People,procedures,data asset identification-risk management, Computer Network Security

People,Procedures,Data Asset Identification-Risk Management

The human resources, data information and documentation assets are more difficult to identify. People having knowledge, experience, and good judgment should be given this task. These assets should be recorded by taking use of reliable data handling process.

Asset for people are position name, ID, supervisor; number, security clearance level and special skills.

Asset for procedures are description, intended purpose relationship to software, hardware and storage location for reference and update.

Asset attributes for data are classification, creator, manager, owner, data structure size, data structure used, online or offline, location, backup procedures employed.

Posted Date: 10/8/2012 6:05:36 AM | Location : United States







Related Discussions:- People,procedures,data asset identification-risk management, Assignment Help, Ask Question on People,procedures,data asset identification-risk management, Get Answer, Expert's Help, People,procedures,data asset identification-risk management Discussions

Write discussion on People,procedures,data asset identification-risk management
Your posts are moderated
Related Questions
(a) Describe the concept of zero knowledge proofs. Give a practical example. (b) Explain how a one way hash function works. (c) What are message authentication codes? (d)

USING ICMP TO TEST REACHABILITY:  ICMP can also be used to test several tools. An Internet host A, is reachable from another host B, if data packets can be send from A to B. P

Question: Quality management standards are seen as a major pillar supporting the drive for continuous quality improvement through TQM. (a) What do you meant by the term ‘Qua

What is one-time pad for encryption?  Describe how it offers both Confusion and Diffusion. Using the letter encoding discussed in class (along with one-time

Question : (a) What do you meant by the term "Bastion Host"? What is its use? (b) "Hostile" Java applets will do undesirable actions. Mention two problems caused by Hosti

For this assessment, students must research and analyse two different scenarios. The two scenarios must be chosen from those described below and submitted as one Microsoft PowerPoi

Network security has become much more complex than ever before. New types and sources of network security threats, always-on high-speed Internet connections, wireless networking, a

In Star topology all computers are connected using a central device known as hub. Star networks are one of the most general computer network topologies. In its simplest way, a

Q. Attacks on wireless network WSN are vulnerable to attacks which compromise the integrity of the WSN nodes by decreasing the nodes' fault tolerance capabilities, data distrib

CARRIER  SENSE MULTIPLE ACCESS (CSMA) There is no central access management when computers transfer on Ethernet. For this solution the Ethernet employs CSMA to coordinate tran