Chapter 5.
0
Information Assurance
Management
DFC20313 Cybersecurity Fundamentals
Prepared By: Fatimah Zahra
Part 2
Upon completion of this course, students should be able
to:
CLO & PLO
CLO1
Explain cybersecurity threats and hazard using
appropriate tools and techniques for secured
environment in organizations.
CLO3 Practice professional codes of ethics to
adapt the real challenges in security
environment.
PLO2 Commit to principles of lifelong learning in
academic and career development.
PLO 11
Commit to professional and ethical
practices in executing instructions related
to the job and organizational functions.
Topic
Content 5.2 5.2 Explain methodology in information
assurance.
5.2.1 Identify The 5 pillars of
information assurance
5.2.2 Describe Plan Do Check Act
(PDCA) model
METHODOLOGY
IN INFORMATION
ASSURANCE
The 5 pillars of information assurance
Setting these pillars is central to developing any information security mechanism in business. There are
five pillars of the IA framework to build a secure system:
The five pillars of information security can be applied in various ways, depending on an enterprise's
sensitivity and information system. They can be used to conduct safe and secure operations.
The 5 pillars of information assurance
Non-Repudiation ensures that the sender is provided with proof of delivery and
Non-repudiation the receiver is provided with proof of sender's identity. This attribute assures the
sender of data is provided with proof of delivery and the recipient is provided with
proof of the sender's sending the message so that neither can deny sending or
receiving data, respectively.
The 5 pillars of information assurance
Confidentiality assures that the unauthorized parties do not have
Confidentiality access to information. The information which is being transmitted
must be encrypted. Only those who are authorized can decrypt
and access this information.
The 5 pillars of information assurance
Integrity assures that the information remains in its original state, meaning the
Integrity system should safeguard data's accuracy and completeness. Integrity ensures that
unauthorized individuals do not tamper with or modify the information.
The 5 pillars of information assurance
Availability ensures that the authorized parties have easy and timely access to the
Availability information system. This pillar ensures the system remains robust and fully
functional even during adverse conditions. It involves protection against threats
that can block access to the information system.
The 5 pillars of information assurance
Authenticity ensures the validity of a transmission or a message or the verification
Authenticity of a party's authorization to receive specific information. It prevents impersonation
and requires confirmation of the identities of the party before giving access to the
information system and resources.
The 5 pillars of information assurance
Non-Repudiation ensures that the sender is provided with proof of delivery and
Non-repudiation the receiver is provided with proof of sender's identity. This attribute assures the
sender of data is provided with proof of delivery and the recipient is provided with
proof of the sender's sending the message so that neither can deny sending or
receiving data, respectively.
Plan Do Check Act (PDCA) model
The PDCA cycle is a project management framework that businesses can use to implement incremental
change. PDCA stands for plan, do, check, and act. This four-step approach is the most widely used
methodology for implementing continuous improvement. That is why the four steps are arranged in a
circle.
The Plan-do-check-act Procedure
1.Plan: Recognize an opportunity and plan a change.
2.Do: Test the change. Carry out a small-scale study.
3.Check: Review the test, analyze the results, and identify
what you’ve learned.
4.Act: Take action based on what you learned in the study
step. If the change did not work, go through the cycle
again with a different plan. If you were successful,
incorporate what you learned from the test into wider
changes. Use what you learned to plan new
improvements, beginning the cycle again.
The end …