banner

Saden

Employees, Clients, Business Associates and Suppliers: Employees, Clients, business associates and Suppliers do have a constitutional right to be protected against any action or calamity that might befall you or your business, they are relying on you as business owner/Leader to ensure that this right is not infringed.

Information Assurance Processes

The information assurance process typically begins with the enumeration (natural order) and classification of the information assets to be protected. Next, the IA Manager will perform a risk assessment for those assets. Vulnerabilities in the information assets are determined in order identify the threats capable of exploiting the assets. The assessment then considers both the probability and impact of a threat exploiting a vulnerability in an asset, with impact usually measured in terms of cost to the asset's stakeholders. The sum of the products of the threats' impact and the probability of their occurring is the total risk to the information asset.

Intelligence is the First Line of Defence