Network Design Assignment
Network Design Assignment
Network Design Assignment
Information Assurance (IA) is the study of how to protect your information assets from destruction,
degradation, manipulation and exploitation. But also, how to recover should any of those happen.
Physical security-refers to the protection of hardware, software, and data against physical
threats to reduce or prevent disruptions to operations and services and loss of assets.
IT security- is the inherent technical features and functions that collectively contribute to an IT
infrastructure achieving and sustaining confidentiality.
Components of IA
Availability
Availability means that users can access the data stored in their networks or use services that are
featured within those networks
Integrity
Upholding an information system’s integrity involves keeping its network intact and uncompromised;
thus, the primary goal of this pillar is to set up safeguards that deter threats. For example, viruses and
Confidentiality
Keeping sensitive data private using safeguards like data encryption is an extremely important
Authentication
IA professionals use authentication methods to verify a user’s identity before allowing them to access
data. Common authentication methods include a username and password combination, and biometric
logins, such as fingerprint scanning recognition.
Vulnerabilities in the information assets are determined in order to enumerate the threats capable
of exploiting the assets.
Consider the probability and impact of a threat exploiting vulnerability in an asset, with impact
usually measured in terms of cost to the asset's stakeholders.
The sum of the products of the threats' impact and the probability of their occurring is the total
risk to the information asset.
With the risk assessment complete, the IA practitioner then develops a risk management plan. A risk
management plan proposes countermeasures.
It focuses on finding more effective ways to safeguard and maintain control over important
information.
Facilitates ongoing risk assessment as security threats are always evolving and finding new ways
to exploit vulnerabilities.
Risk assessments can give your organization a better understanding of potential security
vulnerabilities in your information system.
Without Information Assurance measures in place, it will be difficult for your organization to be
confident in the integrity of your information.