The difference between Information protection and Information Assurance

Asked By 40 points N/A Posted on -
qa-featured

What is information protection? Name some methods used to implement the same in an organization. What should an information protection policy define? What does Information Assurance deal with? Name the techniques used in the Information Assurance method? What forms of data protection is implied this method? What is information Risk Management? 

SHARE
Best Answer by Ion Hathew
Answered By 0 points N/A #200094

The difference between Information protection and Information Assurance

qa-featured

Information protection:

Information protection policy tells the user how we secure our storage and transmission of sensitive information.

Information protection method:

• Unauthorized information release

• Unauthorized information modification

• Unauthorized denial of use

• Functional Levels of Information Protection

• Design Principles

Information assurance:

In Information assurance we secure the information manage risk, process information, store information, and transmission information.

Information Assurance method:

• Application whitelisting

• Control administrative privileges

• Limiting workstation-to-workstation communication

• Antivirus file reputation services

• Anti-Exploitation

Risk management:

“The process involved with identifying, analyzing and responding to risk. It includes maximizing the result of positive risk and minimizing the consequences of negative events”

Best Answer
Best Answer
Answered By 0 points N/A #200093

The difference between Information protection and Information Assurance

qa-featured

Information protection is one of the most important policies for an individual, organization, institution, and etc. It provides assurance to individual or organization and the likes the confidentiality of their disclosure would not be at stake. It is like you signing up at Yahoo so that you could avail its services; you would definitely not want your identity be put in public and at the same time your password be shared publicly. If this does happen, your email would be opened by any third party and may result in unwanted scenarios. Methods are practically inherent with the policy that was undertaken. Protection policy should define classes that would involve in keeping safe the information, how it will be kept, who could access, when it could be available, what are the prerequisites before accessing. Overall, building a Risk Management Committee would entail answering all of the methods and techniques needed to assure that the information is protected.

Related Questions