What is the provision of information?
most organizations rely on information that is stored and accessible electronically, through any number of information systems and networks. With storage and availability of critical information, electronic means are inherently the risk of how this information is stored and accessible, for whom and for what purposes. Information Assurance (IA) is a term used to define procedures and processes involved in the management of these related risks to effectively alleviate potential damage. There are three commonly used models of information, each building on their predecessors. These models include the CIA Triad, five IA pillars and Parker's Hexad model.
TRIAD CIA is considered to be the first model of information to be defined to define effective procedures for ensuring information security and integrity. Based on the three main components of IA Administration, the TRIAD CIA is aptly named for its emphasis on the confidentiality, integrity and availability of the model. Many organizations, especially militaryCH and civil intelligence agencies in the United States rely on the Triad CIA to ensure both storage and access to sensitive data. While this model serves as a foundation, it lacks some very important attributes for IA management. Subsequently, other models were developed to take into account these dimensions.
Lift, where the CIA Triad model is omitted, the model of five pillars adds several other process dimensions and procedures to ensure information. Among the added dimensions, which are mainly used by the Ministry of Defense in the United States and various other government organizations, are non -valuation and verification. Organizations outside the government tend to use the mixed approach of both of these models, they usually emphasize components that they consider to be the most to their organizational mission. However, many businesses considered appropriate to integrate a better rounded risk management model and thusDevelopment of the third model.
Donn B. Parker is responsible for the introduction of the Hexad model to ensure Parker information, which focuses on many of the same attributes and adds another component and eliminates overlapping components. Six basic attributes form a model: confidentiality, hold, integrity, authenticity, availability and usefulness. However, the authenticity in this model differs from the definition of verification used by the model of five pillars, with reference to the validity of data at all times, rather than identifying and providing access to users. Although this model is not so predominant in deployment, many organizations that rely on information that must be presented in the original format and content, often prefers it. Such organizations may involve legalfirms that need to ensure that the evidence secured in cases is not manipulated.