Information Assurance Technical Framework and End User Information Ownership: A Critical Analysis
Michael S. Korotka,
L. Roger Yin and
Suvojit Choton Basu
Journal of Information Privacy and Security, 2005, vol. 1, issue 1, 10-26
Abstract:
This paper reviews the recent history of the Information Assurance (IA) movement and examines the Information Assurance Technical Framework (IATF) proposed by the United States Government’s National Information Assurance Partnership (NIAP) in the height of the potential terrorist attacks on the cyberspace that draw no geographical or temporal boundaries. Under the heightened alert, all organizations scramble to plug the security holes of their information infrastructure to assure safe end user access to the mission-critical information. This paper argues that the focus of IATF is based on the enforcement of a top-down information infrastructure without specifying the impact to the end users or “information consumers. “ Furthermore, a complete IA defensive strategy built on a Defence-in-Depth Strategy dictates only what people executing operations through the use of technology can achieve. The IATF addresses the technology portion of this strategy to defend against five classes of attacks: Passive, Active, Insider, Close-in, and Distribution. This is accomplished through four overlapping approaches and layers of protection, referred to collectively as Defence-in-Depth technology areas. The paper concludes by highlighting the implications and impact of the IATF and related issues to all citizens in the end user community, particularly the possible gains and sacrifices that end users are facing, particularly the key issue of assurance of information ownership.
Date: 2005
References: Add references at CitEc
Citations:
Downloads: (external link)
http://hdl.handle.net/10.1080/15536548.2005.10855759 (text/html)
Access to full text is restricted to subscribers.
Related works:
This item may be available elsewhere in EconPapers: Search for items with the same title.
Export reference: BibTeX
RIS (EndNote, ProCite, RefMan)
HTML/Text
Persistent link: https://EconPapers.repec.org/RePEc:taf:uipsxx:v:1:y:2005:i:1:p:10-26
Ordering information: This journal article can be ordered from
http://www.tandfonline.com/pricing/journal/uips20
DOI: 10.1080/15536548.2005.10855759
Access Statistics for this article
Journal of Information Privacy and Security is currently edited by Chuleeporn Changchit
More articles in Journal of Information Privacy and Security from Taylor & Francis Journals
Bibliographic data for series maintained by Chris Longhurst ().