Professional Documents
Culture Documents
Anonymus 603
Anonymus 603
223603
INFORMATION ASSURANCE
QUESTION # 01
MAKING THE SUMMARY OF RAND REPORT
Information Assurance
access controls, to protect computer systems from physical
attacks.
Overall, the report highlights the need for a comprehensive
approach to computer security that includes technical and non-
technical measures to protect computer systems and the
information they contain.
QUESTION # 02
Study of security technologies
Cyber threat intelligence
Cyber Threat Intelligence (CTI) is the practice of collecting and
analyzing information about cyber threats and vulnerabilities to
better understand and predict potential attacks. CTI can help
organizations identify and mitigate potential threats before
they can cause harm. The CTI process involves four stages:
Collection, Processing, Analysis, and Dissemination.
o Collection
o Processing
o Analysis
o Dissemination
Information Assurance
Security Informtion Event Management
SIEM is a security technology that provides real-time analysis of
security alerts generated by network hardware and
applications. SIEM collects security-related data from various
sources, including log files, network devices, and applications.
SIEM aggregates and correlates this data to identify security
incidents, threats, and vulnerabilities.
Information Assurance
Security Operation Center(SOC)
Trusted Computing is a security technology that aims to provide
a secure and trusted computing environment. It involves the
use of hardware and software components that work together
to ensure the integrity and security of the computing
environment.
Components of SOC
o Trusted Platform Module (TPM)
o Trusted boot process
o Trusted execution environments (TEEs).
Information Assurance
Information Assurance