Information Assurance

1234567891011121314151617181920
Across
  1. 6. Information Assurance involves measures that protect and defend both information and information systems.
  2. 8. Information Assurance aims to guarantee that authorized users have access to authorized information at the authorized time.
  3. 11. ensures that information remains in its original form; information remains true to the creators intent
  4. 14. Long product refresh cycles for technologies found in high-value equipment (e.g. vehicles and critical infrastructures) increase risk exposure.
  5. 16. Many companies leave the default passwords as-is when they install low-cost IoT devices out of the box. They then add these devices to their networks without considering the risks they may pose.
  6. 17. Companies are connecting more operational technology devices to their networks, but many aren’t protected by the latest encryption technologies to ensure the secure storage and transfer of sensitive information.
  7. 18. Many smart devices (e.g. IoT sensors) operating in resource-constrained environments can’t perform automatic remote updates.
  8. 19. These measures ensure the five core aspects of information security: Availability, Integrity, Authentication, Confidentiality, Nonrepudiation
  9. 20. The proliferation of smart building hardware connected to the company network through local access (e.g. managed Ethernet or serial interface) gives bad actors opportunities to breach the network.
Down
  1. 1. ensures the disclosure of information only to those persons with authority to see it.
  2. 2. Information Assurance is concerned with safeguarding information from both malicious and accidental threats
  3. 3. Some older hardware may not be able to support newer security software and solutions.
  4. 4. Hardware can take years to develop, and resolving security issues often require more than a quick patch.
  5. 5. Some hardware may seem to function “just fine” even if the manufacturers no longer support the software.
  6. 7. It applies to information regardless of its state, whether it's in storage, being processed, or in transit.
  7. 9. Most IoT device and robotics manufacturers don’t have dedicated security experts.
  8. 10. Many corporate data centers and high-end desktops use purpose-built chipsets.
  9. 12. The session serves as an introduction to Information Assurance and provides insights to help storage personnel understand its relevance in their specific environments.
  10. 13. It also involves provisions for the restoration of information systems in case of incidents or breaches, ensuring continuity of operations.
  11. 15. Information Assurance encompasses a comprehensive approach that includes protection, detection, and reaction capabilities.