Information Assurance
Knowledge of and the ability to protect information and information systems, ensuring their confidentiality, integrity and availability.
Behavior Statements
Defines the terms: information confidentiality, integrity and availability.
Describes the steps or procedures in general information assurance.
Cites uses of information assurance within the organization.
Identifies common information assurance tools in the market place.
Follows guidelines for information in a department that needs to be protected while working under a supervisor's guidance.
Performs basic steps in the safeguarding of information.
Drafts junior-level countermeasures to handle a variety of information risks.
Tests the effectiveness of information assurance activities within the department.
Selects information assurance tools for the departmental needs.
Classifies and establishes a priority list of information within an organization.
Evaluates the likelihood of information risks and measures how risks may impact the organization as a whole.
Advises on ways to reduce complicated information risks in the likelihood of an emergency.
Evaluates an organization's information assurance projects with auditors and the management team.
Analyzes features and functions for the latest information assurance tools in the market; considers their suitability to the organization.
Evaluates information assurance best practices within the industry; learns principles and practices associated with IA.
Develops an organization's information assurance strategy.
Establishes best practices for information assurance within the industry.
Champions the adoption of advanced information assurance tools within the organization.
Monitors information assurance for industry directions and market trends.
Elaborates on key issues, challenges and solutions that occur during the information assurance process.
Leads in the establishment of information assurance programs within the organization.
Interview Questions
- How did you assess the vulnerability of deployed technologies?
- What kinds of problems did you encounter in the design and development of security certification programs?
- Tell me about your previous experience or involvement in information assurance.
- What kinds of mitigation techniques have you used to minimize risks?
- What kinds of problems did you encounter when implementing web services security strategies?