Define Core principles of Information Assurance?, computer science homework help

User Generated

fnfv123

Computer Science

Description

Briefly define and describe the core principles of information assurance (IA). Be sure to utilize multiple sources in order to gain a broad spectrum of how the IA experts describe these principles. Then, using the principles of IA you just described, detail how you would use them to secure a brand new server used by commercial airlines at a busy international airport. The server is used to store and verify passenger information who are flying into and out of the airport. The paper must following the formatting guidelines in The Publication Manual of the American Psychological Association (2010), (6th ed., 7th printing), and contain a title page, five scholarly references, three to five pages of content, and a reference page.

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

Running head: INFORMATION ASSURANCE

1

Information Assurance
Institution Affiliation:
Date:

INFORMATION ASSURANCE

2

Information Assurance principles include availability. This demands that the information
resources should be made ready for use. The computer system should hold information in a
secure way. Information securely held should be available for the end user whenever it is
required and in the state it is needed. Confidentiality is the second principle in the IA. This
focuses on disclosing information securely held to the people with the authority to see and no
other people. Confidentiality of the information protects the data access and manipulation.
In the situation where information is accessed by unauthorized people, information
security breach is considered to take place. Basically, the public should not have general access
to the information. Information should be available to the people with the right privileges to
access and modify according to the set constraints by the system. Authentication checks the
access of the files and the information in the system to make sure that the person accessing them
is allowed and that they have the right permission to do so. This ensures that the login details
used to access the system are real (Whitman, 2016). Information privacy is the principle that
focuses on the protection of the user in...


Anonymous
Excellent! Definitely coming back for more study materials.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags