 1514: 1510: 1506: 1502: 1495: 1487: 1483: 1479: 1475: 1471: 1467: 1463: 1459: 1455: 1448: 1440: 1436: 1432: 1428: 1424: 1420: 1419:MIS Quarterly 1416: 1409: 1401: 1397: 1393: 1389: 1385: 1381: 1377: 1373: 1369: 1362: 1354: 1350: 1346: 1342: 1338: 1334: 1330: 1326: 1322: 1315: 1313: 1311: 1302: 1298: 1294: 1290: 1286: 1279: 1277: 1275: 1266: 1262: 1258: 1254: 1250: 1246: 1242: 1238: 1234: 1227: 1219: 1215: 1210: 1205: 1201: 1197: 1193: 1186: 1178: 1174: 1170: 1166: 1162: 1158: 1154: 1150: 1146: 1139: 1131: 1127: 1123: 1119: 1115: 1111: 1107: 1103: 1099: 1095: 1091: 1084: 1082: 1080: 1078: 1076: 1067: 1063: 1059: 1055: 1051: 1044: 1036: 1032: 1027: 1022: 1018: 1014: 1010: 1003: 989: 985: 978: 970: 966: 962: 958: 954: 950: 946: 942: 938: 931: 929: 927: 925: 923: 921: 919: 917: 915: 906: 902: 898: 896:1-58113-738-9 892: 888: 884: 880: 876: 869: 861: 857: 853: 851:0-7695-2057-X 847: 843: 839: 835: 834: 826: 818: 814: 810: 806: 802: 798: 794: 790: 786: 779: 770: 765: 761: 757: 753: 746: 744: 735: 731: 727: 723: 720:(12): 65–72. 719: 715: 711: 704: 702: 700: 698: 696: 694: 685: 681: 677: 673: 669: 665: 661: 654: 652: 643: 639: 635: 631: 627: 620: 618: 616: 614: 609: 603: 602: 593: 590: 587: 584: 582: 581:Vulnerability 579: 577: 574: 572: 569: 567: 564: 562: 559: 557: 554: 552: 549: 547: 544: 542: 539: 537: 536:ISO/IEC 27001 534: 532: 529: 527: 524: 522: 519: 517: 514: 512: 509: 507: 504: 501: 498: 496: 493: 492: 487: 481: 476: 469: 467: 460: 450: 446: 442: 440: 435: 426: 424: 419: 415: 413: 409: 405: 401: 397: 393: 389: 388:ISO/IEC 27002 385: 381: 377: 372: 370: 365: 362: 358: 348: 339: 337: 333: 329: 324: 315: 313: 312:nondisclosure 309: 305: 294: 292: 288: 287:data channels 284: 280: 269: 266: 255: 253: 249: 238: 236: 232: 228: 224: 220: 216: 212: 202: 198: 196: 192: 188: 184: 174: 170: 168: 157: 155: 151: 147: 143: 139: 136:examination, 135: 131: 127: 123: 119: 115: 111: 107: 103: 99: 95: 90: 88: 84: 80: 72: 68: 59: 57: 53: 49: 45: 41: 37: 33: 29: 25: 21: 1648: 1579: 1575: 1559: 1555: 1544:Bibliography 1511:(2): 20–29. 1508: 1504: 1494: 1461: 1457: 1447: 1422: 1418: 1408: 1375: 1371: 1361: 1331:(3): 45–52. 1328: 1324: 1292: 1288: 1240: 1236: 1226: 1199: 1195: 1185: 1152: 1148: 1138: 1097: 1093: 1057: 1053: 1043: 1019:(2): 58–71. 1016: 1012: 1002: 991:. Retrieved 987: 977: 947:(4): 44–49. 944: 940: 878: 868: 832: 825: 795:(4): 29–37. 792: 788: 778: 759: 755: 717: 713: 667: 663: 636:(1): 45–57. 633: 629: 462: 447: 443: 432: 420: 416: 373: 366: 354: 345: 321: 308:need-to-know 300: 283:backup power 275: 272:Availability 261: 244: 211:availability 208: 199: 179: 163: 91: 76: 48:data at rest 28:transmission 23: 19: 18: 1556:SC Magazine 1295:: 117–133. 1202:(4): 5–34. 762:: S36–S44. 502:(benchmark) 193:plus using 154:criminology 993:2020-11-28 599:References 130:accounting 110:compliance 1525:1058-0530 1478:1058-0530 1439:0276-7783 1392:1083-4427 1345:1558-4046 1265:218934756 1257:0929-6212 1218:1812-1098 1177:214408357 1169:0018-9340 1114:0739-5175 1035:2163-5226 988:procon.bg 961:1520-9202 809:1520-9202 734:0018-9162 684:0018-9162 642:2068-9403 546:ISO 17799 396:firewalls 258:Integrity 252:key token 215:integrity 160:Evolution 79:strategic 32:integrity 1656:Category 1576:Computer 1562:(1): 55. 1533:31840083 1486:11624922 1400:10191333 1353:30062820 1122:15154266 969:27170966 860:14058057 714:Computer 664:Computer 541:ISO 9001 472:See also 336:phishing 285:, spare 126:business 114:auditing 62:Overview 1130:7746947 905:3897784 817:8059538 561:Risk IT 384:PCI DSS 376:Risk IT 351:Process 235:privacy 205:Pillars 106:privacy 98:viruses 94:hackers 1531:  1523:  1484:  1476:  1437:  1398:  1390:  1351:  1343:  1263:  1255:  1216:  1175:  1167:  1128:  1120:  1112:  1033:  967:  959:  903:  893:  858:  848:  815:  807:  732:  682:  640:  576:Threat 357:assets 167:WWMCCS 152:, and 120:, and 1572:(PDF) 1529:S2CID 1482:S2CID 1396:S2CID 1349:S2CID 1261:S2CID 1173:S2CID 1126:S2CID 965:S2CID 901:S2CID 856:S2CID 813:S2CID 604:Notes 500:COBIT 439:HIPAA 423:audit 414:way. 408:CSIRT 380:CobiT 134:fraud 1521:ISSN 1474:ISSN 1435:ISSN 1388:ISSN 1341:ISSN 1253:ISSN 1214:ISSN 1165:ISSN 1118:PMID 1110:ISSN 1031:ISSN 957:ISSN 891:ISBN 846:ISBN 805:ISSN 730:ISSN 680:ISSN 638:ISSN 556:Risk 398:and 306:and 279:DDOS 225:and 189:and 187:SANs 38:and 1584:doi 1513:doi 1466:doi 1427:doi 1380:doi 1333:doi 1297:doi 1245:doi 1241:113 1204:doi 1157:doi 1102:doi 1062:doi 1021:doi 949:doi 883:doi 838:doi 797:doi 764:doi 722:doi 672:doi 386:or 334:or 191:NAS 1658:: 1580:35 1578:. 1574:. 1560:21 1558:. 1527:. 1519:. 1509:22 1507:. 1503:. 1480:. 1472:. 1462:28 1460:. 1456:. 1433:. 1423:39 1421:. 1417:. 1394:. 1386:. 1376:36 1374:. 1370:. 1347:. 1339:. 1327:. 1323:. 1309:^ 1293:60 1291:. 1287:. 1273:^ 1259:. 1251:. 1239:. 1235:. 1212:. 1200:16 1198:. 1194:. 1171:. 1163:. 1153:69 1151:. 1147:. 1124:. 1116:. 1108:. 1098:23 1096:. 1092:. 1074:^ 1056:. 1052:. 1029:. 1017:38 1015:. 1011:. 986:. 963:. 955:. 945:15 943:. 939:. 913:^ 899:. 889:. 877:. 854:. 844:. 811:. 803:. 793:12 791:. 787:. 760:11 758:. 754:. 742:^ 728:. 718:35 716:. 712:. 692:^ 678:. 668:35 666:. 662:. 650:^ 632:. 628:. 612:^ 468:. 441:. 382:, 378:, 338:. 293:. 237:. 221:, 217:, 213:, 197:. 148:, 144:, 140:, 128:, 116:, 112:, 85:, 58:. 24:IA 1590:. 1586:: 1535:. 1515:: 1488:. 1468:: 1441:. 1429:: 1402:. 1382:: 1355:. 1335:: 1329:7 1303:. 1299:: 1267:. 1247:: 1220:. 1206:: 1179:. 1159:: 1132:. 1104:: 1068:. 1064:: 1058:6 1037:. 1023:: 996:. 971:. 951:: 907:. 885:: 862:. 840:: 819:. 799:: 772:. 766:: 736:. 724:: 686:. 674:: 644:. 634:9 22:(

Index

transmission
integrity
non-repudiation
confidentiality
data in transit
data at rest
information security
information risk management

The McCumber Cube
strategic
risk management
trust management
hackers
viruses
corporate governance
privacy
compliance
auditing
business continuity
disaster recovery
business
accounting
fraud
forensic science
management science
systems engineering
security engineering
criminology
WWMCCS

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.