1 / 12

What is Information Assurance Model in Cyber Security

Information Assurance refers to the practice of ensuring the confidentiality, integrity, availability, and non-repudiation of important information and information systems.<br><br>https://www.infosectrain.com/courses/red-team-certification-online-training/<br>

Download Presentation

What is Information Assurance Model in Cyber Security

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. What is Information Assurance Model in Cyber Security www.infosectrain.com | sales@infosectrain.com

  2. What is Information Assurance? Information Assurance refers to the practice of ensuring the confidentiality, integrity, availability, and non-repudiation of important information and information systems. It's a long-term strategy that prioritizes policy implementation over infrastructure development. Information Assurance Model in Cyber Security The information assurance security model is a multi-dimensional model which is based on four dimensions: www.infosectrain.com | sales@infosectrain.com

  3. www.infosectrain.com | sales@infosectrain.com

  4. 1. Information States • Information states are defined as the interpretation of data, which exists in three states: stored, processed, and transmitted. • Storage: It specifies the amount of time that data is saved on a device such as a hard drive. • Processing:It specifies the amount of time when data is being processed. • Transmission: It specifies the period when data is transferred between two parties. • 2. Security Services • Security services are the assurance model's fundamental component that delivers system security and includes the following services:  Confidentiality, Integrity, Availability, Authentication, and Non-repudiation. • Confidentiality: Confidentiality ensures that unauthorized parties do not access system information, and only those who are permitted can read and interpret it. Confidentiality protection prevents malicious access and unintended information leakage. • Integrity: It ensures that personal information is reliable and accurate and that it can't be formed, altered, or deleted without authorization. www.infosectrain.com | sales@infosectrain.com

  5. ●       Availability:It ensures that only authorized users have consistent and reliable access to sensitive data. It entails taking steps to maintain data access in the face of system problems and other sources of intervention. ●       Authentication:It is a protective measure that establishes the authenticity of message transmission by verifying an individual's identity in order to collect a specific type of information. ●       Non-repudiation:It is a method of ensuring that neither the sender nor the receiver can deny their participation in data transmission. When a communicator sends data to a recipient, the recipient receives a delivery verification. When a recipient receives a message, it contains all of the information about the sender. 3.Security Countermeasures This dimension includes features and functionality that protect the system from immediate vulnerability by considering technology, policy, practice, and people. ●       Technology:To protect the system from vulnerabilities and threats, appropriate firewalls, routers, and intrusion detection must be used. ●       Policy and Practice: Every firm has policies that establish norms that everyone who works there must follow. If a system is breached, these policies must be followed to handle sensitive data. www.infosectrain.com | sales@infosectrain.com

  6. ●   People:The human being is at the center of the information system. Users and administrators of information systems must adhere to policies and procedures to create effective systems. They must be trained about the information system regularly and be prepared to act effectively to protect it. 4.Time This component can be interpreted in a variety of ways. Data may be available offline or online at any time, and information and systems may be in turmoil, posing a risk of unauthorized access. As a result, to limit the risk of security breaches, every component of the Information Assurance model must be thoroughly specified and executed at every level of the System Development Cycle. Cyber Security with InfosecTrain InfosecTrainis well-known training company that offers information security training courses. Join us for a great experience with our industry experts to gain a solid understanding of cybersecurity concepts. www.infosectrain.com | sales@infosectrain.com

  7. About InfosecTrain • Established in 2016, we are one of the finest Security and Technology Training and Consulting company • Wide range of professional training programs, certifications & consulting services in the IT and Cyber Security domain • High-quality technical services, certifications or customized training programs curated with professionals of over 15 years of combined experience in the domain www.infosectrain.com | sales@infosectrain.com

  8. Our Endorsements www.infosectrain.com | sales@infosectrain.com

  9. Why InfosecTrain Global Learning Partners Access to the recorded sessions Certified and Experienced Instructors Flexible modes of Training Post training completion Tailor Made Training www.infosectrain.com | sales@infosectrain.com

  10. Our Trusted Clients www.infosectrain.com | sales@infosectrain.com

  11. Contact us Get your workforce reskilled by our certified and experienced instructors! IND: 1800-843-7890 (Toll Free) / US: +1 657-722-11127 / UK : +44 7451 208413 sales@infosectrain.com www.infosectrain.com

More Related