Topic 2 - Information Assurance Concepts
Topic 2 - Information Assurance Concepts
The relationship
between assets,
impacts, and
segmentation
• Employee Sabotage
Damaging the organization’s key infrastructure
Revealing secret and confidential information to competitors
Creating tensions and rifts among employees by spreading
hoaxes or anonymous rumors
Threatening the health and safety of others
Stealing important documents
www.irs.gov/pub/irs-utl/phishing_email2.pdf
• Symmetric Encryption
The sender and receiver use the same private key to encrypt and
decrypt a message. The key and the plaintext are combined
systematically to yield a ciphertext. If the encryption is secure,
others cannot recover the message from the ciphertext unless
they know both the key and the encryption algorithm.
Symmetric encryption is relatively fast.
The most common block cipher: Data Encryption Standard (DES)-
an internationally standardized symmetric cipher that performs 16
iterations of the same series of operations. Triple DES, uses 3
applications of DES, with a total of 48 iterations. DES is now
replaced by the Advanced Encryption Standard (AES) due to the
small key size.
• Have considered
Defense in Depth
Definitions of 5 Basic Services
Assets, Threats, Vulnerabilities, Risks, and Controls
Basic Terminology of Cryptology