Know What You Have: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
{| class="wikitable" | {| class="wikitable" | ||
|- | |- | ||
| colspan=" | | colspan="2" | | ||
[[File:ACT_KnowWhat_YouHave_Icon.svg|frameless|40px|link=Know_What_You_Have]] <big>'''Cybersecurity Inventory'''</big><br> | [[File:ACT_KnowWhat_YouHave_Icon.svg|frameless|40px|link=Know_What_You_Have]] <big>'''Cybersecurity Inventory'''</big><br> | ||
A cybersecurity inventory, also known as an asset inventory or digital asset inventory, is a comprehensive list of all the digital assets, devices, software, accounts, and data that an organization or individual possesses and relies on. The primary purpose of creating a cybersecurity inventory is to gain a clear understanding of what needs to be protected and to assess the associated risks. | A cybersecurity inventory, also known as an asset inventory or digital asset inventory, is a comprehensive list of all the digital assets, devices, software, accounts, and data that an organization or individual possesses and relies on. The primary purpose of creating a cybersecurity inventory is to gain a clear understanding of what needs to be protected and to assess the associated risks. | ||
| colspan="1"| | |||
[[File:Rhinos.png|frameless|100px|right|link=Basic_Protection]] | |||
Placeholder (Tools Coming Soon!) | |||
|- | |- | ||
| valign="top" | | | valign="top" | |