Author
Listed:
- Michael S. Korotka
- L. Roger Yin
- Suvojit Choton Basu
Abstract
This paper reviews the recent history of the Information Assurance (IA) movement and examines the Information Assurance Technical Framework (IATF) proposed by the United States Government’s National Information Assurance Partnership (NIAP) in the height of the potential terrorist attacks on the cyberspace that draw no geographical or temporal boundaries. Under the heightened alert, all organizations scramble to plug the security holes of their information infrastructure to assure safe end user access to the mission-critical information. This paper argues that the focus of IATF is based on the enforcement of a top-down information infrastructure without specifying the impact to the end users or “information consumers. “ Furthermore, a complete IA defensive strategy built on a Defence-in-Depth Strategy dictates only what people executing operations through the use of technology can achieve. The IATF addresses the technology portion of this strategy to defend against five classes of attacks: Passive, Active, Insider, Close-in, and Distribution. This is accomplished through four overlapping approaches and layers of protection, referred to collectively as Defence-in-Depth technology areas. The paper concludes by highlighting the implications and impact of the IATF and related issues to all citizens in the end user community, particularly the possible gains and sacrifices that end users are facing, particularly the key issue of assurance of information ownership.
Suggested Citation
Michael S. Korotka & L. Roger Yin & Suvojit Choton Basu, 2005.
"Information Assurance Technical Framework and End User Information Ownership: A Critical Analysis,"
Journal of Information Privacy and Security, Taylor & Francis Journals, vol. 1(1), pages 10-26, January.
Handle:
RePEc:taf:uipsxx:v:1:y:2005:i:1:p:10-26
DOI: 10.1080/15536548.2005.10855759
Download full text from publisher
As the access to this document is restricted, you may want to search for a different version of it.
Corrections
All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:taf:uipsxx:v:1:y:2005:i:1:p:10-26. See general information about how to correct material in RePEc.
If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.
We have no bibliographic references for this item. You can help adding them by using this form .
If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.
For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Chris Longhurst (email available below). General contact details of provider: http://www.tandfonline.com/uips .
Please note that corrections may take a couple of weeks to filter through
the various RePEc services.