CYB_410_3-3_ProjectTwo_MilestoneOne_Branden_Knight

xlsx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

410

Subject

Information Systems

Date

Dec 6, 2023

Type

xlsx

Pages

7

Uploaded by MateTurtleMaster4095

Report
Data Inventory and Classification Tab Classification Matrix Example Tab CY So The purpose of this spreadsheet is to docum of the spreadsheet tabs is provided below.
Data Life Cycle Plan Branden Knight YB-410: Security Risk Management outhern New Hampshire University ment the data inventory and data classification for Green Thumb Nursery. A list The Data Inventory and Data Classification tab contains a list of Green Thumb's system resources/components needed to run the business, their platforms/OS/versions (as applicable), and a description of their purposes. The tab also contains columns for the data inventory, the data classification, and a rationale for the data classification. The Classification Matrix tab contains a reference for the different categories of data classification: public, sensitive, or private, as well as a data classification example.
System Resource/Component Platform/OS/Version (as applicable) Description Web Server Microsoft IIS Wireless Access Point Netgear Workstation Microsoft Windows 10 Internet Router ISP Provided Device used to access the internet Network Switch Netgear Cell Phones Galaxy s7 Straight Talk Wireless Devices used for business communications Environmental Sensors APC System used for internet marketing and online web presence. This system provides online internet marketing and a standard webpage to include contact information for the company. Device that provides wireless access to the network infrastructure Device orders supplies and processes customer data and transactions Device that provides network connection to all network resources Devices used for environmental monitoring, for example, temperature, humidity, and power sensors
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Tracking/Backup Server Microsoft Windows Server 2016 Security Cameras Arlo 5 Fixed, 1 PTZ Device used for tracking and logging product data and maintaining data backup Devices used for property monitoring, for example, fixed site cameras and pan, tilt, zoom cameras
Data Inventory Data Classification Data Classification Justification Public Sensitive Sensitive Sensitive Sensitive Sensitive Public Marketing materials Contact information Corporate details and contact information This system is public, as it should be accessible by anyone on the internet. Used for marketing and to provide customers with the ability to access the company webpage. Device information for specific devices connected to the organization's wireless access point The system itself is sensitive and contains information on all devices that are connected to the wireless access point Customer's data, supply data, and overall transaction history The system should only be accessible to customer service employees because of it containing PII and prcing for the merchandise Data on all devices that are connected to a wired internet network IT staff member should only have access to this if they need to change the connection that is wired to the network. Information for all devices that are connected to the company's network, wether if its wireless or wired IT staff memebers should be the only ones who have access to this system and should be secured in a specific area in the company Company has to issue mobile devices, in general For approved company calls, these devices should only be used by the employees. Once the employee is done for the day the phone should be returned The data will include all enviornmental data including the following; power levels, humidty, and temperatures The data should be available publicly the reason being is that it does not contain any private or sensitive data
Extreme confidential company data Confidential A recording of video and audio files Sensitive/Private When it comes to company data, it should only be accessed to authorized employees with permission to do so. It contains confidential data and backups for company Authorized employees should be the ones able to access this system because it has data just in case if it was stolen
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
INFORMATION CLASSIFICATION MATRIX AND HANDLING GUIDE CATEGORY DESCRIPTION SAMPLE DOCUMENTS / RECORDS DISTRIBUTION DESTRUCTION/ DISPOSAL No restrictions Recycling/trash SENSITIVE Note: This classification scheme relates only to the confidentiality of the information. Similar schemes are feasible for integrity and availability requirements. PUBLIC or open Information that may be broadly distributed without causing damage to the organization, its employees and stakeholders. The [PR Office/Marketing Dept/Information Security Management dept/etc.] must pre-approve the use of this classification. These documents may be disclosed or passed to persons outside the organization. Marketing materials authorized for public release such as advertisements, brochures, published annual accounts, Internet Web pages, catalogues, external vacancy notices Information whose unauthorized disclosure, particularly outside the organization, would be inappropriate and inconvenient. Disclosure to anyone outside of [Company name] requires management authorization. Most corporate information falls into this category. Departmental memos, information on internal bulletin boards, training materials, policies, operating procedures, work instructions, guidelines, phone and email directories, marketing or promotional information (prior to authorized release), investment options, transaction data, productivity reports, disciplinary reports, contracts, Service Level Agreements, internal vacancy notices, intranet Web pages Internal : use an internal mail envelope. External : use a sealed envelope. Electronic : use internal email system. Encryption is required for transmission to external email addresses. FAXing : take care over the FAX number! Paper documents: shred. Electronic data : erase or degauss magnetic media. Send CDs, DVDs, dead hard drives, laptops, etc., to IT for appropriate disposal CONFIDENTIAL/ PRIVATE or Proprietary Highly sensitive or valuable information, both proprietary and personal. Must not be disclosed outside of the organization without the explicit permission of a Director-level senior manager. Passwords and PIN codes, VPN tokens, credit and debit card numbers, personal information (such as employee HR records, Social Security Numbers), most accounting data, other highly sensitive or valuable proprietary information. Internal: use a sealed envelop inside an internal mail envelope. Hand deliver if possible. External: use a plain sealed envelope. Hand deliver or send by registered mail, courier, etc . Electronic: use internal email system only. Encrypt data. FAXing: requires phone confirmation of receipt of a test page immediately prior to sending the FAX, and phone confirmation of full receipt. Paper documents: shred using an approved cross-cut shredder . Electronic data: erase or degauss magnetic media. Send CDs, DVDs, dead hard drives, laptops, etc., to IT for appropriate disposal. This work is copyright © 2009, Richard O. Regalado and ISO27k implementers' forum , some rights reserved. It is licensed under the Creative Commons Attribution-Noncommercial-Share Alike 3.0 License. You are welcome to reproduce, circulate, use and create derivative works from this provided that (a) it is not sold or incorporated into a commercial product, (b) it is properly attributed to the ISO27k implementers' forum www.ISO27001security.com), and (c) derivative works are shared under the same terms as this.