Thursday, June 13, 2019

Asset Inventory Essay Example | Topics and Well Written Essays - 1250 words

Asset Inventory - Essay ExampleAccount Management Procedure Avoid transmission system of un encrypted sensitive data Software Application and Operating system software Exploitation of faults in application and operating system software $2,000,000 High malevolent use, Unauthorized use and System compromise Change Management Standard High 0.8 Low 0.05 0.2 LOW $24,000 IT System Interoperability Security Standard Patches and updates from a unquestionable sources Hardware Internal server Hardware Issues/Equipment Failure or loss Loss or theft of data from server $8,000, 000 Vital System untouchable selective information Backup and System Restore Standard High 0.8 Low 0.05 0.2 LOW $96, 000 Continuity of Operations Planning Standard Equipment failure is addressed by design, policy or the stated practice. infobases Inadequate Database Support Data corruption or loss $500,000 critical Computer crime, system compromise, unauthorized access Data Storage Media Protection Standard Medium 0.7 Low 0.05 0.3 Low $9750 Remote Access Standard Project Management Standard Maintenance of databases is sustained and support at appropriate security levels Data Disclosure Disclosure of sensitive personal information issues. $100,000, 000 low Malicious use, system compromise, unauthorized access Data Classification Standard Medium 0.7 Medium 0.1 0.3 MODERATE $390,000 Acceptable Use Standard Data is made known only to individuals who have a accepted operational need for the data. Asset Inventory Introduction An IT oriented union is more prone to information security risks than a regular institution. The corporation in consideration, Employment Development Department (EDD) provides services to millions of people under Disability Insurance program which is a complex task requiring complete security to its clients. The company also offers other services such as Unemployment Insurance, payroll taxes audit and collection, labor and workforce information among others serving a workforce of over 15 million individuals. The company information assets inventory is conducted using Asset Inventory and Risk Assessment table and shows threat analysis for some selected assets, their associated threats and the top risks confront by the company and the strategies taken to mitigate them. The strategies ensure achievement of goals, management of risks make use of resources, and carefully assesse the achievement of the information assets security program. entropy assets for the company entails all aspects of information may it be spoken, written, printed or electronic. It also covers information handling that involves information creation, viewing, storing or transporting. The information assets that exist in the Company cultivation assets for this agency encompasses nastyware / physical devices that include computer equipment, internal server and Removable Media such as key drives, Data CD/DVDs and portable external) hard drives. Software Applications, operating systems, d evelopment tools and utilities are also constituted in the information asset inventory. Processes in computing and transmission of critical data (ccommunications), Information databases, system documents and standards and filled information are integral components of asset inventory. On another note human resource especially system administrators

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.