Professional Documents
Culture Documents
identification process?
We moved from a process of manual inventory Of assets to automatic Asset
inventory because the manual form of asset inventory requires a lot of human
source and so much of time. Automatic asset inventory is one of the most
important process in cyber security analysis and management it is majorly
required for increasing the security and identifying the risks. as we see the
organisations around us processes heterogeneous data on a very large scale
and that data is dynamically changing so it is very tough to manage that data
manually hence automatic asset inventory is the innovation which simplifies
the task of management off asset. In case of automatic asset inventory the
asset inventory should be continuously with a constant Time interval should
undergo modification of objects and that modification of objects results in the
change in topology which in turns leads to Change in network station which
can also be described as cyber security station. Hence to track down this we
need a technique which is automatic inventory assets and connexion between
them in different organisations. The current technique on which this
automatic inventory system is working upon is called as correlation method it
is basically linking the system processes to each other. The other best to use
off automatic asset inventory is that It assigns a specific event characteristic to
an asset type. The security risk depends upon the importance of the side this it
is really very important to make out how important the asset is and what kind
of security would be appropriate for it. That means providing high security for
a less important data would not be an ideal situation. the events that are
assign to the assets help us to outline system objects and to apologies with this
weekend further restore the possible attack paths and security assessments
hence in this way an automated asset inventory system is very useful and
please an essential role in identifying the risk to the asset because it is
interconnected with all the components of a system.
2} How many threat categories are listed in this chapter? Which is noted as
being the most frequently occurred and why?