Hardware,software,network asset identification, Computer Network Security

Hardware, Software, and Network Asset Identification

What information attributes to track is dependent on:

•    Requires of organization/risk management efforts
•    Management requires of information security/information technology communities

Asset attributes which are to be considered are: name; MAC address; IP address; element type; serial number; manufacturer name; model or part number; software version; physical or logical location; controlling entity

Posted Date: 10/8/2012 6:07:13 AM | Location : United States







Related Discussions:- Hardware,software,network asset identification, Assignment Help, Ask Question on Hardware,software,network asset identification, Get Answer, Expert's Help, Hardware,software,network asset identification Discussions

Write discussion on Hardware,software,network asset identification
Your posts are moderated
Related Questions
Produce a short report of your experiences in installing and using PGP. The report should be written in the form of a journal that contains at least the following items: A de

Problem 1: What is the function of AUC in the GSM architecture? Explanation of HLR(AUC) Architecture of GSM Problem 2: Show the layered architecture of t

Example 3: Logic bombs In the year 2000, Timothy Lloyd was found responsible of causing $10 million and $12 million of damage to Omega Engineering, an American company specializ

VULNERABILITY SCANNERS Active vulnerability scanners scan networks for detailed information, it initiate traffic to determine security holes. This scanner identifies usernames a

COMPONENTS OF AN INFORMATION SYSTEM The components of an information system are software, data, hardware, people, procedures and Networks. These 6 components are critical to ena

Question 1 a) Provide three advantages of using optical fiber. b) Distinguish between "Direct Sequence Modulation" and "Frequency Hopping" c) Decribe the purpose of using "

Question: (a) A string of ciphertext was enciphered using an a±ne transformation of single letters in a 28-letter alphabet consisting of A to Z, a blank and a?, where A to Z ha

The Security Systems Development Life Cycle (SecSDLC) The same phases which is used in traditional SDLC can be adapted to support specialized implementation of IS project,At its


An injunction to 'think ethically' about a situation is not helpful. Perhaps if one has a background in moral philosophy this would work, but usually both students and IT professio