5 Pillars of Information Assurance
role of information assurance
to protect and defend information and information systems
integrity
assurance that information is not tampered with
authentication
assuring those who have access in information, are they say who they are
availability
timely, reliable access to data for authorized users
confidentiality
assurance that information is not disclosed to unauthorized persons
non repudiation
someonewith access to your organizations
information system cannot deny having
completed an action within the system, as
there should be methods in place to prove
that they did make said action.
2011-2016 National Security
It is to ensure the permanent inviolability of our national territory and its effective control by the Government and the State.
Republic Act No. 8792
REPUBLIC ACT NO. 9995
protects the victims who are made to believe that they are performing sexual acts in private
Republic Act No. 10173
aims to protect personal data in information and communications systems both in the government and the private sector
REPUBLIC ACT NO. 9775
“Child” refers to a person below eighteen (18) years of age or over but is unable to fully take care of, or protect, himself/herself from abuse, neglect, cruelty, exploitation or discrimination because of a physical or mental disability or condition.
Republic Act No. 10175
completely address crimes committed against and by means of computer system
due care
due care
development and implementation of policies and procedures to did in performing the ongoing maintenance necessary to keep information assurance process operating properly to protect assets and people from threats
due diligence
is the reasonable investigation, research, and understanding of the risks an organization faces
before committing to a particular course of action. The organization should do its homework and ensure
ongoing monitoring.
Implications from lack of AI
information assurance fundamental expectations and common beliefs
includes all information an organization may process, store, transmit, or disseminate regardless of media. Thus, information on paper, on a hard drive, in the mind of an employee, or in the cloud is considered to be “in scope.”
Information assurance
INFORMATION ASSURANCE AND SECURITY
PARTNER AGENCIES
Memorandum Order No. 37, s. 2001
PROVIDING FOR THE FOURTEEN PILLARS OF POLICY AND ACTION OF THE GOVERNMENT AGAINST TERRORISM
Administrative Order No. 39, s. 2013
MANDATING GOVERNMENT AGENCIES TO MIGRATE TO THE GOVERNMENT WEB HOSTING SERVICE (GWHS) OF THE DEPARTMENT OF SCIENCE AND TECHNOLOGY-INFORMATION AND COMMUNICATIONS TECHNOLOGY OFFICE (DOST-ICTO)
Executive Order No. 810, s. 2009
INSTITUTIONALIZING THE CERTIFICATION SCHEME FOR DIGITAL SIGNATURES AND DIRECTING THE APPLICATION OF DIGITAL SIGNATURES IN E-GOVERNMENT SERVICES
ISO/IEC 27001:2005
specifies the requirements for establishing, implementing, operating, monitoring, reviewing, maintaining and improving a documented Information Security Management System within the context of the organization’s overall business risks.