You are on page 1of 2

Polo Llatuna

BSIT-3R3

Assignment 1

Define the terms and provide an example for each word listed below.

1. Information assurance - is the practice of making sure that a certain data or risks are managed
appropriately throughout application usage, storage, processing, and transmission. The practice
involves taking specific measures to protect the user’s data.

Ex.

A company that is converting their paper data or record to digital record.

2. Information security - are processes and tools which are designed to protect sensitive business
information from modification, disruption, destruction, and inspection.

Ex.

Passwords, firewalls, and network intrusion detection.

3. Authenticity - is the quality of being real, genuine, legitimate, etc.

Ex.

Being authentic is supported by facts to make it real.

4. Integrity - refers to practices of ensuring that data is real, accurate and safeguarded from
unauthorized user modification.

Ex.

Encryption, user access controls, and version control.


5. Non-repudiation - is the assurance that someone can’t deny the validity of something. It is also a
legal concept that is widely used in information security and refers to a service, which provides proof
of the origin of data and the integrity of the data.

Ex.

if you take a pen and sign a contract your signature is a non-repudiation device. You can’t later
disagree to the terms of the contract or refute ever taking part to the agreement.

6. Confidentiality - the privacy of information, including authorizations to view, share, and use it.

Ex.

Protecting data against unintentional, unlawful, or unauthorized access.

7. Availability - is protecting the functionality of support systems and ensuring data is fully available
at the point in time when it is needed by its users.

Ex.

Off-site back ups.

You might also like