Know What You Have: Difference between revisions
From GCA ACT
Jump to navigationJump to search
No edit summary |
No edit summary |
||
Line 2: | Line 2: | ||
|- | |- | ||
| colspan="3" | | | colspan="3" | | ||
[[File:ACT_KnowWhat_YouHave_Icon.svg|frameless| | [[File:ACT_KnowWhat_YouHave_Icon.svg|frameless|50px|link=Know_What_You_Have]] <br> | ||
<big>'''Cybersecurity Inventory'''</big><br> | <big>'''Cybersecurity Inventory'''</big><br> | ||
A cybersecurity inventory, also known as an asset inventory or digital asset inventory, is a comprehensive list of all the digital assets, devices, software, accounts, and data that an organization or individual possesses and relies on. The primary purpose of creating a cybersecurity inventory is to gain a clear understanding of what needs to be protected and to assess the associated risks. | A cybersecurity inventory, also known as an asset inventory or digital asset inventory, is a comprehensive list of all the digital assets, devices, software, accounts, and data that an organization or individual possesses and relies on. The primary purpose of creating a cybersecurity inventory is to gain a clear understanding of what needs to be protected and to assess the associated risks. |