People,procedures,data asset identification-risk management, Computer Network Security

People,Procedures,Data Asset Identification-Risk Management

The human resources, data information and documentation assets are more difficult to identify. People having knowledge, experience, and good judgment should be given this task. These assets should be recorded by taking use of reliable data handling process.

Asset for people are position name, ID, supervisor; number, security clearance level and special skills.

Asset for procedures are description, intended purpose relationship to software, hardware and storage location for reference and update.

Asset attributes for data are classification, creator, manager, owner, data structure size, data structure used, online or offline, location, backup procedures employed.

Posted Date: 10/8/2012 6:05:36 AM | Location : United States







Related Discussions:- People,procedures,data asset identification-risk management, Assignment Help, Ask Question on People,procedures,data asset identification-risk management, Get Answer, Expert's Help, People,procedures,data asset identification-risk management Discussions

Write discussion on People,procedures,data asset identification-risk management
Your posts are moderated
Related Questions
BUSINESS NEEDS Information security performs four main functions for an organization. 1. Protects the ability of organization to function. 2. Enables safe operation of applicat

Question 1 a) What is a NMS? Question 2 Explain about Structure of Management Information Question 3 A)In which UDP port number does a protocol entity receive message?

QUESTION (a) Define and distinguish between Electronic Commerce and Electronic Business (b) According to you what are the benefits that Electronic Commerce can brings to org

Question : (a) What do you meant by the term "Bastion Host"? What is its use? (b) "Hostile" Java applets will do undesirable actions. Mention two problems caused by Hosti

Question 1 (a) Explain briefly the following terms as used in network security: (i) Denial of service (DoS) attack (ii) Birthday attack (iii) DeMilitarized Zone

Network diagram for a mediacal care

Gateways They transfer packets among network machines that have different protocols (e.g. between a WAN and a LAN). They access a packet formatted for one protocol and change

What questions should Iris ask Charlie about the new job, about Kelvin''s team, and about the future of the company?


Question: (a) What are the various options to mitigate risks in an Information Security Management System (ISMS)? For each option specify an instance where it can be used.