ABSTRACT

Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised. Intended for those interested in the construction and operation of an IA or Information Security (InfoSec) program, Building a Global Information Assurance Program describes the key building blocks of an IA development effort including: Information Attributes, System Attributes, Infrastructure or Architecture, Interoperability, IA Tools, Cognitive Hierarchies, Decision Cycles, Organizational Considerations, Operational Concepts. Because of their extensive and diverse backgrounds, the authors bring a unique perspective to current IT issues. The text presents their proprietary process based on the systems development life cycle (SDLC) methodology specifically tailored for an IA program. This process is a structured, cradle-to-grave approach to IA program development, from program planning and design to implementation, support, and phase out. Building a Global Information Assurance Program provides a proven series of steps and tasks that you can follow to build quality IA programs faster, at lower costs, and with less risk.

chapter Chapter 1|7 pages

Introduction to Information Assurance

chapter Chapter 2|37 pages

Basic Concepts

chapter Chapter 3|30 pages

Risk, Threat, and Vulnerability Assessments

chapter Chapter 4|30 pages

Overview of Systems Engineering

chapter Chapter 5|13 pages

Information Assurance Task Force

chapter Chapter 6|14 pages

Requirements

chapter Chapter 7|17 pages

Design

chapter Chapter 8|53 pages

Implementation and Testing

chapter Chapter 10|22 pages

The Information Assurance Center

chapter Chapter 11|42 pages

Automated Tools

chapter Chapter 12|18 pages

Summary