The Evolution of Information Protection

April 22, 2011
Cyber Security, FedCyber Wire
No Comment

via Armed with Science

Information protection has evolved along with our information technology. Ciphers first protected written information. Ciphers then evolved into cryptography, which evolved into information security (INFOSEC). INFOSEC evolved even more when it fully incorporated computer security. And, near the time the Defense Technical Information Center (DTIC) first stood up the Information Assurance Technology Analysis Center (IATAC) in 1998, information security and computer security were evolving into information assurance (IA).

Generally speaking, IA ensures the confidentiality, integrity, availability, non-repudiation, and authentication of information. As the DoD IA Center of Excellence, IATAC performs IA research and analysis for various government organizations, working across industry and academia to ensure state of the art information is readily available to those who need it.

For example, IATAC has been instrumental in standing up the U.S. Pacific Command-sponsored All Partners Access Network (APAN), an unclassified virtual workspace that facilitates collaboration across public, private, and non-governmental organizations. APAN was deployed in Chile and Haiti to facilitate disaster relief and humanitarian assistance efforts following their 2010 earthquakes. APAN is currently deployed in Japan to ensure relief organizations can share information and coordinate efforts more effectively. IATAC helps ensure that information is accurate and made widely available to APAN users in Japan, showcasing how important it is for information to have integrity and be available in emergency situations.

As technology and policy has evolved even further, cybersecurity has become an important aspect of information protection. IATAC has had the opportunity to take part in this evolution.

Continued here.