SlideShare a Scribd company logo
1 of 9
Cyber Security Awareness Month:
Nugget 1
Identify and Classify your Information
Assets
Chinatu Uzuegbu
Cyber Security Consultant
CISSP, CISM, CISA, CEH, ITIL, MCSE
Identify and Classify your Information Assets:
Quotable Quotes
• The degree of Value you place on your
assets determines the level of protection
you would commit to such Assets.
• Think Value before Security.
• The Value you attach to anything in life
would either motivate or demoralise you to
further positive or negative actions towards
that thing.
• The driving force or zeal exhibited on
securing any Asset/Resource is dependent
on the Value attached to it.
Identify and Classify your Valuable Asset:
What is an Asset?
• An Asset is any desirable and good quality item with an
exchangeable Value. It is an item of ownership convertible
into cash; total resources of a person or business.
• An Asset is that data, application, System, Server,
Database, Financial Info, Mobile Phone, Laptop, Network
and communication Infrastructures, Goodwill , cash and
others valuable to you as a person, corporate firm and
Government.
• The level of Value and Importance you attach to each
Asset classifies it as either high or Low.
• An Asset is highly valued if it is such that you cannot do
without. You would need to go the extra mile in securing it
from any form of attack or destruction.
Identify your Valuable Assets:
Cyber Security Process Begins Here...
• Any successful Cyber Security program must
begin with Identifying your critical Information
Assets. That is, those Assets that the Business,
Government or Person actually need to keep
running.
• This could be achieved using an Impact Analysis
and Risk Assessment Techniques, that is,
analysing how much loss the business,
Government or person would incur if for any
reason the Asset is destroyed or tampered with.
• The impact analysis would ascertain a clearer
picture in identifying the actual Assets required.
Classify your Valuable Assets:
Identified! But to what degree?
• The next step after identifying your critical Information
Assets is to classify the identified Assets.
• The classification of each Asset is determined from the
result of the impact analysis with the Asset owners.
• All Stakeholders of the Assets supposedly members of the
Cyber Security Steering Committee would establish the
thresholds and define the categories in the classification
process.
• The Categories could be: Highly Secret, Secret, Private,
Confidential, Public.
• Each of the identified Assets would now be classified
under any of the above categories based on the level of
value placed on it.
The CIA Triad:
Confidentiality, Integrity and Availability
• It is now time to secure the Assets based on their
classification levels using the concept of Confidentiality,
Integrity and Availability(CIA Triad).
• Cyber Security Measures are by best practice tailored
around the concept of the CIA triad.
• Confidentiality assures that the Information Assets are
secured and protected from unauthorised disclosure.
• Integrity assures the accuracy of Information and that
Information is protected from unauthorised
modifications.
• Availability assures that Information is accessible and
timely to the authorised Users as and when required.
Building The Cyber Security Culture
• The journey to building the Cyber Security Culture
begins with the concept of the CIA Triad.
• The Administrative, Technical and Physical Security
Measures which we would look at in the
subsequent nuggets are also tailored around the
concept of the CIA Triad.
• The Administrative, Technical and Physical Security
Measures are implemented from the preventive,
detective, recovery, corrective and deterrent points
of view.
• Going forward we would be looking at the various
types of attacks and how they can be mitigated
using the above techniques and approach.
In Summary
This Nugget may sound a bit technical to most of us here, you may not need to worry
much but grab this :
• To build a successful Cyber Security Culture, you must first Identify and
Classify your Critical Assets as a Business, Government, Non-profit
Organisation or private individual.
• The identification and Classification of Assets could be achieved using the
Impact Analysis and Risk Assessment Techniques.
• The Classification Levels must be defined by the key Stakeholders which
would be a make-up of the Asset Owners and driven from the Top Level
Management.
• Security measures and cultures are tailored around the concept of the
Confidentiality , Integrity and Availability(CIA Triad) of the Information
Assets.
• Administrative, Technical and Physical security measures are applied
from the preventive, detective, recovery, corrective and deterrent points of
view .
• Understanding the above concept would help in building a layered and
seamless security measures around our Information Assets.
• We would be looking at the various attack types and how they could be
mitigated using the above techniques in the subsequent Nuggets.
• We hope this helps.....
See You in the Next Nugget!
Thank You
Chinatu Uzuegbu
CISSP, CISM, CISA, CEH, ITIL, MCSE

More Related Content

More from Chinatu Uzuegbu

What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfChinatu Uzuegbu
 
What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfChinatu Uzuegbu
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfChinatu Uzuegbu
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfChinatu Uzuegbu
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatuChinatu Uzuegbu
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.Chinatu Uzuegbu
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimesChinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpChinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Chinatu Uzuegbu
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Chinatu Uzuegbu
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Chinatu Uzuegbu
 

More from Chinatu Uzuegbu (13)

What The Cyber Entails-2.pdf
What The Cyber Entails-2.pdfWhat The Cyber Entails-2.pdf
What The Cyber Entails-2.pdf
 
What The Cyber Entails-1.pdf
What The Cyber Entails-1.pdfWhat The Cyber Entails-1.pdf
What The Cyber Entails-1.pdf
 
Combating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdfCombating Cyber Crimes Proactively.pdf
Combating Cyber Crimes Proactively.pdf
 
Identity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdfIdentity & Access Management Day 2022.pdf
Identity & Access Management Day 2022.pdf
 
Combating cyber crimes chinatu
Combating cyber crimes chinatuCombating cyber crimes chinatu
Combating cyber crimes chinatu
 
Understanding Identity Management and Security.
Understanding Identity Management and Security.Understanding Identity Management and Security.
Understanding Identity Management and Security.
 
Practical approach to combating cyber crimes
Practical approach to combating cyber crimesPractical approach to combating cyber crimes
Practical approach to combating cyber crimes
 
Cyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-UpCyber Security Awareness Month 2017-Wrap-Up
Cyber Security Awareness Month 2017-Wrap-Up
 
Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6Cyber Security Awareness Month 2017-Nugget 6
Cyber Security Awareness Month 2017-Nugget 6
 
Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015Cyber crime (prohibition,prevention,etc)_act,_2015
Cyber crime (prohibition,prevention,etc)_act,_2015
 
Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3Cyber Security Awareness Month 2017-Nugget 3
Cyber Security Awareness Month 2017-Nugget 3
 
Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2Cyber Security Awareness Month 2017- Nugget2
Cyber Security Awareness Month 2017- Nugget2
 
Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017Cyber Security Awareness Month 2017
Cyber Security Awareness Month 2017
 

Recently uploaded

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationSafe Software
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 

Recently uploaded (20)

DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry InnovationBeyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
Beyond Boundaries: Leveraging No-Code Solutions for Industry Innovation
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 

Identify and Classify your Information Assets

  • 1. Cyber Security Awareness Month: Nugget 1 Identify and Classify your Information Assets Chinatu Uzuegbu Cyber Security Consultant CISSP, CISM, CISA, CEH, ITIL, MCSE
  • 2. Identify and Classify your Information Assets: Quotable Quotes • The degree of Value you place on your assets determines the level of protection you would commit to such Assets. • Think Value before Security. • The Value you attach to anything in life would either motivate or demoralise you to further positive or negative actions towards that thing. • The driving force or zeal exhibited on securing any Asset/Resource is dependent on the Value attached to it.
  • 3. Identify and Classify your Valuable Asset: What is an Asset? • An Asset is any desirable and good quality item with an exchangeable Value. It is an item of ownership convertible into cash; total resources of a person or business. • An Asset is that data, application, System, Server, Database, Financial Info, Mobile Phone, Laptop, Network and communication Infrastructures, Goodwill , cash and others valuable to you as a person, corporate firm and Government. • The level of Value and Importance you attach to each Asset classifies it as either high or Low. • An Asset is highly valued if it is such that you cannot do without. You would need to go the extra mile in securing it from any form of attack or destruction.
  • 4. Identify your Valuable Assets: Cyber Security Process Begins Here... • Any successful Cyber Security program must begin with Identifying your critical Information Assets. That is, those Assets that the Business, Government or Person actually need to keep running. • This could be achieved using an Impact Analysis and Risk Assessment Techniques, that is, analysing how much loss the business, Government or person would incur if for any reason the Asset is destroyed or tampered with. • The impact analysis would ascertain a clearer picture in identifying the actual Assets required.
  • 5. Classify your Valuable Assets: Identified! But to what degree? • The next step after identifying your critical Information Assets is to classify the identified Assets. • The classification of each Asset is determined from the result of the impact analysis with the Asset owners. • All Stakeholders of the Assets supposedly members of the Cyber Security Steering Committee would establish the thresholds and define the categories in the classification process. • The Categories could be: Highly Secret, Secret, Private, Confidential, Public. • Each of the identified Assets would now be classified under any of the above categories based on the level of value placed on it.
  • 6. The CIA Triad: Confidentiality, Integrity and Availability • It is now time to secure the Assets based on their classification levels using the concept of Confidentiality, Integrity and Availability(CIA Triad). • Cyber Security Measures are by best practice tailored around the concept of the CIA triad. • Confidentiality assures that the Information Assets are secured and protected from unauthorised disclosure. • Integrity assures the accuracy of Information and that Information is protected from unauthorised modifications. • Availability assures that Information is accessible and timely to the authorised Users as and when required.
  • 7. Building The Cyber Security Culture • The journey to building the Cyber Security Culture begins with the concept of the CIA Triad. • The Administrative, Technical and Physical Security Measures which we would look at in the subsequent nuggets are also tailored around the concept of the CIA Triad. • The Administrative, Technical and Physical Security Measures are implemented from the preventive, detective, recovery, corrective and deterrent points of view. • Going forward we would be looking at the various types of attacks and how they can be mitigated using the above techniques and approach.
  • 8. In Summary This Nugget may sound a bit technical to most of us here, you may not need to worry much but grab this : • To build a successful Cyber Security Culture, you must first Identify and Classify your Critical Assets as a Business, Government, Non-profit Organisation or private individual. • The identification and Classification of Assets could be achieved using the Impact Analysis and Risk Assessment Techniques. • The Classification Levels must be defined by the key Stakeholders which would be a make-up of the Asset Owners and driven from the Top Level Management. • Security measures and cultures are tailored around the concept of the Confidentiality , Integrity and Availability(CIA Triad) of the Information Assets. • Administrative, Technical and Physical security measures are applied from the preventive, detective, recovery, corrective and deterrent points of view . • Understanding the above concept would help in building a layered and seamless security measures around our Information Assets. • We would be looking at the various attack types and how they could be mitigated using the above techniques in the subsequent Nuggets. • We hope this helps.....
  • 9. See You in the Next Nugget! Thank You Chinatu Uzuegbu CISSP, CISM, CISA, CEH, ITIL, MCSE