1. Home
  2. Training Library
  3. Security
  4. Courses
  5. IT Security Fundamentals

Information Security vs Information Assurance

Developed with
QA
play-arrow
Information Security vs Information Assurance
Overview
Difficulty
Beginner
Duration
1h 49m
Students
138
Ratings
5/5
starstarstarstarstar
Description

IT Security Fundamentals 

This is a beginner-level course designed to provide you with an introduction to Information technology security concepts. The course will suit anyone interested in understanding the fundamentals of security concepts from a business and technology perspective.  

Outline 

In this course we will provide:

  • An introduction to the concept of Information Security
  • We will cover the basic concepts that pertain to Information Security
  • We then begin to answer the question - what is information security and why do we need it?
  • We then explore some of the frameworks, controls and activities we can implement to control information security 

Pre-requisites 

This is a beginner level course where having a basic understanding of computing concepts will be useful 

Feedback 

Please reach out to us at support@cloudacademy.com with any questions, comments or feedback. 

 

Transcript

Information Security and Information Assurance. So what do we understand about these terms?

Assurance is more the overall strategy for a company. Security is how we're going to go about the strategy. Assurance is definitely more strategy-focused. 

So we see Cyber Security as the bottom rung of the ladder. When we talk to people, people think that Cyber Security is Information Security, and it's not. It's different. Cyber Security is technical security. You know, it's the antiviruses, it's the intrusion detection systems, it's your firewalls. It's all of that type of stuff. Just technically focused. It doesn't deal with some of the other stuff we're about to talk about when we get to Information Security, which consequently is our second rung of the ladder.

Our Information Security is now where we get to talk about things that are not just technical but things that are physical. We're talking about not just digital information, we're talking about analog information as well, i.e. paper-based documents. 

But we're now dealing with people as well. Buildings. And physical security. And all these different areas of security now. So now it's not just technical. Which we had before, because down in the first rung of the ladder it was all technical. 

But we’re now looking at physical. We are looking at digital and analog. We're looking at people. And all the rest. So, essentially, information in all its different forms. People. Buildings. And all the rest.

It doesn't separate itself from Cyber Security, it encompasses it. And that's what we're trying to say. So by the time we get here we're using our controls. But the time we get here, we're then building up something that has to give us reason for actually using those things. That is what we would call our Risk Assessments and our Risk Management, which is the third rung of the ladder.

So, Risk Assessments and our Risk Management. This is the area where we're now beginning to really think about the company itself and not just, "Oh we need some antivirus. Oh, we should probably have some CCTV.” Instead now we're doing Risk Assessments to see what the risks are for our organization and we're then applying the information security and cyber security controls in place as it pertains to our organization. Some things that are risks for you aren't risks for me. Some things that we both recognize as risks don't have the same impacts so the controls that we put in place won't be the same.

For example, we could have two business A and B. The impact for business A is 500,000 pounds. The impact for business B is 500,000 pounds. 500,000 pounds will cripple business A. 500,000 pounds won't cripple business B.. So that's when we begin to put controls in place depended on how we react—or wish to react—to the risk.

Here in the fourth rung of the ladder, we have Information Assurance, and its cousin, Information Governance: IA and IG. They are two sides of the same coin. Very closely connected.

One is focused on compliance, feeding the Information Governance: compliance, records management, all of that type of stuff.

One is focused on the assurance that everything we're doing down here is correct, and also that we're in line with the things that our business needs to be in line with. So that's why they can't be separated because Information Assurance is almost Information Governance. In fact, the information that we get out of Information Assurance we feed into Information Governance to make sure we're compliant, and up to date with all our standards and all the rest.

Here with Information Assurance, we will do audits. We will do our ISO 27001 frameworks, and get certified through those things. 

Compliance. Are we compliant with our contracts? How does this plan in with our SLAs? And all of those types of things. So they all come together. But assurance is the idea that what we're doing here under Risk Management is actually working. So there has to be a framework or a matrix to feed that information back so that we get that assurance.

And that's the business side of Information Security.

At this area here we are now strategic. So these are the board-level decisions. We then have these decisions also being made by the board. Not so much Risk Assessments but the Risk Management overall, because they'll be responsible for managing risk.

And then this area here, these are Gold, if you will... These are silver. And these are our bronze… in terms of the functions that are being served in the organization.

So we find our employees in different sections. So we find this being like middle management. And this is very much our executives. And our C suites.

About the Author
Avatar
King Samuel
Cyber Security Trainer
Students
1176
Courses
6
Learning Paths
1

Originating from a systems administration/network architecture career, a solid part of his career building networks for educational institutes. With security being a mainstay his implementation he grew a strong passion for everything cyber orientated especially social engineering. The educational experience led to him mentoring young women in IT, helping them to begin a cyber career. He is a recipient of the Cisco global cyber security scholarship. A CCNA Cyber Ops holder and elected for the CCNP Cyber Ops program.

Covered Topics