Any event that causes damage to information resources, whether it is a computer virus, natural disaster or system failure could be devastating to an individual (i.e. identity theft), company, its customers, suppliers and shareholders. Failing to do so may threaten the survival of the company itself.
An information system security breach could result in serious financial losses, the disclosure of protected private information, loss of research and development data or fines by regulatory agencies. Losses due to intrusions into an information system could negatively affect the general public (i.e. power failures). This might result in costly class action lawsuits that could exceed an organization's ability to pay and result in its dissolution. Even an individual might be sued for negligence and be financially ruined.
So how should an organization or person protect its valuable digital processing infrastructure? A business should establish and implement a comprehensive information assurance plan. Individuals should at least address the components of a professional information assurance plan. Doing so is evidence that the infrastructure owners are attempting to practice due diligence.
An information assurance plan for an organization should be formalized and approved in the organization's policies and have the following components: Confidentiality, Integrity, Availability, Accountability and Non-Repudiation.
Let's briefly examine each:
A. Confidentiality refers to restricting access to data, information or to any component of the digital processing infrastructure unless there is a "Need" for an individual...