0% found this document useful (0 votes)
40 views3 pages

Information Assurance and Security 2

The document discusses five reasons for investing in information security: 1) rising cost of breaches, 2) increasingly sophisticated attackers, 3) proliferation of IoT devices, 4) funded hackers and widely available hacking tools, and 5) regulatory compliances. It also describes several information security jobs and their average salaries, including computer network architect, information security analyst, computer and information systems managers, software developer.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
40 views3 pages

Information Assurance and Security 2

The document discusses five reasons for investing in information security: 1) rising cost of breaches, 2) increasingly sophisticated attackers, 3) proliferation of IoT devices, 4) funded hackers and widely available hacking tools, and 5) regulatory compliances. It also describes several information security jobs and their average salaries, including computer network architect, information security analyst, computer and information systems managers, software developer.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 3

INFORMATION ASSURANCE AND SECURITY 2

By: Daryll Justine Acosta

“AWAN MAIBATI AMIN TAYO MAKAPASA”

Prelims 1&2
Third reason why investing in information security is significant
Proliferation of iot devices
First reason why investing in information security is significant
Rising cost of breaches
What jobs in information security is this
Salary: $104,000

m
Responsibilities: Create an in-office network for a small

er as
business or a cloud infrastructure for a business with corporate

co
eH w
locations in cities on opposite coasts.

o.
Computer Network Architects
rs e
Fourth reason why investing in information security is
ou urc
significant
Funded hackers and wide availability of hacking tools
o

Second reason why investing in information security is


aC s

significant
v i y re

Increasingly sophisticated attackers


Disruptions in their day to day business: time is money
ed d

False
ar stu

Feeling confident about their organization’s security level:


when information security community members participated in
the cybersecurity trends report,they were asked how positive
sh is

they felt about their security stance


Th

True
What jobs in information security is this?
Salary: $95,510
Responsibilities: Information security analysts monitor their
companies’ computer networks to combat hackers and compile
reports of security breaches.
Information Security Analyst
What jobs in information security is this?

This study source was downloaded by 100000815899376 from CourseHero.com on 11-16-2021 03:55:27 GMT -06:00

https://www.coursehero.com/file/87900951/INFORMATION-ASSURANCE-AND-SECURITY-2docx/
Salary: $139,000
Responsibilities: Information systems managers work toward
ensuring a company’s tech is capable of meeting their IT goals.
Computer and Information Systems Managers
What jobs in information security is this?
Salary: $103,560
Responsibilities: Software developers can be tasked with a wide
range of responsibilities that may include designing parts of
computer programs and applications and designing how those
pieces work together.
Software Developer
Fifth reason why investing in information security is significant
Regulatory compliances

m
er as
The need for skilled workers and allocation of funds for

co
security within their budget: companies are making the effort

eH w
to allocate more funds in their budgets for security.

o.
True
rs e
ou urc
PRELIMS
The Infrastructure Access Layer describes the notion that acce
o
aC s

ss to infrastructure components has to be constrained to business


v i y re

ought-to-know. For instance, access to servers.


As regards to physical data, its means of protection are
somewhat similar – access to the area where the information is
ed d

kept may be granted only with the proper badge or any different
ar stu

form of authorization, it can be physically locked in a safe or a


file cabinet, there could be access controls, cameras, security,
sh is

etc.
Th

The Application Access Layer describes the notion that access


to end-user applications have to be constrained to business
ought-to-know
Encryption consists of changing the data located in files into
unreadable bits of characters unless a key to decode the file is
provided
The Data In Motion Layer describes the notion that data ought
to be secured while in motion.

This study source was downloaded by 100000815899376 from CourseHero.com on 11-16-2021 03:55:27 GMT -06:00

https://www.coursehero.com/file/87900951/INFORMATION-ASSURANCE-AND-SECURITY-2docx/
A principle which is a core requirement of information security
for the safe utilization, flow, and storage of information is
the CIA triad.
The establishment of the Enigma rotor machine and the
subsequent emergence of electronics and computing enabled the
usage of much more elaborate schemes and
allowed confidentiality to be protected much more effectively.
To continue, confidentiality can be
easily breached so each employee in an organization or
company should be aware of his responsibilities in
maintaining confidentiality of the information delegated to him
for the exercise of his duties.
CIA stands for confidentiality, integrity, and availability and

m
er as
these are the three main objectives of information security.

co
Тhe concept of layers illustrates that data communications and

eH w
computer network protocols are designated to function in a

o.
rs e
layered manner, transferring the data from one layer to the next.
ou urc
The aim of confidentiality is to ensure that information is
hidden from people unauthorized to access it
The Physical Access Layer describes the notion that the
o
aC s

physical access to any system, server, computer, data center, or


v i y re

another physical object storing confidential information has to


be constrained to business ought-to-know.
The confidentiality principle dictates that information should
ed d

solely be viewed by people with appropriate and correct


ar stu

privileges.
sh is
Th

This study source was downloaded by 100000815899376 from CourseHero.com on 11-16-2021 03:55:27 GMT -06:00

https://www.coursehero.com/file/87900951/INFORMATION-ASSURANCE-AND-SECURITY-2docx/
Powered by TCPDF (www.tcpdf.org)

You might also like