Overview

1 Security Concepts of Information Assurance

This chapter introduces the foundational concepts that underpin information assurance. It frames organizations as socio-technical systems in which people, processes, and technology work together to create value, and it defines assets broadly to include tangible items (facilities, hardware), intangible items (software, data, intellectual property, reputation), and human assets (employees, contractors, vendors). The goal of cybersecurity is to understand organizational risk, anticipate relevant threats, and select effective controls that preserve operations across increasingly hybrid and cloud-enabled environments.

Key risk terms are clarified: vulnerabilities are weaknesses in assets, threats are factors that can exploit those weaknesses, attacks are intentional exploitations, and threat actors range from insiders and hobbyists to criminal groups and nation-state teams. Security controls are grouped as physical, technical, and administrative measures that collectively uphold the CIA triad—confidentiality, integrity, and availability—while countering the complementary threat classes of disclosure, alteration, and denial. Examples include encryption and access control for confidentiality, hashing and digital signatures for integrity, and redundancy, failover, and backups for availability; these controls often overlap and reinforce one another.

Because not all information carries equal risk, the chapter emphasizes data classification to align protections with sensitivity and impact—commonly using tiers such as public, internal, confidential, and highly confidential. It distinguishes sensitive from confidential data, explains how handling requirements become stricter as potential harm rises, and details categories like personally identifiable information (PII)—including both non-public and public elements that may enable identification—and protected health information (PHI), which demands strict privacy safeguards. Together, these concepts provide a practical framework for prioritizing defenses and applying the right controls to protect an organization’s most valuable assets.

Illustration of the interdependence of the key information security principles of confidentiality, integrity, and availability along with the corresponding threats of disclosure, alteration, and denial.

Answers to Review Questions

  1. The correct answer is D. Software is not a tangible asset. Unlike hardware, buildings, and machines, which have a physical form and can be touched, software is intangible. It consists of code and data that exist digitally rather than physically.
  2. The correct answer is C. Availability is the component of the CIA triad that focuses on ensuring that information is available when it is needed. On the other hand, while Confidentiality and Integrity are part of the CIA, they have different purposes. Authentication is not part of the CIA triad.
  3. The correct answer is A. Any factor that has the potential to disrupt an asset by exploiting a vulnerability is known as a threat. Threats can take many forms, including malicious actors such as hackers, computer viruses, or natural disasters such as hurricanes or earthquakes. The remaining options, on the other hand, are not threats because the first two unchecked options represent vulnerabilities, and the last unchecked option emphasizes the need for protective measures on an asset to counter potential threats.
  4. The correct answer is C. A threat actor is an individual or entity responsible for launching cyberattacks. The remaining options are incorrect because a software vulnerability is a vulnerability, a phishing email is a threat vector, and a denial-of-service attack is an example of an attack method.
  5. The correct answer is C. PII (Personally Identifiable Information) includes personal information such as names and addresses, while PHI (Protected Health Information) is a subset that focuses on health information, including medical records and treatment details. PII and PHI must be protected, but PHI has additional regulatory requirements.

FAQ

What is Information Assurance (IA)?Information Assurance is the practice of protecting information and the systems that process it so their confidentiality, integrity, and availability are maintained against threats.
How do people, processes, and technology relate to organizational security?Organizations create value through people executing processes supported by technology (physical and digital). Security must account for all three, because weaknesses in any area can disrupt operations and harm the organization.
What is an “asset” in cybersecurity, and what types exist?An asset is anything of value that requires protection. Types include: - Tangible: physical items like buildings, servers, networks, and devices. - Intangible: non-physical items like data, software, IP, contracts, and brand reputation. - Human: employees, contractors, and vendors whose skills and actions impact security.
What’s the difference between a vulnerability, a threat, an attack, and a threat actor? - Vulnerability: a weakness in an asset (e.g., misconfiguration). - Threat: any potential cause of harm that can exploit a vulnerability (e.g., hardware failure, malware). - Attack: the intentional exploitation of a vulnerability. - Threat actor: the person or group carrying out an attack (e.g., insider, criminal group).
Who are common threat actors and what motivates them?Typical actors include insiders, script kiddies, thrill seekers, hacktivists, criminal syndicates, and advanced persistent threats (APTs). Motivations range from curiosity or notoriety to profit, ideology, espionage, or sabotage, with varying skills and resources.
What is the CIA Triad and why is it fundamental? - Confidentiality: only authorized access to information. - Integrity: information is accurate and unaltered except by authorized means. - Availability: information and systems are accessible when needed. These principles guide risk assessment and control selection for protecting assets.
What is the DAD model and how does it map to the CIA Triad?DAD describes three threat classes: - Disclosure → compromises confidentiality. - Alteration → compromises integrity. - Denial → compromises availability. Thinking in DAD terms helps anticipate how threats impact CIA and select appropriate safeguards.
What kinds of security controls are used to protect assets? - Physical: guards, locks, barriers, cameras, badge/biometric access. - Technical: firewalls, encryption, authentication, anti-malware, access controls. - Administrative: policies, procedures, training, and governance. Controls often overlap and are combined based on risk.
What is data classification and what levels are commonly used?Data classification organizes information by sensitivity and impact to guide handling and protection. Common levels include Public, Internal, Confidential, and Highly Confidential (or Restricted). Higher sensitivity demands stricter access, storage, transmission, and retention controls.
How do sensitive, confidential, PII, and PHI differ? - Sensitive: data that could harm individuals or the organization if misused. - Confidential: sensitive data that must be kept private by policy or law (e.g., trade secrets). - PII: data that identifies a person (e.g., SSN, unlisted phone, bank details); can be public or non-public. - PHI: health-related data (e.g., medical records, lab results) tied to an individual; requires strong privacy protections and often anonymization.

pro $24.99 per month

  • access to all Manning books, MEAPs, liveVideos, liveProjects, and audiobooks!
  • choose one free eBook per month to keep
  • exclusive 50% discount on all purchases
  • renews monthly, pause or cancel renewal anytime

lite $19.99 per month

  • access to all Manning books, including MEAPs!

team

5, 10 or 20 seats+ for your team - learn more


choose your plan

team

monthly
annual
$49.99
$499.99
only $41.67 per month
  • five seats for your team
  • access to all Manning books, MEAPs, liveVideos, liveProjects, and audiobooks!
  • choose another free product every time you renew
  • choose twelve free products per year
  • exclusive 50% discount on all purchases
  • renews monthly, pause or cancel renewal anytime
  • renews annually, pause or cancel renewal anytime
  • Become ISC2 Certified in Cybersecurity ebook for free
choose your plan

team

monthly
annual
$49.99
$499.99
only $41.67 per month
  • five seats for your team
  • access to all Manning books, MEAPs, liveVideos, liveProjects, and audiobooks!
  • choose another free product every time you renew
  • choose twelve free products per year
  • exclusive 50% discount on all purchases
  • renews monthly, pause or cancel renewal anytime
  • renews annually, pause or cancel renewal anytime
  • Become ISC2 Certified in Cybersecurity ebook for free