To install click the Add extension button. That's it.

The source code for the WIKI 2 extension is being checked by specialists of the Mozilla Foundation, Google, and Apple. You could also do it yourself at any point in time.

4,5
Kelly Slayton
Congratulations on this excellent venture… what a great idea!
Alexander Grigorievskiy
I use WIKI 2 every day and almost forgot how the original Wikipedia looks like.
Live Statistics
English Articles
Improved in 24 Hours
Added in 24 Hours
Languages
Recent
Show all languages
What we do. Every page goes through several hundred of perfecting techniques; in live mode. Quite the same Wikipedia. Just better.
.
Leo
Newton
Brights
Milds

Asset (computer security)

From Wikipedia, the free encyclopedia

In information security, computer security and network security, an asset is any data, device, or other component of the environment that supports information-related activities. Assets generally include hardware (e.g. servers and switches), software (e.g. mission critical applications and support systems) and confidential information.[1][2] Assets should be protected from illicit access, use, disclosure, alteration, destruction, and/or theft, resulting in loss to the organization.[3]

YouTube Encyclopedic

  • 1/3
    Views:
    326 615
    56 598
    931
  • Introduction to Computer Security - Information Security Lesson #1 of 12
  • IT Asset Management & Asset Tracking Software. What is network asset tracker & asset manager
  • Patch Management: Cyber Asset Protection Software - GE

Transcription

The CIA triad

The goal of information security is to ensure the confidentiality, integrity and availability (CIA) of assets from various threats. For example, a hacker might attack a system in order to steal credit card numbers by exploiting a vulnerability. Information Security experts must assess the likely impact of an attack and employ appropriate countermeasures.[4] In this case they might put up a firewall and encrypt their credit card numbers.

Risk analysis

When performing risk assessment, it is important to weigh how much to spend protecting each asset against the cost of losing the asset. It is also important to take into account the chance of each loss occurring. Intangible costs must also be factored in. If a hacker makes a copy of all a company's credit card numbers it does not cost them anything directly but the loss in fines and reputation can be enormous.

See also

References

  1. ^ "ISO/IEC 27005:2022 - Information security, cybersecurity and privacy protection". ISO. October 2022. Retrieved 31 December 2023.
  2. ^ "ENISA Glossary". Archived from the original on 2012-02-29. Retrieved 2010-11-21.
  3. ^ "An Introduction to Factor Analysis of Information Risk (FAIR)", Risk Management Insight LLC, November 2006 Archived 2014-11-18 at the Wayback Machine;
  4. ^ IETF RFC 2828

External links

This page was last edited on 31 December 2023, at 14:10
Basis of this page is in Wikipedia. Text is available under the CC BY-SA 3.0 Unported License. Non-text media are available under their specified licenses. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc. WIKI 2 is an independent company and has no affiliation with Wikimedia Foundation.