波音游戏-波音娱乐城赌球打不开

IV. Hardening Steps for Data Leakage Prevention - Preparation

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ 

A comprehensive DLP solution that protects data in motion, data at rest and data in user require complex and significant amount of preparation activities. Among these activities, data classification, risk assessment and policy development are the most critical ones and involve both the commitment from senior management and IT security personnel in universities.

1. Risk Assessment

The main purpose for a risk assessment is to identify all types of data within the universities and the associated threats and vulnerabilities. Key stakeholders from different parties should be gathered together to discuss and reach agreements on topics including, but not limited to, the following:

  • What data should be protected? E.g. Internal, Confidential, Highly Confidential

  • What applications or infrastructure should be covered by DLP?

  • What regulatory and legal requirement we need to comply with?

  • Who are the authorised personnel that can receive data from us?

  • What is the reporting and workflow of DLP solutions?

  • What are the expected accuracy rates for different kinds of data? E.g. statistical / conceptual analysis or partial database matching?

2. Data Classification

Data classification helps to categorise data based on the value to universities and add additional controls to limit the access and movements of sensitive data. Proper data classification allows universities to determine the order of protection for different types of data and focus DLP capabilities on information with higher priorities. A typical data classification should include the following:

  • Develop a standard or policy for data classification

  • Identify data type by departments

  • Identify administrator/custodian/users for each data type

  • Identify systems maintaining, processing, or storing each data type

  • Specify the criteria of how the data will be classified and labelled

  • Create an user awareness program

3. Develop Policies, Standards and Procedures

Comprehensive policies, standards, and procedures are the basis for an effective DLP solution. By referencing to established policies, standards, and procedures, the following criteria can be defined for DLP tools to meet:

  • Target data classification(s) that require protection from DLP

  • What actions are permitted to be performed on such data

  • What are the security violations that require DLP to prevent and alert

  • What are the handling processes for identified violations

  • Whom should be informed when there are security violations identified

Developed policies, standards, and procedures should be reviewed and approved by management of relevant parties before finalisation.

Reference:

http://www.isaca.org/Knowledge-Center/Research/Documents/DLP-WP-14Sept2010-Research.pdf
http://www.ironport.com/pdf/ironport_dlp_booklet.pdf

 
 
A8百家乐官网娱乐平台| 百家乐官网的巧门| 赌场百家乐官网是如何玩| 金沙百家乐的玩法技巧和规则 | 网上的百家乐怎么才能| A8百家乐官网娱乐网| bet365娱乐场下载| 百家乐博弈指数| 澳门百家乐官网限红规则| 百家乐太阳城| 百家乐官网大小牌路的含义| 亚洲顶级赌场手机版| 国际百家乐规则| 金臂百家乐官网开户送彩金| 百家乐官网方案| 皇冠网小说网站网址| 百家乐太阳城真人游戏| 财神百家乐官网的玩法技巧和规则 | 太阳城百家乐官网的分数| 多台百家乐的玩法技巧和规则 | 大发888棋牌游戏下载| 唐朝百家乐官网的玩法技巧和规则| G3娱乐城| 大发888官网 df888| 百家乐规| 网上百家乐游戏下载| 做生意的人早晨讲究| 至尊百家乐官网20130301| 立即博百家乐现金网| 二代百家乐官网破解| 大玩家百家乐官网现金网| 金皇冠娱乐城| 速博| 博e百娱乐城怎么样| 百家乐翻天下载| 百家乐游戏单机牌| 时时博百家乐娱乐城| 缅甸百家乐赌博有假吗| 百家乐投注心态| 百家乐大眼仔小路| 百家乐投注网址|