Unseen Power of Information Assurance over Information Security
- URL: http://arxiv.org/abs/2411.00799v1
- Date: Sat, 19 Oct 2024 20:17:43 GMT
- Title: Unseen Power of Information Assurance over Information Security
- Authors: Guy Mouanda,
- Abstract summary: Information security relates to the processes and methods that block unlawful entry, reform, or exposure of data.
Information assurance covers the expansive aspirations of ensuring that data is responsible, consistent, and flexible.
This paper weighs the various controls and how information assurance can be used to spotlight security problems by focusing on human resource assets and technology.
- Score: 0.0
- License:
- Abstract: Information systems and data are necessary resources for several companies and individuals; but they likewise encounter numerous risks and dangers that can threaten their protection and value. Information security and information assurance are two connected expressions of protecting the confidentiality, integrity, and availability of information systems and data. Information security relates to the processes and methods that block unlawful entry, reform, or exposure of data; in contrast, information assurance covers the expansive aspirations of ensuring that data is responsible, consistent, and flexible. This paper leads the primary models, rules and challenges of information security and information assurance examines some of the top methods, principles, and guidelines that can aid in reaching them, and then investigate the modification in prominence for information security from being obscured in the information technology field to a liability pretending to be in the middle resolving all technology breaches around the world. This paper weighs the various controls and how information assurance can be used to spotlight security problems by focusing on human resource assets and technology. Finally, it demonstrates how information assurance must be considered above others' technology pretending to secure the information
Related papers
- Security Threats in Agentic AI System [0.0]
The complexity of AI systems combined with their ability to process and analyze large volumes of data increases the chances of data leaks or breaches.
As AI agents evolve with greater autonomy, their capacity to bypass or exploit security measures becomes a growing concern.
arXiv Detail & Related papers (2024-10-16T06:40:02Z) - Security Approaches for Data Provenance in the Internet of Things: A Systematic Literature Review [0.0]
Internet of Things systems are vulnerable to security attacks.
Data provenance offers a way to record the origin, history, and handling of data to address these vulnerabilities.
arXiv Detail & Related papers (2024-07-03T19:25:36Z) - Towards Guaranteed Safe AI: A Framework for Ensuring Robust and Reliable AI Systems [88.80306881112313]
We will introduce and define a family of approaches to AI safety, which we will refer to as guaranteed safe (GS) AI.
The core feature of these approaches is that they aim to produce AI systems which are equipped with high-assurance quantitative safety guarantees.
We outline a number of approaches for creating each of these three core components, describe the main technical challenges, and suggest a number of potential solutions to them.
arXiv Detail & Related papers (2024-05-10T17:38:32Z) - Using Program Knowledge Graph to Uncover Software Vulnerabilities [0.0]
A knowledge graph constructed with information extracted from the system along with the desired security behavior can be utilized to identify complex security vulnerabilities hidden underneath the systems.
We present a novel approach of using Program Knowledge Graph that is embedded with fine-grained execution information of the systems.
arXiv Detail & Related papers (2023-12-08T03:38:43Z) - A Comparative Analysis Between SciTokens, Verifiable Credentials, and
Smart Contracts: Novel Approaches for Authentication and Secure Access to
Scientific Data [0.6906005491572401]
Managing and exchanging sensitive information securely is a paramount concern for the scientific and cybersecurity community.
This research paper presents a comparative analysis of three novel approaches for authenticating and securing access to scientific data.
arXiv Detail & Related papers (2023-08-28T18:01:37Z) - A Survey of Trustworthy Federated Learning with Perspectives on
Security, Robustness, and Privacy [47.89042524852868]
Federated Learning (FL) stands out as a promising solution for diverse real-world scenarios.
However, challenges around data isolation and privacy threaten the trustworthiness of FL systems.
arXiv Detail & Related papers (2023-02-21T12:52:12Z) - Foveate, Attribute, and Rationalize: Towards Physically Safe and
Trustworthy AI [76.28956947107372]
Covertly unsafe text is an area of particular interest, as such text may arise from everyday scenarios and are challenging to detect as harmful.
We propose FARM, a novel framework leveraging external knowledge for trustworthy rationale generation in the context of safety.
Our experiments show that FARM obtains state-of-the-art results on the SafeText dataset, showing absolute improvement in safety classification accuracy by 5.9%.
arXiv Detail & Related papers (2022-12-19T17:51:47Z) - Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks,
and Defenses [150.64470864162556]
This work systematically categorizes and discusses a wide range of dataset vulnerabilities and exploits.
In addition to describing various poisoning and backdoor threat models and the relationships among them, we develop their unified taxonomy.
arXiv Detail & Related papers (2020-12-18T22:38:47Z) - Trustworthy AI [75.99046162669997]
Brittleness to minor adversarial changes in the input data, ability to explain the decisions, address the bias in their training data, are some of the most prominent limitations.
We propose the tutorial on Trustworthy AI to address six critical issues in enhancing user and public trust in AI systems.
arXiv Detail & Related papers (2020-11-02T20:04:18Z) - Dos and Don'ts of Machine Learning in Computer Security [74.1816306998445]
Despite great potential, machine learning in security is prone to subtle pitfalls that undermine its performance.
We identify common pitfalls in the design, implementation, and evaluation of learning-based security systems.
We propose actionable recommendations to support researchers in avoiding or mitigating the pitfalls where possible.
arXiv Detail & Related papers (2020-10-19T13:09:31Z) - Risk Management Practices in Information Security: Exploring the Status
Quo in the DACH Region [3.375386983523507]
Information security risk management aims at ensuring proper protection of information values and information processing systems.
This paper investigates the current state of risk management practices being used in information security management in the DACH region.
arXiv Detail & Related papers (2020-03-04T10:11:44Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.