Know What You Have: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
(One intermediate revision by the same user not shown) | |||
Line 2: | Line 2: | ||
|- | |- | ||
| colspan="2" valign="top"| | | colspan="2" valign="top"| | ||
[[File:ACT_KnowWhat_YouHave_Icon.svg|frameless|40px|link=Know_What_You_Have]] <big>''' | [[File:ACT_KnowWhat_YouHave_Icon.svg|frameless|40px|link=Know_What_You_Have]] <big>'''Know What You Have - Create an Inventory'''</big><br> | ||
A cybersecurity inventory, also known as an asset inventory or digital asset inventory, is a comprehensive list of all the digital assets, devices, software, accounts, and data that an organization or individual possesses and relies on. The primary purpose of creating a cybersecurity inventory is to gain a clear understanding of what needs to be protected and to assess the associated risks. | A cybersecurity inventory, also known as an asset inventory or digital asset inventory, is a comprehensive list of all the digital assets, devices, software, accounts, and data that an organization or individual possesses and relies on. The primary purpose of creating a cybersecurity inventory is to gain a clear understanding of what needs to be protected and to assess the associated risks. | ||
| colspan="1" valign="top"| | | colspan="1" valign="top"| | ||
[[File:Rhinos.png|frameless|100px|right|link= | [[File:Rhinos.png|frameless|100px|right|link=Enhanced_Protection]] | ||
<strong>Cybersecurity Tools</strong> | <strong>Cybersecurity Tools</strong> | ||
{{#categorytree:Know What You Have - Create an Inventory|mode=collapsed}} | {{#categorytree:Know What You Have - Create an Inventory|mode=collapsed}} |