Affiliation:
1. Executive Director, MCIS, Department of CIS, Raiganj University (RGU), West Bengal, India
2. Vice Chancellor, Srinivas University, Karnataka, India
Abstract
Information Assurance, in short, is called as IA. This is responsible for securing informationsystems and computing. The term holds the highest degree of security related affairs. Ingenerally Computer Security considered as a branch and area of security but now apart fromthis, Information Security, IT Security, and Information Assurance considered as important.And among these, security related domain Information Assurance treated as broader andinterdisciplinary. Moreover, this Information Assurance holds all the areas and dealing of ITSecurity and Information Security but additionally, it is responsible for the designing,development of policies, regulation and guidelines of security related projects /proposal, etc.And among the administrative and protocol related affairs Security Content AutomationProtocol treated as important. In short, it is called as SCAP. It is a kind of method for usingspecific standards for the purpose of enabling vulnerability management systems in anautomated way for the measurement as well as policy compliance assessment regarding thesystems inbuilt in a company or institutions; that may include IT company or may not be.This is a conceptual paper, initially, it has discussed with the areas of Information Assurancebut gradually it has described about the Security Content Automation Protocol; including itsaim and objectives, versions, etc. paper mentioned all the areas in short and simple sense.
Reference22 articles.
1. Al-Shaer, E. (2011). Security automation research: Challenges and future directions. IAnewsletter, 14(4), 14-18.
2. Aslam, M., Gehrmann, C., & Björkman, M. (2013). Continuous security evaluation and auditing of remote platforms by combining trusted computing and security automation techniques. In Proceedings of the 6th International Conference on Security of Information and Networks (pp. 136- 143). ACM.
3. Borgesius, F. Z., Gray, J., & Van Eechoud, M. (2015). Open data, privacy, and fair information principles: Towards a balancing framework. Berkeley Technology Law Journal, 30(3), 2073-2131
4. Bulgurcu, B., Cavusoglu, H., & Benbasat, I. (2010). Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 34(3), 523-548.
5. Burr, W., Ferraiolo, H., & Waltermire, D. (2013). NIST and computer security. IT Professional, 16(2), 31-37.