skip to main |
skip to sidebar
The IA model is a tool that shows the working dynamics of how an Information Assurance program should be approached. It encapsulates the different security functions that any organization should posses. The left face of the cube shows the Information States. This represents the states in which the information is in, either sending, storing, or processing. These states show the different times the data may be vulnerable. The top layer of the cube model contains the different Security Services that should be executed in order to have an effective IA program. They include; availability (the process of making the information prompt and reliably accessible to users), Integrity (data, hardware, and security mechanism integrity), Authentication (the right users accessing the right data), Confidentiality (the assumption that personal and sensitive data, financial, medical, ect, is kept safe), and Non Repudiation (the confirmation that the involved parties [sender, receiver] of data transmission account for their transaction of information). Lastly, the right face of the cube model displays Security Countermeasures that should be in place in an efficient IA program. These countermeasures include; training and education of people (employees or parties involved), policies and procedures in place, and technology such as surveillance, communications, hardware and software.
Google Group: http://groups.google.com/group/itec5321fall09/web/Outside_Reading_Assignment_01_IA_Model.doc?hl=en