Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Theoretical Background: Information Assurance concerns itself with implementing measures focused at protection and safeguarding of critical information and relevant information systems by assuring the integrity,

Theoretical Background:

Information Assurance concerns itself with implementing measures focused at protection and safeguarding of critical information and relevant information systems by assuring the integrity, availability, authentication, confidentiality and non-repudiation. The measures also provides for restoring information systems after an attack by putting in place proper protection, detection and reaction abilities.

Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or data and the systems and processes used for those purposes. Information assurance includes protection of the integrity, availability, authenticity, non-repudiation and confidentiality of user data.[1] It uses physical, technical, and administrative controls to accomplish these tasks. While focused predominantly on information in digital form, the full range of IA encompasses not only digital, but also analog or physical form. These protections apply to data in transit, both physical and electronic forms, as well as data at rest in various types of physical and electronic storage facilities. Information assurance as a field has grown from the practice of information security

Lab Exercise 1: You are working for a multi-national bank. As an Information Security analyst your task is to develop an Information Assurance Baseline for the bank

  1. INTRODUCTION

Highlight the vision and mission of your organization

2. Controls

2.1 Control Classifications Types of controls their purpose and classification

2.2 Control Types Administrative, Technical and procedural

3. MANAGEMENT CONTROLS

3.1 Information Security Policy Importance to Security

3.2 Information Security Infrastructure Example SOC.

  1. OPERATIONAL CONTROLS/TECHNICAL CONTROLS

4.1 List of Technical controls

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

GAO Financial Audit Manual Volume 1 Updated April 2020

Authors: United States Government GAO

2020 Edition

B091PR8396, 979-8733135977

More Books

Students also viewed these Accounting questions

Question

5. Describe how contexts affect listening

Answered: 1 week ago