Governments, their agencies, and businesses are perpetually battling to protect valuable, classified, proprietary, or sensitive information but often find that the restrictions imposed upon them by information security policies and procedures have significant, negative impacts on their ability to function. These government and business entities are beginning to realize the value of information assurance (IA) as a tool to ensure that the right information gets to the right people, at the right time, with a reasonable expectation that it is timely, accurate, authentic, and uncompromised.
Book Cover; Title; Copyright; Contents; Acknowledgments; Introduction; Chapter 1 Introduction to Information Assurance; Chapter 2 Basic Concepts; Chapter 3 Risk, Threat, and Vulnerability Assessments; Chapter 4 Overview of Systems Engineering; Chapter 5 Information Assurance Task Force; Chapter 6 Requirements; Chapter 7 Design; Chapter 8 Implementation and Testing; Chapter 9 Information Assurance Life-Cycle Support and Operational Considerations; Chapter 10 The Information Assurance Center; Chapter 11 Automated Tools; Chapter 12 Summary; Appendix A Acronyms; Appendix B Glossary Appendix C LinksAppendix D References; About The Authors; Index
Description based upon print version of record. Includes bibliographical references and index. Description based on print version record.