Know What You Have: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 1: | Line 1: | ||
{| class="wikitable" | {| class="wikitable" | ||
|- | |- | ||
| colspan="2" | | | colspan="2" valign="top"| | ||
[[File:ACT_KnowWhat_YouHave_Icon.svg|frameless|40px|link=Know_What_You_Have]] <big>'''Cybersecurity Inventory'''</big><br> | [[File:ACT_KnowWhat_YouHave_Icon.svg|frameless|40px|link=Know_What_You_Have]] <big>'''Cybersecurity Inventory'''</big><br> | ||
A cybersecurity inventory, also known as an asset inventory or digital asset inventory, is a comprehensive list of all the digital assets, devices, software, accounts, and data that an organization or individual possesses and relies on. The primary purpose of creating a cybersecurity inventory is to gain a clear understanding of what needs to be protected and to assess the associated risks. | A cybersecurity inventory, also known as an asset inventory or digital asset inventory, is a comprehensive list of all the digital assets, devices, software, accounts, and data that an organization or individual possesses and relies on. The primary purpose of creating a cybersecurity inventory is to gain a clear understanding of what needs to be protected and to assess the associated risks. | ||
| colspan="1"| | | colspan="1" valign="top"| | ||
[[File:Rhinos.png|frameless|100px|right|link=Basic_Protection]] | [[File:Rhinos.png|frameless|100px|right|link=Basic_Protection]] | ||
Placeholder (Tools Coming Soon!) | Placeholder (Tools Coming Soon!) |