earasryhqaey Appassionato

Iscritti

Registrato: 01/07/19 09:50 Messaggi: 273
|
|
An Information Asset Profile (IAP) will help you to characterize you information assets to ensure you're providing the necessary level of security protection. An IAP is one of the primary inputs necessary for a successful threat risk assessment (TRA).
The information in this article is based on work done at Carnegie Mellon University on Information Asset Profiling but has been extended based on our work implementing information security with our clients.
Information security (IS) requires the classification and valuation of the information assets to ensure that the right level of protection for those assets is provided. The required level of protection is usually determined by using a risk assessment.
A Threat Risk Assessment(i.e. TRA) is the first part of any risk management methodology. It is use to determine the extent of the potential threat and the risk associated with a companies information assets. The output of this process helps to identify appropriate safeguards for reducing or eliminating risk during risk mitigation.
The threat risk assessment methodology encompasses nine primary steps:
1. Information Characterization
2. Threat Identification
3. Vulnerability Identification
4. Safeguard Analysis
5. Likelihood Determination
6. Impact Analysis
7. Risk Determination
8. Safeguard Recommendation
9. Results Documentation
An Information Asset Profile (IAP) provides the information characteristics required in the first step shown above. The IAP allows information owners to profile (i.e. classify and value) their information assets; this is usually a requirement of an IS Policy to ensure the protection of a company's information assets. Of course , if you're going to profile your assets, you will need to know what they are ... an IAP must be preceded by a complete inventory of your information assets and their security requirements.
Using an Information Asset Profile allows a company to:
- provide a consistent, unambiguous, and agreed upon description of an information asset;
- feed strategic information security activities , such as threat and risk assessments used to determine potential negative impacts;
- help with the selection of proper security controls and best practices by insuring security requirements are addressed;
- refine policy and procedure by defining the information asset, its user-base, its custodians, its ownerstewardship , its boundaries, and its characteristics.
The Information Asset Profile defines the information itself, the people involved in its creation and use, and the processes or procedures that rely on the information. The primary contents are: Asset Name , Asset Description, Owner, Stakeholders, Custodial Aspects , (i.e. Custodians ... paper or electronic, and Locations), Security and Privacy Requirements, and Classification and Valuation.
Any , or a combination, of the following techniques can be used to gather information about the information asset: a questionnaire, on-site interviews, document reviews , or automated scanning tools.
In summary the benefits of the Information Asset Profile are:
- allows owners to profile their information assets to meet Information Security Policy requirements for the protection of those assets;
- validates the security aspects of the processes relying on the information;
- provides the information profiling required as the first step of a threat risk assessment;
- defines security requirements for new information systems applications;
- requires the CISO to provide the following services:
o assistance to owners on how to complete an IAP,
o central storage and control for all completed IAPs.
AVI is a video format that is an abbreviation of Audio Video interleaved. This is an encoding tool that can carry high definition and high quality video and sound for a multimedia files. This compression tool is one of the most famous and effective tool to encode superb quality videos. Most of The users prefer to have movies, song tacks, documentaries and their own produced videos in AVI format. It is the most suitable format for watching videos on a personal computer , and on portable devices.
MP4 video format is also one of the most and widely used format. This format is used widely on the World Wide Web because of its high compatibility with network structure and it's supported featured at low bandwidth usage. You may also have a massive collection of MP4 format videos in your hand held device's storage. You can find these videos on the internet on the most famous forums of video sharing like YouTube. If you need to play these videos on your favorite media player that supports AVI format, you need to convert your MP4 videos into the AVI format.
You can find a number of software on the internet that can be usedto convert your MP4 videos into AVI format. But these applications are not effective enough to meet your needs of having high quality videos in a little time. You need a super fast converting tool that is equally capable of converting your high definition videos in the highest quality videos. Aimersoftvideo converter ultimate for Mac is the best choice for converting mp4 to avimac at your own need. If you are a Mac user, it suits you best because of its high compatibility with Apple operating system. It is preferable choice because of its light weight and high performance features.
This application is effective in multiple ways to fulfill your needs. It provides user with a soothing and easy graphical interface. This application makes the userbe able to manage and convert his Mp4 videos into AVI format with ease. It includes a number of features that make you conversion easy and excited. It provides you with rich editing tool that can be used to edit you videos and to add watermarks to your videos. This convertor tool is efficient enough to mak. |
|