Prevent the disclosure of sensitive information from unauthorized people, resources, and processes
The protection of system information or processes from intentional or accidental modification
The assurance that systems and data are accessible by authorized users when needed
Data at rest, information that is stored in memory or on disk
Data in transit, transferring data between information systems
performing operations on data in order to achieve a desired objective.
administrative controls, such as management directives, that provide a foundation for how information assurance is to be implemented within an organization
ensuring that the users of information systems are aware of their roles and responsibilities regarding the protection of information systems and are capable of following standards
software and hardware-based solutions designed to protect information systems (examples: anti-virus, firewalls, intrusion detection systems, etc.)