×
☰ Menu

Information Assurance (IA)

Measures that ensure the availability, integrity, authenticity, secrecy, and non-repudiation of information and information systems. These methods include incorporating protection, detection, and reaction capabilities to allow for the restoration of information systems.

In this digital age, we all want to keep our computers and personal information secure, so computer security is essential for protecting our personal information. It is also critical to maintaining our computer security and overall health by preventing viruses and malware from interfering with system performance.

Non-repudiation: Non-repudiation means neither party can deny receiving a message or denying transmitting a message or transaction.

For example, In cryptography, it is sufficient to demonstrate that the message matches the digital signature signed with the sender's private key and that the message could only have been delivered by the sender and that no one else could have altered it in transit. Non-repudiation requires data integrity and authenticity.

 

Authenticity: Authenticity entails validating that users are who they claim to be and that each input arriving at the destination comes from a reliable source. If followed, this concept ensures that a valid and genuine message is received from a tainted source via a valid transmission.

For example: The sender delivers the message along with the digital signature formed using the message's hash value and the private key. The digital signature is now decrypted using the public key, generating a hash value, and the message is hashed again to generate the hash value. If these two values match, it is referred to as a valid transmission with an authentic or genuine message received at the recipient side.

 

Accountability: Accountability implies that an entity's acts should be traceable back to that entity only.

For example, as we discussed in the Integrity section, not every employee should be allowed to do changes in other employees, data. For this there is a separate department in an organization that is responsible for making such changes and when they receive a request for a change then that letter must be signed by higher authority, for example, the Director of a college and the person who is allotted that the changes will be able to do the changes after verifying his biometrics, thus timestamp with the user (doing changes) details get recorded.