Information assurance

From Citizendium - Reading time: 2 min

This article may be deleted soon.
To oppose or discuss a nomination, please go to CZ:Proposed for deletion and follow the instructions.

For the monthly nomination lists, see
Category:Articles for deletion.


This article is a stub and thus not approved.
Main Article
Discussion
Related Articles  [?]
Bibliography  [?]
External Links  [?]
Citable Version  [?]
 
This editable Main Article is under development and subject to a disclaimer.

Information assurance, or sometimes information security, is a broad term that includes both communications security and computer security, along with the appropriate administrative infrastructure for personnel and physical security. Information assurance is meaningless without a security policy defining threats, management approach to protection, staff responsibilities, and actions to be taken against attacks and failures.

Access and audit[edit]

Among the most fundamental foundations of information security is to establish policies, and, where appropriate, detailed rules, for the allowed uses of resources, by users authorized and whose authorizations are authenticated, to resources whose integrity also may need to be autheticated. In principle, all user-resource interactions need to be logged and available for audit.

Computer security[edit]

See also: Computer security

Properly, computer security deals with the policies, procedures and technologies used to protect end computer systems, rather than the networks interconnecting to them, although the two are often grouped together. Complicating the definition is that many components of networks, such as routers and firewalls, are themselves computers and need stringent computer security practices.

Communications security[edit]

See also: Internet Protocol security architectureā€ˇ

Also called telecommunications security, this subject addresses both non-computer and computer security, although the boundaries are blurring. A World War II radio would have to connect to an external encryption device, while modern radios, such as the Joint Tactical Radio System, are apt to be computer-controlled and have integrated encryption.

References[edit]


Licensed under CC BY-SA 3.0 | Source: https://citizendium.org/wiki/Information_assurance
16 views | Status: cached on October 28 2024 20:49:40
↧ Download this article as ZWI file
Encyclosphere.org EncycloReader is supported by the EncyclosphereKSF