The Information Assurance Platform is a trust and assurance platform that is open, decentralised and governed by the community.
It allows applications to leverage the Information Assurance Toolbelt, including CyberTraces, CyberChains, CyberShields and CyberStates, to perform functions such as distributed computation, attestation and verification interactions, validation functions, and related operations surrounding the storage, processing and transmission of information for individuals, organisations (inc. DAOs), companies, NGOs and governments anywhere, while data owners and operators can retain full control over the extent to which information is private.
The IAP is possible thanks to the IAP token. IAP tokens function as a crypto-economic incentive to enable the distributed power, security and scalability of the network. Integral to the operation of the platform and provision of the service, IAP tokens provide the technical glue that bind the components of the system together, enabling seamless, secure and reliable next generation distributed ledger technology services for information assurance.
The IAP provides the ability for anyone to create CyberTraces, CyberChains, CyberShields and CyberStates. The platform enables the generation of evidence that assures others of data security and the facts surrounding its storage, transmission and processing. The IAP does this without compromising the privacy of data and retaining data sovereignty rights.
CyberTraces are independently verifiable, trust-free (non reliant on trust), evidence events. They can be used to cut out intermediaries such as trusted third parties and assure the confidentiality, integrity and availability of data, processes and systems. CyberChains create chains of evidence by tying together CyberTraces in a way that maintains Chain of Custody (CoC) for verifying parties such as auditors, assessors, central authorities, supply chains or other interested parties. CyberShield is a computational tool that assures the computational integrity of the functionality of the tools within the IAP. They use a variety of zero knowledge proofs to provide the ability for independent verification of tool output while maintaining privacy and confidentiality of the work. CyberStates report on the internal state of any device. The state is represented by a data stream or file or collection of files that exist within the device, providing a distributed file integrity monitoring capability that is also authenticated, decentralised, reliable, and accessible globally.
- The IAP is a decentralised platform for Information Assurance, which includes Information Security and Cybersecurity.
- Team of over 20 experts in the fields of Information Assurance, Cybersecurity, GRC, Artificial Intelligence and Academia.
- IAP core includes multiple public blockchains for enhanced, transparent trust and security.
- IAP chains enables massively distributed secure and assured computing and data verification interactions with Evidence Chains.
- Tried and tested cryptography with modern applications of existing cryptographic primitives for IA.
- IAP tokens provide security, scalability and crypto-economic incentives for ethical network operations.
Attention. There is a risk that unverified members are not actually members of the team
This offer is based on information provided solely by the offeror and other publicly available information. The token sale or exchange event is entirely unrelated to ICOholder and ICOholder has no involvement in it (including any technical support or promotion). Token sales listed from persons that ICOholder has no relationship with are shown only to help customers keep track of the activity taking place within the overall token sector. This information is not intended to amount to advice on which you should rely. You must obtain professional or specialist advice or carry out your own due diligence before taking, or refraining from, any action on the basis of the content on our site. Any terms and conditions entered into by contributors in respect of the acquisition of Tokens are between them and the issuer of the Token and ICOholder is not the seller of such Tokens. ICOholder has no legal responsibility for any representations made by third parties in respect of any Token sale and any claim for breach of contract must also be made directly against the Token issuing entity listed herein.
If you have any concerns about the nature, propriety or legality of this token sale or the persons involved in it please contact [email protected] with detailed information about your concerns.