IAS Reviewer
IAS Reviewer
Information
- Information is organized or classified data, which has some meaningful values for the receiver.
- Information is the processed data on which decisions and actions are based.
Assurance
Security
Information Assurance
Information Security
- A plan of action or policy designed to protect information systems (such as computer and
network systems) or certain data throughout application usage, storage, processing, and
transmission.
Proactive
Reactive
Comprehensive
- An organization’s information assurance strategy and resulting policies and programs should
cover topics, areas, and domains needed for modern organizations. Each topic, domain, and
area within a policy should contain sufficient breadth and detail to support strategic, tactical,
and operational implementation.
Independent
- An organization’s information assurance strategy must be consistent with existing laws and
regulations applicable to but not limited to information assurance, human resources, health
care, finance, disclosure, internal control, and privacy within the organizational context.
Organizations should refer to existing legal frameworks and regulations in their information
assurance strategies so leaders understand how to fulfill the regulatory requirements of their
industry or environment.
Living Document
- Organizations should develop a flexible information assurance strategy. The strategy should be
applicable to a broad spectrum of organization functions independent of size and should
consider varied objectives and infrastructure complexity. Organizations should adopt and adapt
their tactical and operational plans to reflect identified organizational information assurance
requirements and risk profiles. The suggested controls provided throughout this work can serve
as guidance.
Risk-Based Approach
- In a risk-based approach, organizations identify their profiles and prioritize them. Since each
organization has a unique risk profile, it must select controls appropriate to its risk tolerance. An
organization’s information assurance strategy must be broad enough to give guidance to sub-
components with diverse risk profiles. This is analogous to risk portfolio approaches in finance.
Risk tolerance and profiles are explained later in this work.
Organizationally Significant
1. Information States
a. Transmission
b. Storage
c. Processing
2. Security Countermeasures
a. Technology
c. People
3. Security Services
a. Availability
b. Integrity
c. Authentication
d. Confidentiality
e. Nonrepudiation
1. Information States
- Information is referred to as the interpretation of data which can be found in three states:
transmitted, stored, or processed.
1.1. Transmission
Example:
- In transit over networks when the user sends an email to the reader, including memory and
storage encountered during delivery.
1.2. Storage
- It defines the time during which data is saved on a medium such as a hard drive.
Example:
1.3. Processing
Example:
2. Security Countermeasures
- This dimension has functionalities to save the system from immediate vulnerability by
accounting for technology, policy & practice, and people.
2.1. Technology
- Appropriate technology such as firewalls, routers, and intrusion detection must be used to
defend the system from vulnerabilities, and threats. The technology used must facilitate quick
response whenever information security gets compromised.
- Every organization has some set of rules defined in form of policies that must be followed by
every individual working in the organization. These policies must be practiced to properly handle
sensitive information whenever the system gets compromised.
2.3. People
- People are the heart of the information system. Administrators and users of information
systems must follow policies and practice for designing a good system. They must be informed
regularly regarding information systems and ready to act appropriately to safeguard the system.
3. Security Services
- It is the fundamental pillar of the model which provides security to the system and consists of
five services namely availability, integrity, confidentiality, authentication, and non-repudiation.
3.1. Availability
- It guarantees reliable and constant access to sensitive data only by authorized users. It involves
measures to sustain access to data despite system failures and sources of interference. To
ensure availability, corrupted data must be eliminated, recovery time must be sped up and
physical infrastructure must be improved.
Example:
3.2. Integrity
- It ensures that sensitive data is accurate and trustworthy and cannot be created, changed, or
deleted without proper authorization. Maintaining integrity involves the modification or
destruction of information by authorized access. To ensure integrity backups should be planned
and implemented to restore any affected data in case of a security breach. Besides this
cryptographic, a checksum can also be used for the verification of data.
Example:
- Implementation of measures to verify that e-mail content was not modified in transit. This can
be achieved by using cryptography which will ensure that the intended user receives correct and
accurate information.
3.3. Authentication
- It is a security service that is designed to establish the validity of the transmission of a message
by verifying of individual’s identity to receive a specific category of information. To ensure the
availability of various single factors and multi-factor authentication methods are used. A single-
factor authentication method uses a single parameter to verify a user’s identity whereas two-
factor authentication uses multiple factors to verify a user’s identity.
Example:
3.4. Confidentiality
- It assures that information of the system is not disclosed to unauthorized access and is read and
interpreted only by persons authorized to do so. Protection of confidentiality prevents malicious
access and accidental disclosure of information. Information that is considered to be
confidential is called sensitive information.
Example:
- Protecting email content to read by only desired set of users. This can be insured by data
encryption. Two-factor authentication, strong passwords, security tokens, and biometric
verification are some popular norms for authentication users to access sensitive
data/information.
3.5. Nonrepudiation
- It is a mechanism to ensure sender or receiver cannot deny the fact that they are part of data
transmission. When a sender sends data to the receiver, it receives delivery confirmation. When
the receiver receives a message, it has all information attached to the message regarding the
sender.
Example:
- A common example is sending an SMS from one mobile phone to another. After the message is
received confirmation message is displayed that the receiver has received the message. In
return, the message received by the receiver contains all information about the sender.
4. Time
- This dimension can be viewed in many ways. At any given time, data may be available offline or
online, and information and system might be in flux, thus, introducing the risk of unauthorized
access. Therefore, in every phase the of System Development Cycle, every aspect of the
Information Assurance model must be well-defined and well-implemented to minimize the risk
of unauthorized access.
Information Assurance and Subdomains
Information Assurance
- Information assurance is the overall approach for identifying, understanding and managing risk
through an organization’s use of information and information systems. As noted in the MSR
model, information assurance is concerned with the life cycle of information in an organization
through the objectives of maintaining the following services or attributes:
Confidentiality
Integrity
Availability
Nonrepudiation
Authentication
- Information assurance includes all information an organization may process, store, transmit, or
disseminate regardless of media. Thus, information on paper, on a hard drive, in the mind of an
employee, or the cloud is considered to be “in scope.”
Information Security
Information Protection
- It is often defined in terms of protecting the confidentiality and integrity of information through
a variety of means such as policy, standards, physical controls, technical controls, monitoring,
and information classification or categorization.
- Like information security, information protection includes all information an organization may
process, store, transmit, or disseminate regardless of media. Thus, information on paper, on a
hard drive, in the mind of an employee, or the cloud is considered in scope.
- Some laws, regulations, and rules specifically cite information protection as a requirement for
sensitive information such as personally identifiable information and personal health
information.
Cybersecurity
- Cybersecurity is a relatively new term that has largely replaced the term computer security.
- Cybersecurity is used to describe the measures taken to protect electronic information systems
against unauthorized access or attack. Cybersecurity is primarily concerned with the same
objectives of information security within the scope of electronic information systems’ CIA.
- Cybersecurity often focuses on the vulnerabilities and threats of an information system at the
tactical level. System scanning, patching, and secure configuration enforcement are common
foci of cybersecurity.