cio

USU Courtyard

Information Assurance & Computer Network Defense

What is IA?

Information operations that protect and defend information and information systems by ensuring their availability, integrity, authentication, confidentiality, and non-repudiation providing for restoration of information systems by incorporating protection, detection, and reaction capabilities.

What does this mean?

  • Availability - Making sure the computer and the information is there when we need it
  • Integrity - Making sure the information we use, transmit, process, or stored has not been corrupted or adversely manipulated.
  • Authentication - Making sure we know who is using our computers and accessing our data.
  • Confidentiality - Making sure the information is protected from disclosure.
  • Non-repudiation - Making sure the information is tagged so when we send it - we know it got there, and the recipient knows who sent it.

Why do we need IT Security?

  • Every user should be aware of the need for computer and network security
  • Computer and network security is more important when sharing services
  • Most of our users utilize DOD systems that are monitored
  • The commercial network must also be protected
  • DOD requires that networks, servers, and operations be certified
  • DOD policy requires annual information assurance awareness training
  • We need to emphasize important security tasks and acceptable user practices

Quick Links

IA Tools

FTC on Spam Email

IA Training