波音游戏-波音娱乐城赌球打不开

IV. Hardening Steps for Data Leakage Prevention - Preparation

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ 

A comprehensive DLP solution that protects data in motion, data at rest and data in user require complex and significant amount of preparation activities. Among these activities, data classification, risk assessment and policy development are the most critical ones and involve both the commitment from senior management and IT security personnel in universities.

1. Risk Assessment

The main purpose for a risk assessment is to identify all types of data within the universities and the associated threats and vulnerabilities. Key stakeholders from different parties should be gathered together to discuss and reach agreements on topics including, but not limited to, the following:

  • What data should be protected? E.g. Internal, Confidential, Highly Confidential

  • What applications or infrastructure should be covered by DLP?

  • What regulatory and legal requirement we need to comply with?

  • Who are the authorised personnel that can receive data from us?

  • What is the reporting and workflow of DLP solutions?

  • What are the expected accuracy rates for different kinds of data? E.g. statistical / conceptual analysis or partial database matching?

2. Data Classification

Data classification helps to categorise data based on the value to universities and add additional controls to limit the access and movements of sensitive data. Proper data classification allows universities to determine the order of protection for different types of data and focus DLP capabilities on information with higher priorities. A typical data classification should include the following:

  • Develop a standard or policy for data classification

  • Identify data type by departments

  • Identify administrator/custodian/users for each data type

  • Identify systems maintaining, processing, or storing each data type

  • Specify the criteria of how the data will be classified and labelled

  • Create an user awareness program

3. Develop Policies, Standards and Procedures

Comprehensive policies, standards, and procedures are the basis for an effective DLP solution. By referencing to established policies, standards, and procedures, the following criteria can be defined for DLP tools to meet:

  • Target data classification(s) that require protection from DLP

  • What actions are permitted to be performed on such data

  • What are the security violations that require DLP to prevent and alert

  • What are the handling processes for identified violations

  • Whom should be informed when there are security violations identified

Developed policies, standards, and procedures should be reviewed and approved by management of relevant parties before finalisation.

Reference:

http://www.isaca.org/Knowledge-Center/Research/Documents/DLP-WP-14Sept2010-Research.pdf
http://www.ironport.com/pdf/ironport_dlp_booklet.pdf

 
 
百家乐官网模拟分析程序| 百家乐官网大钱赢小钱| 固阳县| 百家乐官网娱乐分析软件v| 玩百家乐请高手指点| 百家乐官网玩法教材| 百家乐怎么玩呀| 88娱乐城网址| 如何打百家乐官网的玩法技巧和规则| 太阳城金旭园| 百家乐官网博娱乐网| 百家乐高手论| 百家乐官网看盘技巧| 新花园百家乐的玩法技巧和规则 | 现金网注册送彩金| 太阳城娱乐| 网上百家乐辅助软件| 鸿利国际娱乐城| 免费百家乐娱乐城| 百家乐官网投注双赢技巧| 百家乐免费下| 百家乐官网代打是真的吗| 百家乐真人百家乐皇冠开户| 网上百家乐官网骗人的| 百家乐赌场娱乐网规则| 百家乐官网和的几率| 大发888m磨卡游戏| 百家乐官网正负计算| 真钱赌博网站| 百家乐输了100万| 爱赢百家乐官网现金网| 赌场百家乐怎么破解| 百家乐官网网投注| 送彩金百家乐的玩法技巧和规则| 百家乐官网小音箱| 大发888真钱游戏娱乐城下载| 百家乐官网波音独家注册送彩| 百家乐专业术语| 百家乐官网太阳城| 大发888体育场下载| 百家乐的连庄连闲|