Podcast
Questions and Answers
Which of the following is considered a human asset within an organization?
Which of the following is considered a human asset within an organization?
- Brand reputation
- Physical servers
- Software applications
- Staff members (correct)
Intangible assets can include elements like brand and reputation.
Intangible assets can include elements like brand and reputation.
True (A)
What does the Recovery Time Objective estimate?
What does the Recovery Time Objective estimate?
The duration an organization can operate without an asset.
_________ controls are part of the systems and services that support an organization.
_________ controls are part of the systems and services that support an organization.
Match the following asset classes with their examples:
Match the following asset classes with their examples:
What is a common concern when discussing physical assets?
What is a common concern when discussing physical assets?
What is the primary goal of asset identification in information security?
What is the primary goal of asset identification in information security?
Human assets are generally not a source of vulnerabilities for organizations.
Human assets are generally not a source of vulnerabilities for organizations.
Intangible assets, such as brand and reputation, are not considered key assets in information security.
Intangible assets, such as brand and reputation, are not considered key assets in information security.
What are the phases of the information life cycle?
What are the phases of the information life cycle?
What might occur if the power grid goes down?
What might occur if the power grid goes down?
The primary focus of asset identification includes _____, software, hardware, services, people, and intangibles.
The primary focus of asset identification includes _____, software, hardware, services, people, and intangibles.
Which of the following is not typically included in an asset register?
Which of the following is not typically included in an asset register?
Match the type of asset to its description:
Match the type of asset to its description:
Acquisition of information can only occur through new software purchases.
Acquisition of information can only occur through new software purchases.
What is a key element that may be required when acquiring information?
What is a key element that may be required when acquiring information?
What is the primary purpose of an asset register?
What is the primary purpose of an asset register?
An asset's likelihood of damage is not related to its impact on a business.
An asset's likelihood of damage is not related to its impact on a business.
What are the two main components that evaluate the potential effect of asset loss?
What are the two main components that evaluate the potential effect of asset loss?
The __________ of damage/loss for the customer credit card database is categorized as low.
The __________ of damage/loss for the customer credit card database is categorized as low.
Match the following asset categories with their descriptions:
Match the following asset categories with their descriptions:
What is a key consideration when managing archived data sets?
What is a key consideration when managing archived data sets?
Only authorized personnel should have access to archival data.
Only authorized personnel should have access to archival data.
What is one method to ensure proper destruction of physical data storage devices?
What is one method to ensure proper destruction of physical data storage devices?
Information that is not in use should have __________ controls applied to prevent unauthorized access.
Information that is not in use should have __________ controls applied to prevent unauthorized access.
Match the data management processes with their focus:
Match the data management processes with their focus:
Which of the following is NOT a potential challenge in data disposal?
Which of the following is NOT a potential challenge in data disposal?
Data must be retained indefinitely to avoid data loss.
Data must be retained indefinitely to avoid data loss.
Name a type of security that is important for safeguarding databases.
Name a type of security that is important for safeguarding databases.
Which category has the longest timeframe for response?
Which category has the longest timeframe for response?
An urgent task needs to be addressed within 72 hours.
An urgent task needs to be addressed within 72 hours.
What is the maximum allowable outage for the LAN Server?
What is the maximum allowable outage for the LAN Server?
The loss of __________ can lead to delayed income.
The loss of __________ can lead to delayed income.
Which of the following is considered a critical resource?
Which of the following is considered a critical resource?
Match the following processes with their corresponding resource priority:
Match the following processes with their corresponding resource priority:
Which of the following could result from a loss of reputation?
Which of the following could result from a loss of reputation?
What is one example of a violation that could arise from asset loss?
What is one example of a violation that could arise from asset loss?
Flashcards
Asset
Asset
Anything of value that's essential for a business to operate.
Asset Identification
Asset Identification
The process of identifying all the assets a company has.
Asset Register
Asset Register
A document that lists all key assets and who manages them.
Information Assets
Information Assets
Signup and view all the flashcards
Information Life Cycle
Information Life Cycle
Signup and view all the flashcards
Information Acquisition
Information Acquisition
Signup and view all the flashcards
Information Classification
Information Classification
Signup and view all the flashcards
Information Security Measures
Information Security Measures
Signup and view all the flashcards
Information Use
Information Use
Signup and view all the flashcards
Information Archival
Information Archival
Signup and view all the flashcards
Information Disposal
Information Disposal
Signup and view all the flashcards
Information Lifecycle Infrastructure
Information Lifecycle Infrastructure
Signup and view all the flashcards
Software/Service Assets
Software/Service Assets
Signup and view all the flashcards
Asset Ownership
Asset Ownership
Signup and view all the flashcards
Impact of Damage/Loss
Impact of Damage/Loss
Signup and view all the flashcards
Likelihood of Damage/Loss
Likelihood of Damage/Loss
Signup and view all the flashcards
Asset Group Overview
Asset Group Overview
Signup and view all the flashcards
Physical Assets
Physical Assets
Signup and view all the flashcards
Systems and Services
Systems and Services
Signup and view all the flashcards
Human Assets
Human Assets
Signup and view all the flashcards
Intangible Assets
Intangible Assets
Signup and view all the flashcards
Asset Classification
Asset Classification
Signup and view all the flashcards
Process Analysis
Process Analysis
Signup and view all the flashcards
Recovery Time Objective (RTO)
Recovery Time Objective (RTO)
Signup and view all the flashcards
Estimating RTO
Estimating RTO
Signup and view all the flashcards
Risk
Risk
Signup and view all the flashcards
Impact
Impact
Signup and view all the flashcards
Control
Control
Signup and view all the flashcards
Critical Asset
Critical Asset
Signup and view all the flashcards
Risk Management
Risk Management
Signup and view all the flashcards
Maximum Allowable Outage
Maximum Allowable Outage
Signup and view all the flashcards
Asset Valuation
Asset Valuation
Signup and view all the flashcards
Study Notes
Information Security Lecture 5 - Assets
- Assets are anything with value that contributes to business operations.
- Asset identification is the first stage in risk assessment.
- The goal of this initial phase is the creation of an asset register.
- The asset register lists all important assets and who is responsible for them.
Asset Identification
- Information assets include both electronically and physically stored data.
- Software assets include operating systems, applications, and development tools.
- Physical assets are those that manipulate information (e.g., computers, servers, wiring, and fiber).
- Services support the business process (e.g., heating, cooling, power, and lighting).
- People possessing the skills and knowledge to support or implement business processes are also considered assets.
- Intangible assets include brand reputation.
Asset Focus
- The diagram illustrates the different types of assets under junior and senior focus.
- Categories include intangible assets, people, systems and services, physical assets, hardware and software, information, and data.
Information Assets
- Information assets include digital assets within server databases, removable media, and traditional paper.
- Business-critical knowledge held by staff members is also an asset.
- Information can be acquired from other sources (e.g. buying datasets or taking customer details).
- Some information is created from scratch (e.g. by research and development companies).
The Information Life Cycle
- The information life cycle, in its simplest form, includes acquisition, use, archiving, and disposal.
Acquisition
- Assets may be acquired from various sources.
- Web portals or dedicated interfaces are used.
- Forms completed during business processes are also used.
- Processing is usually required to make information useful, including attaching metadata, and applying policy controls (like encryption when needed).
Use
- Prepared and stored information can be used as part of business processes.
- It is used and modified by many users.
- Defining appropriate metadata during the acquisition stage is important, as use is one of the most challenging stages for CIA (confidentiality, integrity, availability).
- Internal consistency across data stores is critical.
Archival
- What happens to information when it is not in use?
- Unauthorized access/modification can occur without appropriate controls.
- Archiving can be a basis for data backups, but it isn't the same as archiving.
- Controls need to be applied to archived data to protect it.
- Encryption is a minimum level of protection for archives.
Disposal
- Information needs to be deleted at the right time; not so soon that it is impossible to recover it in the case of an attack, but not so long that costs and compliance issues are impacted.
- Data must be properly destroyed (e.g. physical devices wiped, degaussed or shredded).
- Distributed data requires careful removal of all copies
- Dealing with third parties presents additional challenges.
Data in Use, Motion, and Rest
- Data in use is actively changed and stored in databases, warehouses, and spreadsheets (e.g, active data under constant change).
- Data in motion is data being transferred on a network, or temporarily stored in a computer's memory to be read or updated (e.g., data traversing a network).
- Data at rest resides in storage, like databases, data warehouses, spreadsheets, archives, tapes or offsite backups (e.g., inactive data stored physically).
Infrastructure
- Crucial infrastructure used during all stages.
- Understanding infrastructure helps identify threat vectors and assess risk.
- Key areas to consider include server/network security, database security, and host-based security.
Software/Service Assets
- Software/services provide access to data or tools to process data.
- Data accuracy and algorithms need careful consideration.
- Software/services are distributed throughout the network on host machines, servers and customer-facing websites.
- Denial-of-service attacks can prevent access to information.
Physical Assets
- Physical assets house software/business and provide communication channels.
- Physical damage/attacks to physical assets are significant.
- Considerations extend to network-based attacks.
Systems and Services
- Support systems like IT infrastructure, environmental controls, financial or legal support (where applicable).
- May not want to solely consider attacks (e.g., power outage).
Human Assets
- Staff and stakeholders are crucial parts of an organisation.
- They are a source of knowledge, skills and experience that is often irreplaceable.
- They can also be a primary source of vulnerabilities.
- Staff turnover can be a security issue.
Intangible Assets
- Intangible assets include brand, reputation, and broader organisational ideas.
- Their value can vary depending on the organisation.
- Attacks can target intangible assets by compromising other assets.
- The case for a comprehensive ISMS can be assisted by understanding and defining these intangible assets.
Asset Register
- List all assets and their importance/evaluation with who is accountable.
- The owner of an asset should be involved in risk analysis.
Example (Asset Register entry)
- Shows entries that would need information about the asset involved.
Estimating the Recovery Time Objective (RTO)
- Calculate how long an organisation can function without an asset.
- Asset classifications like non-essential (30 days), normal (7 days), important (72 hours), urgent (24 hours) and critical (minutes to hours) can be used.
- Critical assets need strong backups and redundancy.
Assigning value to assets
- Each asset is characterised according to its importance to a particular organisational process.
- These include loss of reputation, loss of competitive advantage, increase in operational expenses, contract violations, delayed income, loss in revenue, and loss in productivity.
Studying That Suits You
Use AI to generate personalized quizzes and flashcards to suit your learning preferences.
Related Documents
Description
Test your knowledge on asset management in information security. This quiz covers various types of assets, their classifications, and the importance of asset identification. Understand key concepts like Recovery Time Objective and the information life cycle phases to boost your expertise.