CAP: Security Assessment and Authorization Certification | Information Assurance (IA) Model

Information Assurance (IA) Model

Question

Which of the following is an Information Assurance (IA) model that protects and defends information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation?

Answers

Explanations

Click on the arrows to vote for the correct answer

A. B. C. D.

D.

The information assurance (IA) model that protects and defends information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation is the Parkerian Hexad.

The Parkerian Hexad is a set of six fundamental principles of information security, which were first proposed by Donn B. Parker in the 1990s. The six principles of the Parkerian Hexad are:

  1. Confidentiality: The principle of confidentiality is concerned with ensuring that information is only accessible to authorized individuals or entities. Confidentiality can be achieved through the use of access controls, encryption, and other security measures.

  2. Integrity: The principle of integrity is concerned with maintaining the accuracy and completeness of information. This can be achieved through the use of data validation techniques, checksums, and other security measures.

  3. Availability: The principle of availability is concerned with ensuring that information is accessible when it is needed. This can be achieved through the use of redundancy, backup systems, and other security measures.

  4. Authentication: The principle of authentication is concerned with verifying the identity of individuals or entities that are accessing information. This can be achieved through the use of passwords, smart cards, and other authentication mechanisms.

  5. Authorization: The principle of authorization is concerned with ensuring that individuals or entities are only able to access information that they are authorized to access. This can be achieved through the use of access controls, permissions, and other security measures.

  6. Non-repudiation: The principle of non-repudiation is concerned with ensuring that individuals or entities cannot deny that they have performed a particular action. This can be achieved through the use of digital signatures, audit logs, and other security measures.

The Parkerian Hexad is widely recognized as a useful framework for evaluating and designing information security systems. It provides a comprehensive set of principles that can be used to ensure that information and information systems are protected against a wide range of threats and risks.