Know What You Have: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 5: | Line 5: | ||
A cybersecurity inventory, also known as an asset inventory or digital asset inventory, is a comprehensive list of all the digital assets, devices, software, accounts, and data that an organization or individual possesses and relies on. The primary purpose of creating a cybersecurity inventory is to gain a clear understanding of what needs to be protected and to assess the associated risks. | A cybersecurity inventory, also known as an asset inventory or digital asset inventory, is a comprehensive list of all the digital assets, devices, software, accounts, and data that an organization or individual possesses and relies on. The primary purpose of creating a cybersecurity inventory is to gain a clear understanding of what needs to be protected and to assess the associated risks. | ||
| colspan="1" valign="top"| | | colspan="1" valign="top"| | ||
[[File:Rhinos.png|frameless|100px|right|link= | [[File:Rhinos.png|frameless|100px|right|link=Enhanced_Protection]] | ||
<strong>Cybersecurity Tools</strong> | <strong>Cybersecurity Tools</strong> | ||
{{#categorytree:Know What You Have - Create an Inventory|mode=collapsed}} | {{#categorytree:Know What You Have - Create an Inventory|mode=collapsed}} |