© Sanjib Sinha 2018
Sanjib SinhaBeginning Ethical Hacking with Kali Linuxhttps://doi.org/10.1007/978-1-4842-3891-2_11

11. Information Assurance Model

Sanjib Sinha1 
(1)
Howrah, West Bengal, India
 

When I talk about information security, I’m actually talking about a specific model; this security model is widely described as the information security model or the information assurance (IA) model. Some people love to debate whether to treat these two models separately; regardless, as a security professional, you need to have a general idea of what the IA model is, how it works, and why it is important from a modern security perspective. Proponents of the information security model opine that it is the same as the IA model. The information security model ...

Get Beginning Ethical Hacking with Kali Linux: Computational Techniques for Resolving Security Issues now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.