People,procedures,data asset identification-risk management, Computer Network Security

People,Procedures,Data Asset Identification-Risk Management

The human resources, data information and documentation assets are more difficult to identify. People having knowledge, experience, and good judgment should be given this task. These assets should be recorded by taking use of reliable data handling process.

Asset for people are position name, ID, supervisor; number, security clearance level and special skills.

Asset for procedures are description, intended purpose relationship to software, hardware and storage location for reference and update.

Asset attributes for data are classification, creator, manager, owner, data structure size, data structure used, online or offline, location, backup procedures employed.

Posted Date: 10/8/2012 6:05:36 AM | Location : United States







Related Discussions:- People,procedures,data asset identification-risk management, Assignment Help, Ask Question on People,procedures,data asset identification-risk management, Get Answer, Expert's Help, People,procedures,data asset identification-risk management Discussions

Write discussion on People,procedures,data asset identification-risk management
Your posts are moderated
Related Questions
The "Big Red Rocks" (BRR) mining company is based and operates in Western Australia. They are primarily an iron ore miner, but they also produce electricity through tidal power to

Question 1: (a) With the help of a diagram show the basic structure of a computer system. (b) Explain as fully as you can each of the parts mentioned above. (c) What are

The following message was enciphered with a Vigenère cipher. aikiaawgfspxeppvjabjnivulfznzvkrlidamsmyamlvskniyffdpbwtnxsvvbtnamvltsefoeycztkomylmerkwrs deusjgecmzkwvnreeyp

Identify Possible Controls For each threat and linked vulnerabilities which have residual risk, create primary list of control ideas. Residual risk is the risk which remains to

Question : Environmental Accounting is a means for businesses to fulfill their responsibilities for accountability to stakeholders. (a) What do you understand by Environment

Question: (a) State the strong law of large numbers. (b) Data have been collected on response times (in minutes) at a fire station. The data are 2:7 1:8 0:8 1:4 1:2 (i

Network diagram for a mediacal care

Government funding has been given to a university consortium establishing a repository of resources for school teachers. They have engaged you to develop a search facility for teac


INTRODUCTION TO PHYSICAL SECURITY The Physical security addresses design, execution, and maintenance of countermeasures which protect physical resources of an organization. The