top of page

In today's interconnected world, information is the lifeblood of organizations, and ensuring its confidentiality, integrity, and availability is paramount. "Mastering Information Assurance" provides you with the essential knowledge, practical insights, and proven strategies to safeguard digital assets against a wide range of threats. Authored by esteemed expert Kris Hermans, this definitive guide covers the diverse aspects of information assurance, from risk assessment to incident response, enabling you to navigate the complex landscape of information security.


With "Mastering Information Assurance" as your guide, you'll gain the knowledge, skills, and confidence to protect and secure digital assets against ever-evolving threats. Whether you're starting your journey in information security or seeking to enhance your expertise, this comprehensive guide will empower you to become a master of information assurance.

Mastering information assurance

  • 1.Introduction to Information Assurance
    1.1.What is Information Assurance?
    1.2.Historical Perspective
    1.3.Importance of Information Assurance

    2.Information Assurance Principles

    3.Information Assurance and Risk Management
    3.1.Risk Analysis and Management
    3.2.Identifying Threats and Vulnerabilities
    3.3.Information Assurance Controls

    4.Legal, Ethical, and Professional Issues in Information Assurance
    4.1.Regulatory Requirements
    4.2.Ethical Practices in Information Assurance
    4.3.Professional Certification in Information Assurance

    5.Designing a Secure System
    5.1.Information Assurance in System Design
    5.2.Secure System Development Life Cycle
    5.3.Security Architecture and Models

    6.Network Security
    6.1.Network Infrastructure
    6.2.Network Defence Techniques
    6.3.Firewalls and Intrusion Detection Systems

    7.Computer and Software Security
    7.1.Computer System Security
    7.2.Software and Application Security
    7.3.Malware and Attacks

    8.Data Security
    8.1.Data Classification and Control
    8.2.Data Encryption
    8.3.Cloud and Big Data Security

    9.Physical and Operational Security
    9.1.Physical Security Measures
    9.2.Operational Security Measures
    9.3.Personnel Security

    10.Information Assurance Policies, Procedures, and Awareness
    10.1.Policies and Procedures
    10.2.Training and Awareness Programs
    10.3.Incident Response and Recovery

    11.Emerging Trends in Information Assurance
    11.1.AI and Machine Learning in Information Assurance
    11.2.Cyber Threat Intelligence
    11.3.Blockchain and Information Assurance

    12.Future of Information Assurance
    12.1.Predicting Future Threats
    12.2.Evolution of Information Assurance Practices
    12.3.Strategies for Continuous Assurance

    13.About the author

bottom of page