百家乐怎么玩-澳门百家乐官网娱乐城网址_网上百家乐是不是真的_全讯网888 (中国)·官方网站

IV. Hardening Steps for Data Leakage Prevention - Preparation

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ 

A comprehensive DLP solution that protects data in motion, data at rest and data in user require complex and significant amount of preparation activities. Among these activities, data classification, risk assessment and policy development are the most critical ones and involve both the commitment from senior management and IT security personnel in universities.

1. Risk Assessment

The main purpose for a risk assessment is to identify all types of data within the universities and the associated threats and vulnerabilities. Key stakeholders from different parties should be gathered together to discuss and reach agreements on topics including, but not limited to, the following:

  • What data should be protected? E.g. Internal, Confidential, Highly Confidential

  • What applications or infrastructure should be covered by DLP?

  • What regulatory and legal requirement we need to comply with?

  • Who are the authorised personnel that can receive data from us?

  • What is the reporting and workflow of DLP solutions?

  • What are the expected accuracy rates for different kinds of data? E.g. statistical / conceptual analysis or partial database matching?

2. Data Classification

Data classification helps to categorise data based on the value to universities and add additional controls to limit the access and movements of sensitive data. Proper data classification allows universities to determine the order of protection for different types of data and focus DLP capabilities on information with higher priorities. A typical data classification should include the following:

  • Develop a standard or policy for data classification

  • Identify data type by departments

  • Identify administrator/custodian/users for each data type

  • Identify systems maintaining, processing, or storing each data type

  • Specify the criteria of how the data will be classified and labelled

  • Create an user awareness program

3. Develop Policies, Standards and Procedures

Comprehensive policies, standards, and procedures are the basis for an effective DLP solution. By referencing to established policies, standards, and procedures, the following criteria can be defined for DLP tools to meet:

  • Target data classification(s) that require protection from DLP

  • What actions are permitted to be performed on such data

  • What are the security violations that require DLP to prevent and alert

  • What are the handling processes for identified violations

  • Whom should be informed when there are security violations identified

Developed policies, standards, and procedures should be reviewed and approved by management of relevant parties before finalisation.

Reference:

http://www.isaca.org/Knowledge-Center/Research/Documents/DLP-WP-14Sept2010-Research.pdf
http://www.ironport.com/pdf/ironport_dlp_booklet.pdf

 
 
网络百家乐证据| 百家乐官网娱乐真钱游戏| 大赢家| 网络百家乐官网现金游戏哪里的信誉好啊 | 百家乐的寻龙定穴| 百家乐官网游戏机的玩法| 百家乐龙虎台布多少钱| 百家乐官网视频桌球| 电脑打百家乐怎么赢| 海滨湾国际娱乐城| 百家乐赌博规律| 百家乐官网美食坊| 大发888娱乐平台 游戏| 百家乐赢钱海立方| 百家乐官网盈利分析路单| 百家乐软件| 百家乐网上公式| A8百家乐官网游戏| 威尼斯人娱乐棋牌| 百家乐网页游戏网址| 百家乐官网桌保险| 利来国际网上娱乐| 大世界百家乐娱乐网| 百家乐官网高手怎么下注| 云鼎娱乐场送彩金| 百家乐是骗人的| 百家乐官网赌假的工具| 威尼斯人娱乐城地址lm0| 劳力士百家乐官网的玩法技巧和规则 | 百家乐官网长龙如何判断| 大发888游乐场| 东莞百家乐的玩法技巧和规则 | 全讯网777| 如何胜百家乐官网的玩法技巧和规则 | 东宁县| 波克棋牌免费下载| 百家乐画哪个路单| 做生意需要找风水先生吗| 百家乐官网好多假网站| bet365维护| 大发888大发888娱乐城|