Data Loss and its Effects
How can data be lost?
• Stealing data storage devices
• Sabotage
• Hacking into computer networks
Impact or Effect of Data Loss?
• Reputational risk
• Financial risk
• Loss of business
• Denial of Service
• Legal risk
Information / Data Classification
• Information classification defines what kind of information is maintained in an organization.
• Based on such classification, information may need additional protection in place.
• Information can be classified into:
– Classified or Top Secret
– Strictly or Highly Confidential
– Confidential or Proprietary
– Internal Use
– Public
Classified or Top Secret
Highly sensitive information strictly intended for use within the organization
– Top or Executive Management Compensation and Benefits
– Content of Corporate Investigation Reports
Strictly or Highly Confidential
Sensitive information intended for use only within a group of authorized persons associated with a particular department, job function or project
– Personnel Information and/or Non Executive/TM Payroll
– Content of Internal/External Audit Reports
– Project Designs/Drawings
Confidential or Proprietary
Non‐sensitive information used within a department to ensure continuity of operational work routines. Security for this data class is controlled, but information is not highly protected.
– Business Policies and Procedures
– Business partner information not covered by a restrictive confidentiality agreement.
Internal Use
Important but non-sensitive information Examples
– Company announcements or bulletins
– General Project and Research data
Public
Information that requires minimal security and can be handled in the public domain / website.
– Marketing materials/Ads
Thanks for Read,
Please "SHARE" our post that your friends can read and learn and "COMMENT" us so that we can make our blogbeautiful.
Please Follow us.
Twitter
Google+
Facebook
Youtube
E-mail
Subscribe to:
Post Comments (Atom)
Learn how hackers are stealing passwords to protect your own
Fixing the Leak: See How Hackers Are Stealing Your Passwords There is no way you are going to win a battle you are not prepared for. By pr...
-
Encryption Use encryption as prescribed in the Information Security Policies Use encrypted channels for on-line communications (HTTPS, ...
-
Social Engineering Be prepared for Social Engineering being skeptical than sorry. Be prepared to avoid a threat – be skeptical when it ...
No comments:
Post a Comment