Monday, April 29, 2019
Asset Inventory Essay Example | Topics and Well Written Essays - 1250 words
Asset Inventory - Essay ExampleAccount counsel Procedure Avoid transmittance of un encrypted reactive data Software Application and Operating system packet Exploitation of faults in application and in operation(p) system software $2,000,000 High Malicious use up, Unauthorized use and System compromise Change Management bar High 0.8 Low 0.05 0.2 LOW $24,000 IT System Interoperability security department metre Patches and updates from a reliable sources Hardware Internal host Hardware Issues/Equipment Failure or outrage Loss or theft of data from server $8,000, 000 Vital System Unavailable Data title and System Restore timeworn High 0.8 Low 0.05 0.2 LOW $96, 000 Continuity of Operations Planning Standard Equipment failure is addressed by design, policy or the stated practice. Databases Inadequate Database Support Data depravity or loss $500,000 critical Computer crime, system compromise, unauthorized access Data Storage Media testimonial Standard Medium 0.7 Low 0.05 0.3 Low $9750 Remote Access Standard Project Management Standard Maintenance of databases is sustained and supported at appropriate security levels Data Disclosure Disclosure of sensitive personal randomness issues. $100,000, 000 low Malicious use, system compromise, unauthorized access Data Classification Standard Medium 0.7 Medium 0.1 0.3 MODERATE $390,000 Acceptable Use Standard Data is made known lonesome(prenominal) to individuals who have a true operational need for the data. Asset Inventory Introduction An IT oriented come with is more prone to information security risks than a regular institution. The caller-up in consideration, Employment maturement Department (EDD) provides services to millions of people under Disability Insurance program which is a complex toil requiring complete security to its clients. The company also offers other services such as Unemployment Insurance, payroll taxes scrutinise and collection, labor and workforce information among others serving a workforce of over 15 million individuals. The company information assets inventory is conducted using Asset Inventory and Risk Assessment table and shows threat depth psychology for some selected assets, their associated threats and the top risks faced by the company and the strategies taken to mitigate them. The strategies ensure achievement of goals, management of risks make use of resources, and carefully assesse the achievement of the information assets security program. Information assets for the company entails all aspects of information may it be spoken, written, printed or electronic. It also covers information handling that involves information creation, viewing, storing or transporting. The information assets that endure in the Company Information assets for this agency encompasses hardware / physical devices that include computer equipment, internal server and Removable Media such as key drives, Data CD/DVDs and portable external) hard drives. Software Applications, ope rating systems, development tools and utilities are also constituted in the information asset inventory. Processes in computing and transmission of critical data (ccommunications), Information databases, system documents and standards and filled information are integral components of asset inventory. On another note human resource especially system administrators
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.