Hardware,software,network asset identification, Computer Network Security

Hardware, Software, and Network Asset Identification

What information attributes to track is dependent on:

•    Requires of organization/risk management efforts
•    Management requires of information security/information technology communities

Asset attributes which are to be considered are: name; MAC address; IP address; element type; serial number; manufacturer name; model or part number; software version; physical or logical location; controlling entity

Posted Date: 10/8/2012 6:07:13 AM | Location : United States







Related Discussions:- Hardware,software,network asset identification, Assignment Help, Ask Question on Hardware,software,network asset identification, Get Answer, Expert's Help, Hardware,software,network asset identification Discussions

Write discussion on Hardware,software,network asset identification
Your posts are moderated
Related Questions
Advantages and Disadvantage of Packet Filtering firewall   Advantages One screening router can help protect entire network One key advantage of packet filter

QUESTION (In this question, you will need to use the ISO 27001:2005 and ISO 27002:2005 standards) For each of the situations below, comment on the following: 1. Mention

THREADS AND ATTACKS Threat is an object, person, or other entity which represents a constant danger to an asset. To make sound decisions about information security, management s

Question 1 a) What is a NMS? Question 2 Explain about Structure of Management Information Question 3 A)In which UDP port number does a protocol entity receive message?

(a) Using Fermat's theorem, find 3 201 mod 11. (b) Explain how the Diffie-Hellman key agreement protocol works and what its purpose and main properties are. Consider a Dif

The key concepts and frameworks covered in modules 1-4 are particularly relevant for this assignment. Assignment 2 relates to the specific course learning objectives 1, 2 and 3:

Question: Suppose the following brief history of WLAN security standards: When the security of WEP was broken, the industry turned to the IEEE to fix it. The IEEE said it could

Question: (i) ‘Implementation' is a critical stage of the Systems Development Life Cycle. Show the four approaches which are commonly used to implement information systems in

Question 1: (a) Define Artificial Intelligence. (b) Briefly describe the categories for the definition of Artificial Intelligence. (c) Identify the four basic types of

Example 3: Logic bombs In the year 2000, Timothy Lloyd was found responsible of causing $10 million and $12 million of damage to Omega Engineering, an American company specializ