Section 12.107 Asset Management Flashcards
Objectives 1.3 Explain the importance of change management processes and the impact to security. Objectives 4.1 Given a scenario, you must be able to apply common security techniques to computing resources. Objectives 4.2 Explain the security implications of proper hardware, software, and data asset management.
Asset Management
Systematic approach to governing and maximising the value of items an entity is responsible for throughout the asset’s life cycle
Tangible Assets
○ Office buildings
○ Computers
○ Machinery
Intangible Assets
○ Intellectual property
○ Organisations reputation
○ Goodwill
Assignment and Accounting of Assets
Organisation should desingate individuals or groups as owners for each of its assets
■ Process referred to as the allocation or assignment of ownership
■ Avoids ambiguity, aids troubleshooting, upgrades, and replacements
Classification and Categorisation
Involves categorising assets based on criteria like function, value or other relevant parameters as determined by the organisation
e.g Organisation servers may hold critical data which means its classigied as a high value asset
■ Informs maintenance, replacement, or retirement decisions
■ High-value assets may require stringent maintenance schedules
■ Low-value assets may be considered for recycling or disposal
Monitoring and Tracking of Assets
Ensures proper accounting and optimal use of assets
Asset Monitoring
○ Maintaining an inventory with specifications, location, and assigned users
Asset Tracking
Goes beyond monitoring, involving the location, status, and condition of assets using specialised software and tracking
technologies
Enumeration
○ Identifies and counts assets, especially in large organisations or
during times of asset procurement or retirement
○ Aids in maintaining an accurate inventory
Proactive approach for risk management and resource optimization
Moble device management solutuions
Mobile Device Management (MDM)
Manages and tracks mobile devices
● Smartphones
● Tablets
● Laptops
● Wearables
■ Centralises management, enforces corporate policies, ensures software uniformity, safeguards sensitive data
■ Enables remote lock and wipe of lost devices, remote software updates, and consistent user experiences
■ Reduces risks associated with unsecured or outdated devices