What is IA?
Information operations that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.
What does this mean?
- Availability - Making sure the computer and the information is there when we need it
- Integrity - Making sure the information we use, transmit, process, or stored has not been corrupted or adversely manipulated.
- Authentication - Making sure we know who is using our computers and accessing our data.
- Confidentiality - Making sure the information is protected from disclosure.
- Non-repudiation - Making sure the information is tagged so when we send it - we know it got there, and the recipient knows who sent it.
Why do we need IT Security?
- Every user should be aware of the need for computer and network security
- Computer and network security is more important when sharing services
- Most of our users utilize DOD systems that are monitored
- The commercial network must also be protected
- DOD requires that networks, servers, and operations be certified
- DOD policy requires annual information assurance awareness training
- We need to emphasize important security tasks and acceptable user practices
Quick Links
- CAC/PKI FAQ
- Configuration for Sending Digitally Signed and Encrypted E-mail - (Outlook)
- Information Technology Policies and Procedures
- USU Instruction 7900 (USU Only)
- Phishing and Pharming Information
- US CERT Security Tips