People,procedures,data asset identification-risk management, Computer Network Security

People,Procedures,Data Asset Identification-Risk Management

The human resources, data information and documentation assets are more difficult to identify. People having knowledge, experience, and good judgment should be given this task. These assets should be recorded by taking use of reliable data handling process.

Asset for people are position name, ID, supervisor; number, security clearance level and special skills.

Asset for procedures are description, intended purpose relationship to software, hardware and storage location for reference and update.

Asset attributes for data are classification, creator, manager, owner, data structure size, data structure used, online or offline, location, backup procedures employed.

Posted Date: 10/8/2012 6:05:36 AM | Location : United States

Related Discussions:- People,procedures,data asset identification-risk management, Assignment Help, Ask Question on People,procedures,data asset identification-risk management, Get Answer, Expert's Help, People,procedures,data asset identification-risk management Discussions

Write discussion on People,procedures,data asset identification-risk management
Your posts are moderated
Related Questions
Designing and coding of Job search mechanism: Project Title: FREEHIVE (Sep 2005- Nov 2006) Role             : Developer Domain         : Social Network Client

QUESTION An analog sensor is used to monitor the temperature of sea water at different depth. The sensor is fitted to a buoy and incorporates a wireless transmitter that send

Encode the following plaintext, using the Caesar cipher: LORD OF THE RINGS b) The following ciphertext jw njbh lxmn cx kanjt has been encoded using a

What is one-time pad for encryption?  Describe how it offers both Confusion and Diffusion. Using the letter encoding discussed in class (along with one-time

Write down the short notes on VTR.  Communication between different types of the equipment and software is made possible by making use of the networks. Full-screen text editor is s

Access Controls Access controls addresses admission of a user into a trusted area of organization. It comprises of a combination of policies & technologies. The ways to control

Cryptographic algorithms Cryptographic algorithms are broadly classified into two broad categories. They are stated below 1.  Symmetric Encryption and 2.  Asymmetric Encryptio

SHIFT OPERATION:  This operation replaced all bits to the left one position. For example in the diagram below a 16-bit CRC hardware is given, which needs three Exclusive OR (

what are the participant of marketing channal?

Information asset classification-risk management A number of organizations have data classification schemes (for instance confidential, internal, public data). The classificat