short paper

User Generated

Wlbguvfev

Computer Science

Information Assurance Integrat

Wilmington University

Description

Short Paper Week1

Briefly define and describe the core principles of information assurance (IA). Be sure to utilize multiple sources in order to gain a broad spectrum of how the IA experts describe these principles. Then, using the principles of IA you just described, detail how you would use them to secure a brand new server used by commercial airlines at a busy international airport. The server is used to store and verify passenger information who are flying into and out of the airport.

The paper must following the formatting guidelines in The Publication Manual of the American Psychological Association (2010), (6th ed., 7th printing), and contain a title page, five scholarly references, three to five pages of content, and a reference page. In addition, the paper will be submitted through the SafeAssign originality-checking tool. More APA assistance can be found at the Purdue University Online Writing Lab.

The rubric for this assignment can be viewed when clicking on the above assignment link, which you will use to submit your assignment.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Outline
Introduction
Body
Conclusion
References


Running head: PRINCIPLES OF INFORMATION ASSURANCE

Principles of Information Assurance
Student’s Name
Course Number- Name of Course
Instructor’s Name
Date

PRINCIPLES OF INFORMATION ASSURANCE

2

Principles of Information Assurance
Introduction
Information assurance involves ensuring the right information is received by the right
people and also takes into account the time the information is received. Information assurance
deals with ensuring that the transmission, usage, and storage of data and information is protected
and managed. Information assurance also includes protecting platforms that hold the data and
information from any possible risks especially those that are common in the information
technology world (Whitman and Mattord, 2011). These risks may include social engineering,
viruses, personification, worms and spoofing attacks. Information assurance has five core
principles which are availability, non-repudiation, integrity, authenticity, and confidentiality.
Information assurance maintains that data and its platforms maintain these principles.
Integrity
This refers to making sure that the original form of the information is maintained so that
the meaning of the information remains as the creators intended it to be. It also means that any
modification of the data is done with authorization. The goals of integrity are to ensure
unauthorized users do not modify any data or software programs; authorized users use their
authority for the right purposes and data is consistent both internally and externally (Qian,
Ti...


Anonymous
Awesome! Perfect study aid.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags