Know What You Have: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 5: | Line 5: | ||
A cybersecurity inventory, also known as an asset inventory or digital asset inventory, is a comprehensive list of all the digital assets, devices, software, accounts, and data that an organization or individual possesses and relies on. The primary purpose of creating a cybersecurity inventory is to gain a clear understanding of what needs to be protected and to assess the associated risks. | A cybersecurity inventory, also known as an asset inventory or digital asset inventory, is a comprehensive list of all the digital assets, devices, software, accounts, and data that an organization or individual possesses and relies on. The primary purpose of creating a cybersecurity inventory is to gain a clear understanding of what needs to be protected and to assess the associated risks. | ||
|- | |- | ||
| | | valign="top" | | ||
<big>'''Identify Your Devices and Accounts'''</big><br> | <big>'''Identify Your Devices and Accounts'''</big><br> | ||
Start by listing all the devices and accounts you use in your digital life. This may include: | Start by listing all the devices and accounts you use in your digital life. This may include: | ||
Line 16: | Line 16: | ||
Make sure to keep this list up-to-date as you acquire new devices or create new accounts. | Make sure to keep this list up-to-date as you acquire new devices or create new accounts. | ||
| | | valign="top" | | ||
<big>'''Identify Your Applications'''</big><br> | <big>'''Identify Your Applications'''</big><br> | ||
List all the software applications and online services you use. This can include: | List all the software applications and online services you use. This can include: | ||
Line 28: | Line 28: | ||
Understanding the applications you rely on is essential for assessing their security. | Understanding the applications you rely on is essential for assessing their security. | ||
| | | valign="top" | | ||
<big>'''Identify Your Risks'''</big><br> | <big>'''Identify Your Risks'''</big><br> | ||
Identifying your cybersecurity risks is a crucial part of the inventory process. Consider the following aspects: | Identifying your cybersecurity risks is a crucial part of the inventory process. Consider the following aspects: |