Information assurance (IA)
Information assurance (IA) is an essential discipline within the field of information technology that focuses on protecting data from various risks and threats while ensuring its accessibility. IA involves the development and implementation of advanced security systems designed to safeguard the integrity, availability, authenticity, and confidentiality of information stored in digital systems. This field addresses the growing complexity of threats such as hacking, viruses, identity theft, and other cyber-attacks that target sensitive information across various sectors, including business, education, healthcare, finance, and government.
Typically, the IA process includes assessing what information needs protection, identifying potential risks, analyzing the likelihood of breaches, and implementing strategies to strengthen the security of data reserves. IA professionals work to ensure that systems remain secure from unauthorized access while allowing legitimate users to access the necessary data seamlessly. The ultimate goal of information assurance is to create a robust defense framework that can not only prevent breaches but also leave a traceable record of any unauthorized access attempts. This proactive approach is vital in today’s digital landscape, where the volume and sensitivity of data continue to grow.
On this Page
Subject Terms
Information assurance (IA)
An important discipline now emerging within the burgeoning field of information technology, information assurance (IA) covers ways to protect data by devising complex computer security systems that minimize the risk of compromising the integrity of information stored within digital resources while still maintaining accessibility. Information assurance centers on the creation and application of cutting-edge systems theory to protect and monitor the vast interconnected networks of information that process, store, retrieve, and transmit data. Information assurance seeks to devise, organize, and codify strategies for preserving the integrity, availability, and security of these sprawling reserves of often sensitive information being gathered virtually every minute by global computer systems, including business conglomerates, schools and universities, medical facilities, banking and financial institutions, and international government agencies. This emerging branch of information technology (IT) focuses specifically on ways to counter the growing and ever-more sophisticated threats posed by a variety of attack modes or at the very least to manage the numerous lethal risks posed against digital storage reservoirs, including hacking, viruses, terrorist threats, identity theft operations, phishing attacks, and highly destructive worms.
![A Reference Model of Information Assurance and Security (RMIAS) By Wikilubina (Own work) [CC-BY-SA-3.0 (http://creativecommons.org/licenses/by-sa/3.0)], via Wikimedia Commons 90558358-88997.jpg](https://imageserver.ebscohost.com/img/embimages/ers/sp/embedded/90558358-88997.jpg?ephost1=dGJyMNHX8kSepq84xNvgOLCmsE2epq5Srqa4SK6WxWXS)
Overview
The need for information assurance is actually simple: those who gather data want that data protected. Typically the process of information assurance involves four steps. The IA technician invited to examine the system first assesses what information within the system needs to be protected and specifically what the risks are to that data bank of information, that is, who or what might be interested in breeching the network’s already in-place moat-systems. The IA technician must then assess the probability of such a breech, the potential risk horizon of an external or even internal attack to this sensitive data and, as a preemptive response paradigm, the long-term impact should such data be exposed to catastrophic intrusion. Should the IA technician find significant data at significant risk, the technician would then assess the weakest elements within the existing defense system and propose a specific grid-wide plan for guarding the data reserves against violation.
In broadest terms, this risk assessment seeks to protect the integrity, availability, authenticity, and confidentiality of a data system. Guaranteeing the integrity of the information system involves making sure that stored information has not been and cannot be tampered with, altered, or redacted, that information initially entered remains the information stored. IA technicians in turn work to preserve data availability, guaranteeing that the protected data is accessible, freely and effectively, to those cleared for access. To guarantee authenticity, IA technicians design software programs able to determine that users attempting to interact with the database are in fact who they claim to be by creating sophisticated password programs, biometric identification systems, and even encrypted user name codes. Information assurance, ultimately, must provide the system a protection net sufficiently secure that any unauthorized breech of that security system would be unable to be repudiated, that is, any trespass into the system would leave an indelible digital trace that could not be explained any other way save that the perpetrator meant to violate illegally the integrity of the system.
Bibliography
Bejtlich, Richard. The Tao of Network Security Monitoring: Beyond Intrusion Protection. Boston: Addison, 2004. Print.
Gibson, Darril. Managing Risk in Information Systems. Sudbury: Jones, 2010. Print.
Kouns, Jake, and Daniel Minoli. Information Technology: Risk Management in Enterprise Environments. Hoboken: Wiley, 2011. Print.
Layton, Timothy. Information Security: Design, Implementation, Measurement, and Compliance. New York: Auerbach, 2012. Print.
Qian, Y., David Tipper, Prashant Krishnamurthy, and James Joshi. Information Assurance: Dependability and Security in Networked Systems. Burlington: Kaufman, 2010. Print.
Willett, Keith D. Information Assurance Architecture. New York: Auerbach, 2012. Print.