What are Information Assurance solutions based on?
Security methods can be organized into three categories, including management controls (created by managers), operational controls (implemented by people), and technical controls (implemented by computer systems and software). Common objectives of most security programs and technologies include authentication (verify users and data origin), confidentiality (protecting data from unauthorized access), integrity (ensuring data is accurate and unaltered), non-repudiation (proving participation in an electronic transaction), and authorization (permission to perform a task or operation).