INFORMATION SECURITY ASSURANCE

Good day every one , and welcome to my blog, so this blog we will talking about security Assurance.

So first what is an information security Assurance> Quote

cyberpic.png
Information assurance is the management and protection on knowledge , information and data. It combines two information assurance which fucus on ensuring the availability , integrity , authentication, confidential and non repudiation of information and system.

Components of information security Assurance?

Untitled-Diagram22.png

  • Computer hardware - this is the physical technology that works with information.
  • Computer softwar - The hardware needs to know what to do
  • Telecommunication- Connects the hardware together to form a network. Connections can be through wire ,such as Ethernet cables or fiber optics or trough wifi.
  • Data base and Data warehouse -data base is a place where data is collected and form, and Data warehouse contains all of the data in whatever that an organization needs.
  • Human resources and procedures -The most important component of information systems, is the people, because need to run the system and procedures, they follow the knowledge in the huge database and databa warehouse can be turn into learning that can interpret what has happened in the past and guide the future action.

Differentiate the Governance and Risk management?

9781849803953.jpg

  • Governance is the overall system of rule's , practices and standards that guide a business. Risk or enterprise risk management is the process of identifying protential hazards to the business and acting to reduce their financial impact.

Different between security architecture to design?

Security-Architecture-2.jpg

  • security architecture is the term used to define the overall system required to protect and organization, infrastructure, also consider as a address the connection between the components of structure.

SRM-JeffSpivey-header-image.jpg

  • Is an approach automatic to a cyber security , that enables an organization to automatic data security controls and formalize the design of it's infrastructure so it can build security into IT management.

Different between business continuity planning to a disaster recovery planning?

image030.gif

  • Business continuity is more on business or they are focused on keeping business operational during a disaster, while disaster recovery focused on restoring data access and IT information after a disaster.

What is physical security control?

physical-security-monitoring-n.jpg

  • Physical security is to protection of personal hardware , software and data , to protect the assets in the company . Their safety is the first priority.

What is operation security?

cyberpic.png

  • Is a security and risk management process that prevent sensitive information from getting into wrong hands.

What is law?
Law is the discipline and profession concerned with the customs, practices, and rules of conduct of a community that are recognize as binding by the community.

What is Investigation?

info-security-infosec-630x420.png

  • the action of investigating something or someone , formal or systematic examination or research to find out something.

What is Ethic?

ethics-in-leadership-1210x642.jpg

  • Is a branch of philosophy that > involves systematizing> Quote defending and recommending concepts of right and wrong behavior.

What is information security?

  • Is a set of cyber security , strategies that prevents unauthorized access to organization assets such as computer, network and data , it maintains the integrity and confidential of sensitive information, blocking the access of sohisticated hakers.