Asset Classification
This lesson addresses the importance of asset classification and the two approaches for accomplishing it.
- Asset defined (00:07:9)
- Benefits of Asset Classification (00:31:9)
- Classification Steps (00:54:88)
- Quantitative Assessment (01:38:22)
- Qualitative Assessment (03:19:64)
- Quantitative Advantages/Disadvantages (04:00:8)
- Qualitative Advantages/Disadvantages (04:43:1)
- Asset Classification Example (05:12:52)
Видео Asset Classification канала Tom Olzak
- Asset defined (00:07:9)
- Benefits of Asset Classification (00:31:9)
- Classification Steps (00:54:88)
- Quantitative Assessment (01:38:22)
- Qualitative Assessment (03:19:64)
- Quantitative Advantages/Disadvantages (04:00:8)
- Qualitative Advantages/Disadvantages (04:43:1)
- Asset Classification Example (05:12:52)
Видео Asset Classification канала Tom Olzak
Показать
Комментарии отсутствуют
Информация о видео
Другие видео канала
![Adventures in Security Episode 2 - 2014 Internet Security Threat Report](https://i.ytimg.com/vi/da28OBI5vuE/default.jpg)
![Communications and Network Security Part 22 – Remote Collaboration & Email](https://i.ytimg.com/vi/fRLvf17MSpo/default.jpg)
![Communications and Network Security Part 15 - Network Topologies](https://i.ytimg.com/vi/SS5qLqRD2_E/default.jpg)
![System Hardening - CISSP](https://i.ytimg.com/vi/B09dU3jEPzc/default.jpg)
![Cryptography Part 3: Asymmetric Encryption](https://i.ytimg.com/vi/aXF7RRPERHM/default.jpg)
![Communications and Network Security Part 3: Routing Protocols](https://i.ytimg.com/vi/qzYr-5HUSHM/default.jpg)
![Information and Asset Ownership](https://i.ytimg.com/vi/0p5L4WGY4tE/default.jpg)
![Communications and Network Security Part 20 – Communication Channel and Authentication Protocols](https://i.ytimg.com/vi/k7J8DgX7PCM/default.jpg)
![Privileged Account and Session Management](https://i.ytimg.com/vi/R7BYCbJ57uo/default.jpg)
![Asset Handling Requirements - CISSP](https://i.ytimg.com/vi/f99RUQ136bE/default.jpg)
![CMGT431_Week_1_Lecture](https://i.ytimg.com/vi/C0FBByIX8BA/default.jpg)
![Validate Computing Device Integrity](https://i.ytimg.com/vi/0kkmHcYCyZQ/default.jpg)
![Data Security Controls Part 1: Frameworks](https://i.ytimg.com/vi/DC_K2ieHpRs/default.jpg)
![Cryptography Part 1 - History](https://i.ytimg.com/vi/-lb95I9A6Sc/default.jpg)
![Data States and Protection - CISSP](https://i.ytimg.com/vi/x4iE8GVV6sY/default.jpg)
![Protecting Data Integrity with Backups](https://i.ytimg.com/vi/7ioTa_sulcw/default.jpg)
![Identity Use and Identity Lifecycle](https://i.ytimg.com/vi/pbjs9jVbgAc/default.jpg)
![Communications and Network Security Part 23 – Remote Access Security](https://i.ytimg.com/vi/j-0iv5ch8Lw/default.jpg)
![Cryptography Part 4: Hashing](https://i.ytimg.com/vi/WYtCpJ6sczc/default.jpg)
![Episode 6: Critical Infrastructure Security](https://i.ytimg.com/vi/W_398tN3X_Q/default.jpg)