Identity Assurance for Information Assurance

Hitoshi Kokumai
1 min readOct 22, 2023

--

itgovernanceusa.com

“Information Assurance(IA): definition & explanation” https://www.itgovernanceusa.com/information/information-assurance

A friend suggested me to write something on the message below.

It reads “Information Assurance (IA) is essentially protecting information systems, and is often associated with the following five pillars: Integrity, Availability, Authentication, Confidentiality and Nonrepudiation (in this order).

The five pillars of information assurance can be applied various ways, depending on the sensitivity of your organization’s information or information systems.”

I am not a little concerned that ‘authentication’ is placed on the same plane along with four other pillars., although ‘authentication’ has an especially unique status that four other pillars do not have -

Assume that you are responsible for running a system that is perfectly designed, implemented and operated in view of Integrity, Availability Confidentiality and Nonrepudiation.

The system would turn into the adversaries’ best weapons when your password is stolen by them, as analysed here — “Value of Identity Assurance — Trivial or Significant?” (21Sep2023) https://www.linkedin.com/posts/hitoshikokumai_international-criminal-court-hacked-amid-activity-7110545195355570176-G38i

This critical observation is often overlooked by too many security professionals. I do wish that security experts in democratic societies pay due attention to the crucial role that identity assurance plays for information assurance.

--

--

Hitoshi Kokumai
Hitoshi Kokumai

Written by Hitoshi Kokumai

Advocate of ‘Identity Assurance by Our Own Volition and Memory’, Inventor of Expanded Password System and Founder of Mnemonic Identity Solutions Limited in UK.

No responses yet