波音游戏-波音娱乐城赌球打不开

IV. Hardening Steps for Data Leakage Prevention - Preparation

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ 

A comprehensive DLP solution that protects data in motion, data at rest and data in user require complex and significant amount of preparation activities. Among these activities, data classification, risk assessment and policy development are the most critical ones and involve both the commitment from senior management and IT security personnel in universities.

1. Risk Assessment

The main purpose for a risk assessment is to identify all types of data within the universities and the associated threats and vulnerabilities. Key stakeholders from different parties should be gathered together to discuss and reach agreements on topics including, but not limited to, the following:

  • What data should be protected? E.g. Internal, Confidential, Highly Confidential

  • What applications or infrastructure should be covered by DLP?

  • What regulatory and legal requirement we need to comply with?

  • Who are the authorised personnel that can receive data from us?

  • What is the reporting and workflow of DLP solutions?

  • What are the expected accuracy rates for different kinds of data? E.g. statistical / conceptual analysis or partial database matching?

2. Data Classification

Data classification helps to categorise data based on the value to universities and add additional controls to limit the access and movements of sensitive data. Proper data classification allows universities to determine the order of protection for different types of data and focus DLP capabilities on information with higher priorities. A typical data classification should include the following:

  • Develop a standard or policy for data classification

  • Identify data type by departments

  • Identify administrator/custodian/users for each data type

  • Identify systems maintaining, processing, or storing each data type

  • Specify the criteria of how the data will be classified and labelled

  • Create an user awareness program

3. Develop Policies, Standards and Procedures

Comprehensive policies, standards, and procedures are the basis for an effective DLP solution. By referencing to established policies, standards, and procedures, the following criteria can be defined for DLP tools to meet:

  • Target data classification(s) that require protection from DLP

  • What actions are permitted to be performed on such data

  • What are the security violations that require DLP to prevent and alert

  • What are the handling processes for identified violations

  • Whom should be informed when there are security violations identified

Developed policies, standards, and procedures should be reviewed and approved by management of relevant parties before finalisation.

Reference:

http://www.isaca.org/Knowledge-Center/Research/Documents/DLP-WP-14Sept2010-Research.pdf
http://www.ironport.com/pdf/ironport_dlp_booklet.pdf

 
 
太阳城77scs| bet365娱乐场注册| 百家乐波音平台路单| 德州扑克大赛| 神娱乐百家乐官网的玩法技巧和规则| 真人游戏视频| 百家乐官网出老千视频| 大发888娱乐城官方网站lm0| 百家乐官网顺序| 什么是百家乐官网平注法| 凱旋门百家乐的玩法技巧和规则| 百家乐官网娱乐城网站| 威尼斯人娱乐场 新世纪| 百家乐官网大路图| 顶级赌场手机版官方下载| 百家乐视频连连看| 真人百家乐官网平台下载| 大发888大发8668| 金公主百家乐现金网| 澳门百家乐官网娱乐城送体验金| 大发888娱乐场888| 百家乐如何破解| 百家乐官网视频麻将下载| 尊龙百家乐赌场娱乐网规则| 网上百家乐官网开户送现金| 大发888网页ban| 澳门百家乐看路博客| 百家乐官网怎样玩的| 网上百家乐官网可靠| 半圆百家乐官网桌子| 香港六合彩票| 汉百家乐官网春| E世博百家乐官网娱乐城| 泸水县| 大发888注册优惠代码| 百家乐娱乐真钱游戏| 百家乐官网稳赢秘诀教学| 在线百家乐官网技巧| 北碚区| 娱乐城注册送钱| 大发888娱乐场下载samplingid112 |