What “Cybersecurity” and “Information Assurance” mean.

Cybersecurity is the practice of protecting information systems, network and information (data) from unauthorized access, use or modification.This can be implemented through the use of different protections, one or a combination of multiple layers of security tools.

From the network using the Router to implement access control list (ACL) or Firewall application and ports policy rules, Intrusion Detection Systems (IDS/PDS) to receive alerts and automatically respond to malicious traffic, integrity protection of data and the computer system using encryption, implementation of multi-factor authentication (MFA), Annual Security Awareness/Refresher training and end-point protection e.g. antivirus and antimalware.

The Information Assurance is a policy, processes, and procedures that protect the confidentiality, integrity, and availability (CIA) of information. Some examples are Security policies and procedures, Incident Response plan, Disaster Backup and Recovery plan

cybersecurity is focused on protecting the technical aspects of information systems, while information assurance is focused on protecting the information itself (data), as well as the people and processes that use it.

Here are some examples of cybersecurity measures:

  • Firewalls application, service and port rules
  • Intrusion detection systems / Prevention detection system
  • Data encryption using BitLocker
  • Passwords / Multi-Factor Authentication (MFA)
  • User access control list (ACL)
  • Security awareness training
  • EndPoint Protection for antivirus and antimalware
  • Running a backup.

Here are some examples of information assurance measures:

  • Information security Policy
  • System Security Plan
  • Risk Management Plan
  • Information classification
  • Security policies and procedures
  • Physical security
  • Disaster recovery planning
  • Incident response planning
  • Computer Incident Response Procedures

Both cybersecurity and information assurance are essential for protecting organizations from cyber attacks. By implementing a comprehensive security program that encompasses both of these areas, organizations can reduce their risk of being hacked and losing sensitive data.

Here are some of the benefits of implementing cybersecurity and information assurance measures:

  • Protect sensitive data from unauthorized access, use, disclosure, disruption, modification, or destruction.
  • Reduce the risk of cyber attacks.
  • Improve the efficiency and effectiveness of operations.
  • Increase customer trust.
  • Comply with regulations.

Here are some of the roles and responsibilities in Classified IT.

CyberSecurity Job Functions.

  • Security analyst: Security analysts are responsible for monitoring and analyzing network traffic for signs of malicious activity. They also investigate security incidents and implement security controls to prevent future attacks.
  • Penetration tester: Penetration testers, also known as ethical hackers, are responsible for testing the security of computer systems and networks by trying to exploit vulnerabilities. They help organizations identify and fix security weaknesses before they can be exploited by malicious actors.
  • Incident responder: Incident responders are responsible for responding to security incidents. They work to contain the incident, mitigate the damage, and restore operations.
  • Security architect: Security architects design and implement security solutions for organizations. They work with other stakeholders to understand the organization’s security needs and develop solutions that meet those needs.

Information Assurance Job Functions.

  • Information security manager: Information security managers are responsible for overseeing the security of an organization. They develop and implement security policies and procedures, and they manage the security team.
  • Information System Security Manager (ISSM) who prepare and manage the RMF package for the program, this includes the System Security Plan, Risk Assessment Report, Security Assessment Plan, Media Transfer Procedures, etc.

These are just a few examples of cybersecurity and information assurance job functions. There are many other roles in the field of cybersecurity, each with its own unique set of responsibilities.

If you are responsible for the security of an organization’s information systems, it is important to understand the difference between cybersecurity and information assurance. By implementing a comprehensive security program that encompasses both of these areas, you can help to protect your organization from cyber attacks.

Support @QUE.COM

Founder, QUE.COM Internet Media. | Founder, Yehey.com a Shout for Joy! | MAJ.COM Management of Assets and Joint Ventures. More at KING.NET Ideas to Life.

Leave a Reply