People,procedures,data asset identification-risk management, Computer Network Security

People,Procedures,Data Asset Identification-Risk Management

The human resources, data information and documentation assets are more difficult to identify. People having knowledge, experience, and good judgment should be given this task. These assets should be recorded by taking use of reliable data handling process.

Asset for people are position name, ID, supervisor; number, security clearance level and special skills.

Asset for procedures are description, intended purpose relationship to software, hardware and storage location for reference and update.

Asset attributes for data are classification, creator, manager, owner, data structure size, data structure used, online or offline, location, backup procedures employed.

Posted Date: 10/8/2012 6:05:36 AM | Location : United States







Related Discussions:- People,procedures,data asset identification-risk management, Assignment Help, Ask Question on People,procedures,data asset identification-risk management, Get Answer, Expert's Help, People,procedures,data asset identification-risk management Discussions

Write discussion on People,procedures,data asset identification-risk management
Your posts are moderated
Related Questions
Detect each visit to www.google.com that is made by the machine. o Send an alert when an activity relating to network chat is detected. o Send an alert when an attempt is made for

(a) Draw the waveform for an asynchronous transmission with the given specifications: 8 data bits with value 11010001 (LSB listed first here), one parity bit (even), one star

STAR TOPOLOGY In this topology, all devices are attached to a central point, which is sometimes known as the "Hub" as given in the diagram below.   Figure: An ideal

(a) Explain the two possible configuration for 3DES. (b) What is the main disadvantage of 3DES? (c) Why are most modern symmetric algorithm block ciphers? (d) Describe

An overall rise in mobility, coupled with the falling cost of Wi-Fi equipment, has led to a proliferation of Wi-Fi hot spots in public areas to provide Internet accessibility. Thus

QUESTION (a) Describe the difference between static routing and dynamic routing algorithms. (b) List four functions that are performed by the Cisco IOS software during b

Question 1 (a) Explain briefly the following terms as used in network security: (i) Denial of service (DoS) attack (ii) Birthday attack (iii) DeMilitarized Zone

Problem (a) The IEEE 802 series of standards describe both the Physical and Data Link layers of their respective technologies. Two important standards are 802.3 and 802.5, respect

ADDRESS RESOLUTION WITH MESSAGE EXCHANGE An alternative to local calculation is a distributed function. A computer that requires to find an address transmits a message across

#questioAn elliptic curve y^2=x^3+ax+b(mod29) includes points P=(7, 15) and Q=(16, 13) a)Determine the equation of the crve b) Determine all values of x for which there is no point