Know What You Have: Difference between revisions

From GCA ACT
Jump to navigationJump to search
No edit summary
No edit summary
 
(5 intermediate revisions by 2 users not shown)
Line 2: Line 2:
|-
|-
| colspan="2" valign="top"|  
| colspan="2" valign="top"|  
[[File:ACT_KnowWhat_YouHave_Icon.svg|frameless|40px|link=Know_What_You_Have]] <big>'''Cybersecurity Inventory'''</big><br>
[[File:ACT_KnowWhat_YouHave_Icon.svg|frameless|40px|link=Know_What_You_Have]] <big>'''Know What You Have - Create an Inventory'''</big><br>
A cybersecurity inventory, also known as an asset inventory or digital asset inventory, is a comprehensive list of all the digital assets, devices, software, accounts, and data that an organization or individual possesses and relies on. The primary purpose of creating a cybersecurity inventory is to gain a clear understanding of what needs to be protected and to assess the associated risks.
A cybersecurity inventory, also known as an asset inventory or digital asset inventory, is a comprehensive list of all the digital assets, devices, software, accounts, and data that an organization or individual possesses and relies on. The primary purpose of creating a cybersecurity inventory is to gain a clear understanding of what needs to be protected and to assess the associated risks.
| colspan="1" valign="top"|
| colspan="1" valign="top"|
[[File:Rhinos.png|frameless|100px|right|link=Basic_Protection]]
[[File:Rhinos.png|frameless|100px|right|link=Enhanced_Protection]]
Placeholder (Tools Coming Soon!)
<strong>Cybersecurity Tools</strong>
{{#categorytree:Know What You Have - Create an Inventory|mode=collapsed}}
|-
|-
| valign="top" |
| valign="top" |
<big>'''Identify Your Devices and Accounts'''</big><br>
<big>'''Identify Your Devices and Accounts'''</big><br>
Start by listing all the devices and accounts you use in your digital life. This may include:
Start by listing all the devices and accounts you use in your digital life. This may include:<br>
 
[[File:computer_icon.svg|frameless|15px]] Computers (desktops, laptops)<br>
* Computers (desktops, laptops)
[[File:mobile_icon.svg|frameless|15px]] Mobile devices (smartphones, tablets)<br>
* Mobile devices (smartphones, tablets)
[[File:server_icon.svg|frameless|15px]] Servers<br>
* Servers
[[File:house-signal_icon.svg|frameless|15px]] IoT devices (smart thermostats, cameras)<br>
* IoT devices (smart thermostats, cameras)
[[File:hashtag_icon.svg|frameless|15px]] Online accounts (email, social media, financial)<br>
* Online accounts (email, social media, financial)


Make sure to keep this list up-to-date as you acquire new devices or create new accounts.
Make sure to keep this list up-to-date as you acquire new devices or create new accounts.
| valign="top" |
| valign="top" |
<big>'''Identify Your Applications'''</big><br>
<big>'''Identify Your Applications'''</big><br>
List all the software applications and online services you use. This can include:
List all the software applications and online services you use. This can include:<br>


* Operating systems
[[File:windows_icon.svg|frameless|15px]] Operating systems<br>
* Productivity software (Microsoft Office, Google Workspace)
[[File:excel_icon.svg|frameless|15px]] Productivity software (Microsoft Office, Google Workspace)<br>
* Web browsers
[[File:chrome.svg|frameless|15px]] Web browsers<br>
* Cloud storage services
[[File:cloud_icon.svg|frameless|15px]] Cloud storage services<br>
* Communication apps (email, messaging)
[[File:envelope_icon.svg|frameless|15px]] Communication apps (email, messaging)<br>
* Specialized software for work or hobbies
[[File:snowflake_icon.svg|frameless|15px]] Specialized software for work or hobbies<br>


Understanding the applications you rely on is essential for assessing their security.
Understanding the applications you rely on is essential for assessing their security.
| valign="top" |
| valign="top" |
<big>'''Identify Your Risks'''</big><br>
<big>'''Identify Your Risks'''</big><br>
Identifying your cybersecurity risks is a crucial part of the inventory process. Consider the following aspects:
Identifying your cybersecurity risks is a crucial part of the inventory process. Consider the following aspects:<br>


* '''Threats''': What are the potential threats to your devices, accounts, and data? These could include malware, phishing attacks, data breaches, and physical theft.
[[File:skuill_icon.svg|frameless|15px]] '''Threats''': What are the potential threats to your devices, accounts, and data? These could include malware, phishing attacks, data breaches, and physical theft.<br>
* '''Vulnerabilities''': What weaknesses exist in your devices, software, or practices that could be exploited by cybercriminals? These might include outdated software, weak passwords, or lack of security updates.
[[File:door-open_icon.svg|frameless|15px]] '''Vulnerabilities''': What weaknesses exist in your devices, software, or practices that could be exploited by cybercriminals? These might include outdated software, weak passwords, or lack of security updates.<br>
* '''Assets''': What digital assets are most critical to you? This can include sensitive personal information, financial data, intellectual property, or even sentimental data like family photos.
[[File:house_icon.svg|frameless|15px]] '''Assets''': What digital assets are most critical to you? This can include sensitive personal information, financial data, intellectual property, or even sentimental data like family photos.<br>
* '''Consequences''': What would be the impact of a cybersecurity breach or data loss? Consider the financial, personal, and reputational consequences.
[[File:house-chimney-crack_icon.svg|frameless|15px]] '''Consequences''': What would be the impact of a cybersecurity breach or data loss? Consider the financial, personal, and reputational consequences.<br>


By identifying these risks, you can take targeted steps to mitigate them and improve your overall cybersecurity posture.
By identifying these risks, you can take targeted steps to mitigate them and improve your overall cybersecurity posture.

Latest revision as of 19:07, 30 October 2023

ACT KnowWhat YouHave Icon.svg Know What You Have - Create an Inventory
A cybersecurity inventory, also known as an asset inventory or digital asset inventory, is a comprehensive list of all the digital assets, devices, software, accounts, and data that an organization or individual possesses and relies on. The primary purpose of creating a cybersecurity inventory is to gain a clear understanding of what needs to be protected and to assess the associated risks.

Rhinos.png

Cybersecurity Tools

Identify Your Devices and Accounts
Start by listing all the devices and accounts you use in your digital life. This may include:
Computer icon.svg Computers (desktops, laptops)
Mobile icon.svg Mobile devices (smartphones, tablets)
Server icon.svg Servers
House-signal icon.svg IoT devices (smart thermostats, cameras)
Hashtag icon.svg Online accounts (email, social media, financial)

Make sure to keep this list up-to-date as you acquire new devices or create new accounts.

Identify Your Applications
List all the software applications and online services you use. This can include:

Windows icon.svg Operating systems
Excel icon.svg Productivity software (Microsoft Office, Google Workspace)
Chrome.svg Web browsers
Cloud icon.svg Cloud storage services
Envelope icon.svg Communication apps (email, messaging)
Snowflake icon.svg Specialized software for work or hobbies

Understanding the applications you rely on is essential for assessing their security.

Identify Your Risks
Identifying your cybersecurity risks is a crucial part of the inventory process. Consider the following aspects:

Skuill icon.svg Threats: What are the potential threats to your devices, accounts, and data? These could include malware, phishing attacks, data breaches, and physical theft.
Door-open icon.svg Vulnerabilities: What weaknesses exist in your devices, software, or practices that could be exploited by cybercriminals? These might include outdated software, weak passwords, or lack of security updates.
House icon.svg Assets: What digital assets are most critical to you? This can include sensitive personal information, financial data, intellectual property, or even sentimental data like family photos.
House-chimney-crack icon.svg Consequences: What would be the impact of a cybersecurity breach or data loss? Consider the financial, personal, and reputational consequences.

By identifying these risks, you can take targeted steps to mitigate them and improve your overall cybersecurity posture.

Conclusion
Creating and maintaining a cybersecurity inventory is a proactive approach to protecting your digital life. Regularly reviewing and updating this inventory will help you stay aware of potential risks and take appropriate security measures. Remember that cybersecurity is an ongoing process, and staying informed about the latest threats and best practices is essential to maintaining your digital security.