ASSETS AND CLASSIFICATION OF DATA
The information of the udemy has been divided into 4 categories they are
- Confidential Information;
The data or information which can only be used and accessed by the high management of any organization called confidential data. for examples;
Ø The Profile Data
Ø Account data
Ø Shared data
Ø Educational content
Ø data student
Ø Payment Data,
Ø Tutor payment data
2) Restricted Information;
The data and information that is needed when the processing of the work is done, or when the flow of work is needed we use the restricted data. In the organization, most of the employees have the access to the restricted data. It is the information between higher authorities to middle-level authorities. organization uses the
Ø Information about content and
Ø Other services,
Ø Information about
Ø Communications.
3) Internal Information;
It is the type of that that is needed by all the staff working in the organization. Examples;
Ø The information about sweepstakes
Ø Promotions of the staff members’ data
Ø The survey data,
Ø System data
4) Public information
As from name the public data or information is the category in which the data is visible to all. This is used to make the ranking of the organization everyone has only access to view this data not to make changes in the concerned.
The organization provides its survey results on the websites so that many of the customers get attracts.
Assets of any organization;
In the field of cybersecurity, assets can be any data, device, or component of the system that helps to do the workflow of the information-related activities. Assets should be protected from illicit access, use, disclosure, alteration, destruction, and/or theft, resulting in loss to the organization.
1. Hardware assets:
Ø Servers,
Ø Laptops,
Ø Switches,
Ø Routers,
Ø Wire,
Ø Completely WAN and LAN system,
Ø Firewalls.
2. software assets;
Ø The supported system,
Ø Critical applications,
Ø All of the software from small to large,
Ø All the windows and systems that used to run the process of the system.
Ø Websites used to gather the information,
Ø Transaction controlling system,
Ø Threat identification software,
Ø AI tools used by udemy to detect the amorous events in the system.
3. Database assets;
Ø Confidential information,
Ø all type of data