Information Assurance

نویسنده

  • Peng Liu
چکیده

As society increasingly relies on digitally stored and accessed information, applications have increasingly higher requirements on supporting the availability, integrity, and confidentiality of this information. However, as the quantity and severity of cyber vulnerabilities and attacks continuously increase, traditional information security technologies are increasingly limited in satisfying the security requirements of applications due to their inability to survive successful attacks. As a result, Information Assurance (IA) technologies are introduced to not only prevent information from being disclosed, modified or destroyed, but also detect intrusions and operate through attacks in such a way that a certain level of information security can be ensured in the presence of attacks. In this article, we survey the natural evolution of information assurance technologies. Three generations of IA technologies are summarized, namely the technologies to prevent intrusions, the technologies to detect intrusions, and the technologies to operate through attacks, and the newest generation of IA technologies are discussed in detail. In particular, we survey intrusion masking technologies and defensein-depth technologies in the context of survivable information storage systems, intrusion masking distributed computing, attack resistant certification authority, survivable network systems, and survivable of database systems.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Building a Rigorous Foundation for Assurance into Information Assurance Education

Syracuse University is one of thirty-six National Security Agency designated Centers of Academic Excellence in Information Assurance Education. Our IA program was developed within the Center for Systems Assurance (CSA), whose mission is to promote improvement in systems and information assurance through research, education, and technology trans-

متن کامل

A Reference Model of Information Assurance & Security

Information Assurance & Security (IAS) is a dynamic domain which changes continuously in response to the evolution of society, business needs and technology. This paper proposes a Reference Model of Information Assurance & Security (RMIAS), which endeavours to address the recent trends in the IAS evolution, namely diversification and deperimetrisation. The model incorporates four dimensions: In...

متن کامل

Information Assurance and Security

Information assurance contains all the elements of information security (confidentiality) but also includes elements of availability, and integrity. Information assurance provides a view of information protection that includes defensive measures in all three states — processing, storage, and transmission. To defend information and data there are three fundamental countermeasure categories: 1. t...

متن کامل

Information Assurance in Saudi Organizations - An Empirical Study

This paper presents selective results of a survey conducted to find out the much needed insight into the status of information security in Saudi Arabian organizations. The purpose of this research is to give the state of information assurance in the Kingdom and to better understand the prevalent ground realities. The survey covered technical aspects of information security, risk management and ...

متن کامل

Information fusion in continuous assurance

We extend continuous assurance research by proposing a novel continuous assurance architecture grounded in information fusion research. Existing continuous assurance architectures focus primarily on methods of monitoring assurance clients’ systems to detect anomalous activities and have not addressed the question of how to process the detected anomalies. Consequently, actual implementations of ...

متن کامل

On Information Assurance in Nanoscale Networks

−An intersection of two worlds, emerging nanotechnologies and network/communication theory, is poised to change the nature of information assurance. New communication paradigms will be derived from the transition from microto nano-scale devices. The related degrees of freedom and constraints associated with these new technologies will change our notions about efficient networks, system design a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2004