Information Security 1 Flashcards
5 Pillars of Information Assurance
- Integrity
- Availability
- Confidentiality
- Authentication
- Non repudiation
role of information assurance
to protect and defend information and information systems
integrity
assurance that information is not tampered with
authentication
assuring those who have access in information, are they say who they are
availability
timely, reliable access to data for authorized users
confidentiality
assurance that information is not disclosed to unauthorized persons
non repudiation
someonewith access to your organizations
information system cannot deny having
completed an action within the system, as
there should be methods in place to prove
that they did make said action.
2011-2016 National Security
It is to ensure the permanent inviolability of our national territory and its effective control by the Government and the State.
Republic Act No. 8792
- recognizes use of electronic commercial and non-commercial transactions and electronic signature
- legal recognition to electronic data messages, electronic documents and electronic signatures
REPUBLIC ACT NO. 9995
protects the victims who are made to believe that they are performing sexual acts in private
Republic Act No. 10173
aims to protect personal data in information and communications systems both in the government and the private sector
REPUBLIC ACT NO. 9775
“Child” refers to a person below eighteen (18) years of age or over but is unable to fully take care of, or protect, himself/herself from abuse, neglect, cruelty, exploitation or discrimination because of a physical or mental disability or condition.
Republic Act No. 10175
completely address crimes committed against and by means of computer system
- prevents negligence
- the development and implementation of
policies and procedures to aid in performing the ongoing maintenance necessary to keep an information assurance process operating properly to protect assets and peoplefrom threats.
due care
due care
development and implementation of policies and procedures to did in performing the ongoing maintenance necessary to keep information assurance process operating properly to protect assets and people from threats
due diligence
is the reasonable investigation, research, and understanding of the risks an organization faces
before committing to a particular course of action. The organization should do its homework and ensure
ongoing monitoring.
Implications from lack of AI
- penalties from legal authorities
- loss of information assets
- customer loss
- loss of image and reputation
- operational losses and operational risk management
information assurance fundamental expectations and common beliefs
- be a business enabler
- protect interconnecting element of an organization’s systems
- be cost effective and cost benefitial
- establish responsibility and accountability
- require robust method
- be assessed periodically
- be restricted by social obligations
includes all information an organization may process, store, transmit, or disseminate regardless of media. Thus, information on paper, on a hard drive, in the mind of an employee, or in the cloud is considered to be “in scope.”
Information assurance
INFORMATION ASSURANCE AND SECURITY
PARTNER AGENCIES
- DOST ICT Office
- National Security Agency (NSA)
- National Bureau of Investigation (NBI) -Cybercime
Division - Philippine National Police
- DOJ Office of Cybercrime
- Data Privacy Commission
Memorandum Order No. 37, s. 2001
PROVIDING FOR THE FOURTEEN PILLARS OF POLICY AND ACTION OF THE GOVERNMENT AGAINST TERRORISM