Information Assurance and the Role of Time

Cyber security and information assurance refer to steps taken to protect networks and computer systems from being disrupted as well as preventing unauthorized access (Sara, 2008). Cyber security and information assurance aim at providing three things: integrity, confidentiality and availability (Knapp, 2009). Integrity is enhanced through ensuring that users are protected against unauthorized modification of network systems. Confidentiality is provided through protecting users against unauthorized access to their network systems and information by other people. Availability, on the other hand, ensures that users have adequate time and access to their systems and networks (Knapp, 2009).

With time, filtering devices will continue to improve in terms of precision and accuracy in order to tackle the issue of ethics in cyberspace. Public-private collaborations to enhance technology will be a big step towards providing cyber security and information assurance. There is also a need to identify the most dangerous classes of information assurance threats and cyber security (Parker, 1998). These findings should then be used to develop and put into practice coordinated effort focusing on key research needs. These needs will take time to evolve, but it will be a starting point for the government to curb issues affecting cyber security (Parker, 1998).

But as much as the filters improve, issues of internet security continue to intensify due to the dynamic nature of the internet (Spinello, 2011). This is mainly attributed to complex IT networks, expanding wireless computers connectivity, and the dynamic telecommunication industry. Therefore, ensuring cyber security and information assurance might take a much longer time than expected to be realized.

References

Knapp K.J. (2009). Cyber security and global information assurance: Threat analysis and response solutions. Hershey, PA: IGI Global.

Parker D. B. (1998). Fighting computer crime. New York, NY: John Wiley & Sons.

Sara, B. (2008). Gift of fire: Social, legal, and ethical issues for computing and internet (3rd Ed.). Lebanon, Indiana, U.S.A: Prentice Hall.

Spinello, R. (2011). CyberEthics: Morality and law in cyberspace (4th Ed.). Sudbury, MA: Jones and Bartlett Publishers.

Cite this paper

Select style

Reference

StudyCorgi. (2022, March 17). Information Assurance and the Role of Time. https://studycorgi.com/information-assurance-and-the-role-of-time/

Work Cited

"Information Assurance and the Role of Time." StudyCorgi, 17 Mar. 2022, studycorgi.com/information-assurance-and-the-role-of-time/.

* Hyperlink the URL after pasting it to your document

References

StudyCorgi. (2022) 'Information Assurance and the Role of Time'. 17 March.

1. StudyCorgi. "Information Assurance and the Role of Time." March 17, 2022. https://studycorgi.com/information-assurance-and-the-role-of-time/.


Bibliography


StudyCorgi. "Information Assurance and the Role of Time." March 17, 2022. https://studycorgi.com/information-assurance-and-the-role-of-time/.

References

StudyCorgi. 2022. "Information Assurance and the Role of Time." March 17, 2022. https://studycorgi.com/information-assurance-and-the-role-of-time/.

This paper, “Information Assurance and the Role of Time”, was written and voluntary submitted to our free essay database by a straight-A student. Please ensure you properly reference the paper if you're using it to write your assignment.

Before publication, the StudyCorgi editorial team proofread and checked the paper to make sure it meets the highest standards in terms of grammar, punctuation, style, fact accuracy, copyright issues, and inclusive language. Last updated: .

If you are the author of this paper and no longer wish to have it published on StudyCorgi, request the removal. Please use the “Donate your paper” form to submit an essay.