Information assurance (IA)

An important discipline now emerging within the burgeoning field of information technology, information assurance (IA) covers ways to protect data by devising complex computer security systems that minimize the risk of compromising the integrity of information stored within digital resources while still maintaining accessibility. Information assurance centers on the creation and application of cutting-edge systems theory to protect and monitor the vast interconnected networks of information that process, store, retrieve, and transmit data. Information assurance seeks to devise, organize, and codify strategies for preserving the integrity, availability, and security of these sprawling reserves of often sensitive information being gathered virtually every minute by global computer systems, including business conglomerates, schools and universities, medical facilities, banking and financial institutions, and international government agencies. This emerging branch of information technology (IT) focuses specifically on ways to counter the growing and ever-more sophisticated threats posed by a variety of attack modes or at the very least to manage the numerous lethal risks posed against digital storage reservoirs, including hacking, viruses, terrorist threats, identity theft operations, phishing attacks, and highly destructive worms.

90558358-88997.jpg

Overview

The need for information assurance is actually simple: those who gather data want that data protected. Typically the process of information assurance involves four steps. The IA technician invited to examine the system first assesses what information within the system needs to be protected and specifically what the risks are to that data bank of information, that is, who or what might be interested in breeching the network’s already in-place moat-systems. The IA technician must then assess the probability of such a breech, the potential risk horizon of an external or even internal attack to this sensitive data and, as a preemptive response paradigm, the long-term impact should such data be exposed to catastrophic intrusion. Should the IA technician find significant data at significant risk, the technician would then assess the weakest elements within the existing defense system and propose a specific grid-wide plan for guarding the data reserves against violation.

In broadest terms, this risk assessment seeks to protect the integrity, availability, authenticity, and confidentiality of a data system. Guaranteeing the integrity of the information system involves making sure that stored information has not been and cannot be tampered with, altered, or redacted, that information initially entered remains the information stored. IA technicians in turn work to preserve data availability, guaranteeing that the protected data is accessible, freely and effectively, to those cleared for access. To guarantee authenticity, IA technicians design software programs able to determine that users attempting to interact with the database are in fact who they claim to be by creating sophisticated password programs, biometric identification systems, and even encrypted user name codes. Information assurance, ultimately, must provide the system a protection net sufficiently secure that any unauthorized breech of that security system would be unable to be repudiated, that is, any trespass into the system would leave an indelible digital trace that could not be explained any other way save that the perpetrator meant to violate illegally the integrity of the system.

Bibliography

Bejtlich, Richard. The Tao of Network Security Monitoring: Beyond Intrusion Protection. Boston: Addison, 2004. Print.

Gibson, Darril. Managing Risk in Information Systems. Sudbury: Jones, 2010. Print.

Kouns, Jake, and Daniel Minoli. Information Technology: Risk Management in Enterprise Environments. Hoboken: Wiley, 2011. Print.

Layton, Timothy. Information Security: Design, Implementation, Measurement, and Compliance. New York: Auerbach, 2012. Print.

Qian, Y., David Tipper, Prashant Krishnamurthy, and James Joshi. Information Assurance: Dependability and Security in Networked Systems. Burlington: Kaufman, 2010. Print.

Willett, Keith D. Information Assurance Architecture. New York: Auerbach, 2012. Print.