
The administration and protection of knowledge, information, and data is known as information assurance and security. It combines two fields: information assurance, which focuses on ensuring the availability, integrity, authentication, confidentiality, and non-repudiation of information and systems, and information security, which focuses on ensuring the availability, integrity, authentication, confidentiality, and non-repudiation of information and systems.
** Components Information Security Assurance?**


Differentiate the certification programs to Common body language?
** Differentiate the Governance and Risk management?**

The whole set of rules, policies, and standards that guide a firm is known as governance, or corporate governance. Risk management, often known as enterprise risk management, is the process of recognizing potential company risks and taking steps to mitigate or eliminate their financial impact.
** Different between Security Architecture to Design?**

A security system's security architecture is the set of resources and components that enable it to function. The approaches and procedures that place those hardware and software parts to promote security are referred to as security design. Handshakes and authentication are examples of network security design elements.
**
Different between Business Continuity Planning to D-i-s-a-s-t-e-r Recovery Planning?**

Disaster recovery focuses on recovering data access and IT infrastructure after a disaster, whereas business continuity focuses on keeping businesses running during a disaster. Meanwhile, a disaster recovery strategy ensures that an organization may resume normal operations following a crisis.
What is Physical Security Control?

Physical control refers to the application of security measures inside a defined structure to dissuade or prohibit unwanted access to sensitive information. Closed-circuit surveillance cameras are one example of physical controls. Alarm systems based on motion or temperature. Security personnel.

Operations security (OPSEC) is a process that identifies critical information to determine if friendly actions can be observed by enemy intelligence, determines if information obtained by adversaries could be interpreted to be useful to them, and then executes selected measures that eliminate or reduce adversary exploitation of friendly critical information.
What is Law?
The law is legislation created and enforced through social or governmental institutions to regulate behavior, with its precise definition a matter of longstanding debate. It has been variously described as a science and the art of justice.
** What is Investigation?**
Criminal investigation is an applied science that involves the study of facts that are then used to inform criminal trials. A complete criminal investigation can include searching, interviews, interrogations, evidence collection and preservation, and various methods of investigation.
** What is Ethics?**
Ethics or moral philosophy is a branch of philosophy that "involves systematizing, defending, and recommending concepts of right and wrong behavior". The field of ethics, along with aesthetics, concerns matters of value; these fields comprise the branch of philosophy called axiology
** What is Information Security?**
Information Security, sometimes shortened to InfoSec, is the practice of protecting information by mitigating information risks. It is part of information risk management.