Friday, October 18, 2019
Protecting Intellectual Property Rights With Information Assurance Research Paper
Protecting Intellectual Property Rights With Information Assurance - Research Paper Example Thus, information assurance was given birth as a response to the threat of hacking and stealing vital information, especially data from particular high-profile government or institution. The definitions and practices pertaining to information assurance, on the other hand, are multifaceted and multifarious. Like the complicated Web and its laws, if there are any, the information assurance is an intricate field of human knowledge. This paper discusses the numerous and various definitions of the concept called information assurance (hereinafter IA). It also examines the security services prominent in the information assurance. Of Definitions There are numerous definitions or categorization to the concept of ââ¬Å"information assurance.â⬠Most of these definitions are defined or categorized by various U.S. government institutions such as the U.S. Air Force, the National Defense University, the Pentagon, among other institutions. The U.S. Air Force, for one, categorizes the term inf ormation assurance as a representation of ââ¬Å"measures to protect friendly information systems by preserving the availability, integrity, and confidentiality of the systems and the information contained within the systemsâ⬠(as cited in Curts & Campbell, 2002, pp. 1-2). What is peculiar in this definition of IA is the description of the information systems as something friendly. ... (The emphasis of Curts and Campbellââ¬â¢s IA is on the protection through preservation.) On the one hand, the Pentagonââ¬â¢s Office of the Secretary of Defense categorizes IA in this fashion: ââ¬Å"Informational assurance is the component of information operations that assures the Department of Defenseââ¬â¢s operational readiness by providing for the continuous availability and reliability of information systems and networksâ⬠(as cited in Curts & Campbell, 2002, p. 2). Here, the definition of the phrase ââ¬Å"information assuranceâ⬠centers on, as the phrase implies, the assurance of readiness via the provision of availability and reliability of information systems or networks. In contrast to the U.S. Air Forceââ¬â¢s, the Pentagon views IA as an assurance -- not as a protection of authenticity -- for availability and reliability of the systems and/or networks. Further, Pentagonââ¬â¢s concept of information assurance is contextualized -- that is, the praxis of IA largely belongs to certain operational activities or transactions by its Department of Defense. The National Defense University (NDU), on the other hand, describes IA as ââ¬Å"information operations (IO) that protect and defend information systems by ensuring their integrity, authentication, confidentiality, and non-repudiationâ⬠(as cited in Curts & Campbell, 2002, p. 2). Like the Pentagonââ¬â¢s IA, NDUââ¬â¢s information assurance is synonymous or attributed to the information operations. This similarity is grounded on the fact that both institutions, by nature of their office or function, are military in orientation. But unlike the Pentagonââ¬â¢s, IA as outlined by the National Defense University is perceived in terms of protecting and defending the systems or networks through ensuring or ascertaining not only their CIA but
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.