Thursday, May 2, 2019
Protecting Intellectual Property Rights With Information Assurance Research Paper
Protecting Intellectual Property Rights With Information Assurance - Research piece of music ExampleThus, development assurance was given birth as a response to the threat of hacking and thievery vital development, especially data from particular high-profile government or institution. The definitions and practices pertaining to information assurance, on the other hand, be multifaceted and multifarious. Like the complicated Web and its laws, if there ar any, the information assurance is an intricate expanse of human knowledge. This paper discusses the numerous and various definitions of the concept called information assurance (hereinafter IA). It also examines the security function prominent in the information assurance. Of Definitions There are numerous definitions or categorization to the concept of information assurance. Most of these definitions are defined or categorized by various U.S. government institutions such as the U.S. Air Force, the National Defense University, the Pentagon, among other institutions. The U.S. Air Force, for one, categorizes the term information assurance as a representation of measures to protect friendly information systems by preserving the availability, integrity, and confidentiality of the systems and the information contained within the systems (as cited in Curts & Campbell, 2002, pp. 1-2). What is peculiar in this definition of IA is the description of the information systems as something friendly. ... (The emphasis of Curts and Campbells IA is on the protection through preservation.) On the one hand, the Pentagons Office of the Secretary of Defense categorizes IA in this fashion Informational assurance is the component of information operations that assures the Department of Defenses operational ardor by providing for the continuous availability and dependability of information systems and networks (as cited in Curts & Campbell, 2002, p. 2). Here, the definition of the phrase information assurance centers on, as t he phrase implies, the assurance of readiness via the provision of availability and reliability of information systems or networks. In contrast to the U.S. Air Forces, the Pentagon views IA as an assurance -- not as a protection of authenticity -- for availability and reliability of the systems and/or networks. Further, Pentagons concept of information assurance is contextualized -- that is, the praxis of IA largely belongs to certain operational activities or transactions by its Department of Defense. The National Defense University (NDU), on the other hand, describes IA as information operations (IO) that protect and fulfil information systems by ensuring their integrity, authentication, confidentiality, and non-repudiation (as cited in Curts & Campbell, 2002, p. 2). Like the Pentagons IA, NDUs information assurance is synonymous or attri entirelyed to the information operations. This similarity is grounded on the fact that both institutions, by nature of their office or function , are military in orientation. But unlike the Pentagons, IA as outlined by the National Defense University is perceived in terms of protecting and defending the systems or networks through ensuring or ascertaining not only their CIA but
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.