Asset (computer security)

In information security, computer security and network security, an asset is any data, device, or other component of the environment that supports information-related activities. Assets generally include hardware (e.g. servers and switches), software (e.g. mission critical applications and support systems) and confidential information.[1][2] Assets should be protected from illicit access, use, disclosure, alteration, destruction, and/or theft, resulting in loss to the organization.[3]

The CIA Triad

The goal of Information Security is to ensure the Confidentiality, Integrity and Availability of assets from various threats. For example, a hacker might attack a system in order to steal credit card numbers by exploiting a vulnerability. Information Security experts must assess the likely impact of an attack and employ appropriate countermeasures.[4] In this case they might put up a firewall and encrypt their credit card numbers.

Risk analysis

When performing risk analysis it is important to weigh how much to spend protecting each asset against the cost of losing the asset. It is also important to take into account the chance of each loss occurring. Intangible costs must also be factored in. If a hacker makes a copy of all a company's credit card numbers it does not cost them anything directly but the loss in fines and reputation can be enormous.

gollark: Not encryption, just to be annoying.
gollark: In any case it could be fun to make potatOS use random byte sequences as filenames.
gollark: Hmm, true.
gollark: If I remember right, on Linux systems any byte sequence which doesn't contain / or null is valid as a filename.
gollark: There is no xkcd 404 unless there is an xkcd 404.

See also

References

This article is issued from Wikipedia. The text is licensed under Creative Commons - Attribution - Sharealike. Additional terms may apply for the media files.