1. Home
  2. Training Library
  3. Security
  4. Courses
  5. Getting Started with Information Security

Information Security vs Information Assurance

Developed with
QA

Contents

keyboard_tab

The course is part of this learning path

IT Security Fundamentals
6
1
Information Security vs Information Assurance
Overview
Difficulty
Beginner
Duration
21m
Students
194
Ratings
5/5
starstarstarstarstar
Description

This course introduces you to the fundamentals of information security. You'll learn what information security is, the difference between information security and information assurance, as well as the fundamentals of information security.

Learning Objectives

  • Get a foundational understanding of information security
  • Understand the difference between information security and information assurance
  • Learn the fundamentals of information security

Intended Audience

This course is intended for anyone who wants to improve their knowledge of risk management in an information security context.

Prerequisites

We recommend taking this course as part of the IT Security Fundamentals learning path.

Transcript

Information Security and Information Assurance. So what do we understand about these terms?

Assurance is more the overall strategy for a company. Security is how we're going to go about the strategy. Assurance is definitely more strategy-focused. 

So we see Cyber Security as the bottom rung of the ladder. When we talk to people, people think that Cyber Security is Information Security, and it's not. It's different. Cyber Security is technical security. You know, it's the antiviruses, it's the intrusion detection systems, it's your firewalls. It's all of that type of stuff. Just technically focused. It doesn't deal with some of the other stuff we're about to talk about when we get to Information Security, which consequently is our second rung of the ladder.

Our Information Security is now where we get to talk about things that are not just technical but things that are physical. We're talking about not just digital information, we're talking about analog information as well, i.e. paper-based documents. 

But we're now dealing with people as well. Buildings. And physical security. And all these different areas of security now. So now it's not just technical. Which we had before, because down in the first rung of the ladder it was all technical. 

But we’re now looking at physical. We are looking at digital and analog. We're looking at people. And all the rest. So, essentially, information in all its different forms. People. Buildings. And all the rest.

It doesn't separate itself from Cyber Security, it encompasses it. And that's what we're trying to say. So by the time we get here we're using our controls. But the time we get here, we're then building up something that has to give us reason for actually using those things. That is what we would call our Risk Assessments and our Risk Management, which is the third rung of the ladder.

So, Risk Assessments and our Risk Management. This is the area where we're now beginning to really think about the company itself and not just, "Oh we need some antivirus. Oh, we should probably have some CCTV.” Instead now we're doing Risk Assessments to see what the risks are for our organization and we're then applying the information security and cyber security controls in place as it pertains to our organization. Some things that are risks for you aren't risks for me. Some things that we both recognize as risks don't have the same impacts so the controls that we put in place won't be the same.

For example, we could have two business A and B. The impact for business A is 500,000 pounds. The impact for business B is 500,000 pounds. 500,000 pounds will cripple business A. 500,000 pounds won't cripple business B.. So that's when we begin to put controls in place depended on how we react—or wish to react—to the risk.

Here in the fourth rung of the ladder, we have Information Assurance, and its cousin, Information Governance: IA and IG. They are two sides of the same coin. Very closely connected.

One is focused on compliance, feeding the Information Governance: compliance, records management, all of that type of stuff.

One is focused on the assurance that everything we're doing down here is correct, and also that we're in line with the things that our business needs to be in line with. So that's why they can't be separated because Information Assurance is almost Information Governance. In fact, the information that we get out of Information Assurance we feed into Information Governance to make sure we're compliant, and up to date with all our standards and all the rest.

Here with Information Assurance, we will do audits. We will do our ISO 27001 frameworks, and get certified through those things. 

Compliance. Are we compliant with our contracts? How does this plan in with our SLAs? And all of those types of things. So they all come together. But assurance is the idea that what we're doing here under Risk Management is actually working. So there has to be a framework or a matrix to feed that information back so that we get that assurance.

And that's the business side of Information Security.

At this area here we are now strategic. So these are the board-level decisions. We then have these decisions also being made by the board. Not so much Risk Assessments but the Risk Management overall, because they'll be responsible for managing risk.

And then this area here, these are Gold, if you will... These are silver. And these are our bronze… in terms of the functions that are being served in the organization.

So we find our employees in different sections. So we find this being like middle management. And this is very much our executives. And our C suites.

About the Author
Avatar
King Samuel
Cyber Security Trainer
Students
1981
Courses
12
Learning Paths
3

Originating from a systems administration/network architecture career, a solid part of his career building networks for educational institutes. With security being a mainstay his implementation he grew a strong passion for everything cyber orientated especially social engineering. The educational experience led to him mentoring young women in IT, helping them to begin a cyber career. He is a recipient of the Cisco global cyber security scholarship. A CCNA Cyber Ops holder and elected for the CCNP Cyber Ops program.

Covered Topics