Asset Inventory. Write a 1250 word paper answering; Account Management Procedure Avoid transmission of un encrypted sensitive data Software Application and Operating system software Exploitation of faults in application and operating system software $2,000,000 High Malicious use, Unauthorized use and System compromise Change Management Standard High 0.8 Low 0.05 0.2 LOW $24,000 IT System Interoperability Security Standard Patches and updates from a reliable sources Hardware Internal server Hardware Issues/Equipment Failure or loss Loss or theft of data from server $8,000, 000 Vital System Unavailable Data Backup and System Restore Standard High 0.8 Low 0.05 0.2 LOW $96, 000 Continuity of Operations Planning Standard Equipment failure is addressed by design, policy or the stated practice. Databases Inadequate Database Support Data corruption or loss $500,000 critical Computer crime, system compromise, unauthorized access Data Storage Media Protection Standard Medium 0.7 Low 0.05 0.3 Low $9750 Remote Access Standard Project Management Standard Maintenance of databases is sustained and supported at appropriate security levels Data Disclosure Disclosure of sensitive personal information issues. $100,000, 000 low Malicious use, system compromise, unauthorized access Data Classification Standard Medium 0.7 Medium 0.1 0.3 MODERATE $390,000 Acceptable Use Standard Data is made known only to individuals who have a true operational need for the data.

Asset Inventory Introduction

An IT oriented company is more prone to information security risks than a regular institution. The company in consideration, Employment Development Department (EDD) provides services to millions of people under Disability Insurance program which is a complex task requiring complete security to its clients. The company also offers other services such as Unemployment Insurance, payroll taxes audit and collection, labor and workforce information among others serving a workforce of over 15 million individuals.

The company information assets inventory is conducted using Asset Inventory and Risk Assessment table and shows threat analysis for some selected assets, their associated threats and the top risks faced by the company and the strategies taken to mitigate them. The strategies ensure achievement of goals, management of risks. make use of resources, and carefully assess the achievement of the information assets security program. Information assets for the company entails all aspects of information may it be spoken, written, printed or electronic. It also covers information handling that involves information creation, viewing, storing or transporting.

The information assets that exist in the Company Information assets for this agency encompasses hardware / physical devices that include computer equipment, internal server and Removable Media such as key drives, Data CD/DVDs and portable external) hard drives. Software Applications, operating systems, development tools and utilities are also constituted in the information asset inventory. Processes in computing and transmission of critical data (ccommunications), Information databases, system documents and standards and filled information are integral components of asset inventory.

“Struggling with a similar assignment?”

Place an order below and we’ll get it done within the deadline selected.