Preview

Introduction to Information Assurance Plan

Good Essays
Open Document
Open Document
532 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Introduction to Information Assurance Plan
We live and conduct business in an active asymmetric threat environment. An individual, business or organization must adapt and protect its vital information assets and critical digital infrastructure. Failure to do so is reckless and may be considered as an obvious lack of due diligence for people who have fiduciary and custodial responsibilities.

Any event that causes damage to information resources, whether it is a computer virus, natural disaster or system failure could be devastating to an individual (i.e. identity theft), company, its customers, suppliers and shareholders. Failing to do so may threaten the survival of the company itself.

An information system security breach could result in serious financial losses, the disclosure of protected private information, loss of research and development data or fines by regulatory agencies. Losses due to intrusions into an information system could negatively affect the general public (i.e. power failures). This might result in costly class action lawsuits that could exceed an organization's ability to pay and result in its dissolution. Even an individual might be sued for negligence and be financially ruined.

So how should an organization or person protect its valuable digital processing infrastructure? A business should establish and implement a comprehensive information assurance plan. Individuals should at least address the components of a professional information assurance plan. Doing so is evidence that the infrastructure owners are attempting to practice due diligence.

An information assurance plan for an organization should be formalized and approved in the organization's policies and have the following components: Confidentiality, Integrity, Availability, Accountability and Non-Repudiation.

Let's briefly examine each:

A. Confidentiality refers to restricting access to data, information or to any component of the digital processing infrastructure unless there is a "Need" for an individual to

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Swanson, M. (2006, February). Guide for Developing Security Plans for Federal Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    Classify at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    BIS Week 3 Assignment

    • 446 Words
    • 2 Pages

    Data breaches and cyber-attacks frequently has dramatically increased in recent years, with the advancement of technology and the prevalence of more “cloud” storage and remote access servers. In Mr. Horton’s article, he remarks on the high cost a data breach can have on both finances and company’s reputation. (Horton, 2014) Citing the Ponemon Institute’s 2013 Cost of Data Breach Study, Horton goes on to state that “data breaches can cost an average organization more than $5 million per incident. (Ponemon Institute, 2013)…

    • 446 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    unit 242

    • 658 Words
    • 3 Pages

    Threats to the system and information security can be things such as accidentally deleting a file and unauthorised access which may lead to theft of private details. Hackers and viruses also prove a huge threat to a system.…

    • 658 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    There will always be some kind of the potential risks to the information maintained by any business or person because new vulnerabilities are found every day. Just recently, on August 7, 2012, a wired magazine reporter’s information stored on his Google account, Twitter account, MacBook, iPad, and iPhone where erased without the user wanting this done. A hacker that goes by the name of Phobia comprised the reporters Amazon account with a security exploit.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Security Awareness Policy

    • 1733 Words
    • 3 Pages

    with IS security policies by signing a compliance agreement that is retained in their personnel…

    • 1733 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    IS 4560 Week 1

    • 309 Words
    • 2 Pages

    Data breaches that could lead to identity theft, by sector - the danger of data breaches are of particular importance for organizations that store and manage large amounts of personal information. Not only can compromises that result in the loss of personal data undermine customer and institutional confidence, result in costly damage to an organization’s reputation, and result in identity theft that may be costly for individuals to recover from, they can also be financially debilitating to organizations.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Data Breach Research Paper

    • 4412 Words
    • 18 Pages

    Numerous data breaches and computer intrusions have been disclosed by the nation’s largest data brokers, retailers, educational institutions, government agencies, health care entities, financial institutions, and Internet businesses. A data breach may occur when there is a loss or theft of, or other unauthorized access to, data containing sensitive personal information that results in the potential compromise of the confidentiality or integrity of data. Sensitive personal information generally includes an individual’s name, address, or telephone number, in conjunction with the individual’s Social Security number, driver’s license number, account number, credit or debit card number, or a personal identification number or password. Breach notification laws enacted by many states require the disclosure of security breaches involving sensitive personal information (Stevens, 2008).…

    • 4412 Words
    • 18 Pages
    Powerful Essays
  • Satisfactory Essays

    Include the strengths and weaknesses of contemporary methodologies and technologies designed to protect information systems and data as part of your plan’s justification.…

    • 283 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Risk Assessment

    • 1788 Words
    • 8 Pages

    Almost every company in business is face with some risk or potential threat that could cause a huge blow to their organization operations. These risks and threats usually comes from within or outside and organization. In order to prepare for the worst that could happen, organizations must focus their attention on how to assess different types of risk so they could protect themselves from the harm caused by them. Risks involve theoretical effectiveness of security measures, loss of impact, threats and vulnerabilities that are common in today's society.…

    • 1788 Words
    • 8 Pages
    Powerful Essays