Information Assurance (IA): definition & explanation (2024)

What is Information Assurance (IA)?

Information Assurance (IA)is the practice of managing information-related risks and the steps involved to protect information systems such as computer and network systems.

The US Government's definition of information assurance is:

“measures that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation. These measures include providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.”

The 5 pillars of Information Assurance

Information Assurance (IA) is essentially protecting information systems, and isoften associated with the following five pillars:

  1. Integrity
  2. Availability
  3. Authentication
  4. Confidentiality
  5. Nonrepudiation

The five pillars of information assurance can be applied various ways, depending on the sensitivity of your organization’s information or information systems. Currently, these five pillars are used at the heart of the US Government’s ability to conduct safe and secure operations in a global environment.

Free PDF download: NIST CSF and ISO 27001 – Becoming cyber secure

Information Assurance (IA): definition & explanation (1)

The NIST Cybersecurity Framework is a framework that organizations can use to manage and reduce their cybersecurity risks. ISO 27001 sets out the requirements for a best-practice ISMS (information security management system).

Both frameworks are closely aligned, making ISO 27001 an excellent way to comply with the NIST CSF. Learn how they can benefit your organization in our free paper.

Download now

1. Integrity

Integrity involves assurance that all information systems are protected and not tampered with. IA aims tomaintain integrity throughanti-virus software onall computer systemsand ensuring all staff with access know how to appropriately use their systems to minimize malware, or viruses entering information systems.

IT Governance provides a varietyofE-learning coursesto improve staff awareness on topics such as phishing and ransomware to reduce the likelihood of systems being breached;and data being exposed.

2. Availability

Availability means those who need access to information, are allowed to access it. Information should be available to only those who are aware of the risks associated with information systems.

3. Authentication

Authentication involves ensuring those who have access to informationare who they say they are. Ways of improving authentication include methods such as two-factor authentication, strong passwords, biometrics, and other devices. Authentication may also be used to itentify not only users, but also other devices.

4. Confidentiality

IA involves the confidentiality of information, meaning only those with authorization may view certain data. This step is closely mirroredby the six data processing principles of the General Data Protection Regulation (GDPR), whereby personaldata must be processed in a secure manner"using appropriate technical and oganizational measures" ("integrity and confidentiality").

5. Nonrepudiation

The final pillar means someone with access to your organization’s information system cannot deny having completed an action within the system, as there should be methodsin place to prove that they did make said action.

Information Assurance (IA): definition & explanation (2024)
Top Articles
Your guide to tipping in Thailand. How does it work?
7 Financial Facts All Christians Should Know | Lifeway
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Jerrold Considine

Last Updated:

Views: 5909

Rating: 4.8 / 5 (58 voted)

Reviews: 89% of readers found this page helpful

Author information

Name: Jerrold Considine

Birthday: 1993-11-03

Address: Suite 447 3463 Marybelle Circles, New Marlin, AL 20765

Phone: +5816749283868

Job: Sales Executive

Hobby: Air sports, Sand art, Electronics, LARPing, Baseball, Book restoration, Puzzles

Introduction: My name is Jerrold Considine, I am a combative, cheerful, encouraging, happy, enthusiastic, funny, kind person who loves writing and wants to share my knowledge and understanding with you.