HW01_Inventory
docx
keyboard_arrow_up
School
Utah Valley University *
*We aren’t endorsed by this school
Course
4700
Subject
Information Systems
Date
Dec 6, 2023
Type
docx
Pages
3
Uploaded by BaronFlamingoPerson398
IT 4700 – Enterprise Cybersecurity Management
Utah Valley University
Fall 2023 semester
Homework #1: Inventory
Due date:
September 11, 2023
Student Name
Submit the completed assignment in Canvas by the due date as a Microsoft Word document or a
PDF file.
PART 1) Enterprise Description (about a paragraph)
Describe an enterprise that you are a part of.
Select an enterprise in which you have
responsibility for cybersecurity.
Some possibilities are home, work, or school.
Example:
My enterprise is my home.
There are four people, six computers, a router, four cell
phones, three Internet-enabled televisions, a doorbell camera, an Xbox One, and a Sony
PlayStation.
I am the person responsible for cybersecurity.
I am in charge of my own personal home cybersecurity.
There are 2 people, 3 computers, 2
Playstations, 4 internet connected smart TV’s, a wifi router, and wifi cameras in my home.
PART 2) Inventory
Describe part of your enterprise computing system (take an inventory).
The inventory should
include both hardware assets* and information assets of your computing environment that need
to be protected in cyberspace.
Please list a minimum
of four hardware assets in your inventory.
*Note: The granularity utilized to identify assets may vary depending on your circumstance.
For
example, is a PC a single component?
Or should the inventory list parts of the PC as: disk,
motherboard, monitor, etc.
This will have a large effect on the size and complexity of the
inventory list that you create.
It is recommended that you define an “asset” no smaller than a
system that can get something done independently of other components.
For example, a router
can work independently of a PC and a laptop can work independently of a desktop.
However, a
PC cannot work without RAM.
Therefore, it is recommended that the granularity of components
should be: laptop, desktop, router, instead of: RAM, disk, etc.
Here is example formatting for each asset (repeat for each asset):
Hardware Asset 1
Unique identifier:
Any string that uniquely identifies the asset for you
Description:
A short description of the asset (e.g. “Annie’s computer”)
Uses:
What is the asset used for?
Replacement cost:
Estimate the replacement cost, but don’t spend too much time on it.
Hardware Asset 2…
After the hardware assets are listed, identify a minimum
of two information components
(software or data) of your enterprise.
Software or Data Asset 5
Unique identifier:
Any string that uniquely identifies the asset for you
Description:
A short description of the asset (e.g. “password file”, “wedding photos”)
Uses:
What is the asset used for?
Replacement cost:
Estimate the replacement cost, but don’t spend too much time on it.
Software or Data Asset 6…
Hardware Asset 1:
Unique identifier:
MSI Laptop
Description:
School/Personal Laptop
Uses:
Used for School and personal projects
Replacement cost:
$1200
Hardware Asset 2:
Unique identifier:
Dell Laptop
Description:
Work Laptop
Uses:
Laptop provided by my company for work
Replacement cost:
$700
Hardware Asset 3:
Unique identifier:
Vizio Smart TV’s
Description:
TV’s in the house
Uses:
Used for video games and watching shows/movies.
Replacement cost:
$400 each(3)
Hardware Asset 4:
Unique identifier:
WIFI Router
Description:
NETEAR Nighthawk Router
Uses:
Provide wireless and wired connections to internet
Replacement cost:
$200
Hardware Asset 5:
Unique identifier:
Playstation 5
Description:
Sony Playstation 5
Uses:
Used for video games and streaming
Replacement cost:
$500
Software or Data Asset 1
Unique identifier:
Norton Security Appliance
Description:
Security appliance
Uses: Protect my computer and networks from malware
Replacement cost:
$120
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help