Objectives:

 

1. Comparative study of Information Assurance and Information Security and establishing the Information Assurance baseline

Course Learning Outcomes:

 

1. Student will be able to understand Information Assurance and Information Security systems and its importance to the business and Establish Information Assurance Baseline

Tools or Equipment Needed:

 

1.      PC

2.      Internet explorer or chrome

3.      Internet

 

Theoretical Background:

 

Information Assurance concerns itself with implementing measures focused at protection and safeguarding of critical information and relevant information systems by assuring the integrity, availability, authentication, confidentiality and non-repudiation. The measures also provides for restoring information systems after an attack by putting in place proper protection, detection and reaction abilities.

Information assurance (IA) is the practice of assuring information and managing risks related to the use, processing, storage, and transmission of information or data and the systems and processes used for those purposes. Information assurance includes protection of the integrity, availability, authenticity, and confidentiality of user data.[1] It uses physical, technical, and administrative controls to accomplish these tasks. While focused predominantly on information in digital form, the full range of IA encompasses not only digital, but also analog or physical form. These protections apply to , both physical and electronic forms, as well as data at rest in various types of physical and electronic storage facilities. Information assurance as a field has grown from the practice of information security


Lab Exercise 1: You are working for a multi-national bank. As an Information Security analyst your task is to develop an Information Assurance Baseline for the bank

1.      INTRODUCTION

Highlight the vision and mission of your organization

 

2.  Controls

2.1  Control Classifications Types of controls their purpose and classification

2.2  Control Types Administrative, Technical and procedural

 

3.  MANAGEMENT CONTROLS

3.1  Information Security Policy – Importance to Security

3.2  Information Security Infrastructure Example SOC.

 

4.        OPERATIONAL CONTROLS/TECHNICAL CONTROLS

4.1 List of Technical controls


What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."


“Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!”