SlideShare a Scribd company logo
1 of 5
Download to read offline
Inventory of Digital Information Assets and Corresponding Data Loss Prevention Plan
@LKCYBER | 2015
This data centric exercise is intended for individuals who want to gain a better understanding of their information assets
and run through a structured brainstorming guide for a Data Loss Prevention (DLP) plan in efforts to protect their data.
Part A: Understand what information assets exist.
Information Assets
List information assets in each box. Ex: Calendar, photos, videos, emails, banking documents, tax files etc…
1 (ex: Family Videos) 21
2 22
3 23
4 24
5 25
6 26
7 27
8 28
9 29
10 30
11 31
12 32
13 33
14 34
15 35
16 36
17 37
18 38
19 39
20 40
Feel free to copy, distribute and amend.
Inventory of Digital Information Assets and Corresponding Data Loss Prevention Plan
@LKCYBER | 2015
Part B: Categorize the information assets identified in part A into Low, Medium and High.
Classification of
Sensitivity Level
Description
High Information assets classified as high include, but are not limited to, information that
can cause significant harm to physical security, financial security and/or ability to
carry on with necessary operations.
Medium Information assets classified as medium include, but are not limited to, information
that can cause moderate harm to physical security, financial security and/or ability to
carry on with necessary operations.
Low Information assets classified as low include, but are not limited to, information that
can cause limited or no harm to physical security, financial security and/or ability to
carry on with necessary operations.
Classify the sensitivity level of each information asset identified in Part A.
1 (ex: High) 21
2 22
3 23
4 24
5 25
6 26
7 27
8 28
9 29
10 30
11 31
12 32
13 33
14 34
15 35
16 36
17 37
18 38
19 39
20 40
Feel free to copy, distribute and amend.
Inventory of Digital Information Assets and Corresponding Data Loss Prevention Plan
@LKCYBER | 2015
Part C: Identify where the information assets are located. [Mirrors & backups included]
Ex: Desktop, Laptop, Mobile, Cloud, External Drives etc…
Information
Asset
(From Part A)
Classification
(From Part B)
Location
(Including backups & the cloud)
Information
Asset
(From Part A)
Classification
(From Part B)
Location
(Including backups & the cloud)
1 21
2 22
3 23
4 24
5 25
6 26
7 27
8 28
9 29
10 30
11 31
12 32
13 33
14 34
15 35
16 36
17 37
18 38
19 39
20 40
Feel free to copy, distribute and amend.
Inventory of Digital Information Assets and Corresponding Data Loss Prevention Plan
@LKCYBER | 2015
Part D: Considering the sensitivity classification identified in Part B and the location of the information assets identified in Part C, create a Data Loss
Prevention (DLP) plan for when the information assets are at rest, in motion, in use, or when they disposed of.
Data at Rest Stored data that is not being transmitted or acted on. Ex: Backup drives, databases etc…
Data in Motion When data is being transmitted from one location to another. Ex: Email, cloud uploads etc…
Data in Use Data that is accessed by the end user on devices. Ex: Desktop, tablet, mobile, IOT etc…
Data Disposal Data that no longer needs to be stored. Ex: Discarded files, draft documents, etc…
Classification Measures for Data Protection
High
Data at Rest
Data in Motion
Data in Use
Data Disposal
Medium
Data at Rest
Data in Motion
Data in Use
Data Disposal
Feel free to copy, distribute and amend.
Inventory of Digital Information Assets and Corresponding Data Loss Prevention Plan
@LKCYBER | 2015
Low
Data at Rest
Data in Motion
Data in Use
Data Disposal
Notes:
Feel free to copy, distribute and amend.

More Related Content

What's hot

Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
Arrow ECS UK
 

What's hot (20)

Data Leakage Prevention
Data Leakage Prevention Data Leakage Prevention
Data Leakage Prevention
 
Enterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - IntelEnterprise API Security & Data Loss Prevention - Intel
Enterprise API Security & Data Loss Prevention - Intel
 
Data Loss Prevention from Symantec
Data Loss Prevention from SymantecData Loss Prevention from Symantec
Data Loss Prevention from Symantec
 
Symantec DLP for Tablet
Symantec DLP for TabletSymantec DLP for Tablet
Symantec DLP for Tablet
 
Shariyaz abdeen data leakage prevention presentation
Shariyaz abdeen   data leakage prevention presentationShariyaz abdeen   data leakage prevention presentation
Shariyaz abdeen data leakage prevention presentation
 
How Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is ImplementedHow Network Data Loss Prevention is Implemented
How Network Data Loss Prevention is Implemented
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
DLP 101: Help identify and plug information leaks
 DLP 101: Help identify and plug information leaks DLP 101: Help identify and plug information leaks
DLP 101: Help identify and plug information leaks
 
Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)Symantec Data Loss Prevention - Technical Proposal (General)
Symantec Data Loss Prevention - Technical Proposal (General)
 
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
Customer Spotlight:Deploying a Data Protection Program in less than 120 DaysCustomer Spotlight:Deploying a Data Protection Program in less than 120 Days
Customer Spotlight: Deploying a Data Protection Program in less than 120 Days
 
ISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting GroupISSA DLP Presentation - Oxford Consulting Group
ISSA DLP Presentation - Oxford Consulting Group
 
Data Leakage Presentation
Data Leakage PresentationData Leakage Presentation
Data Leakage Presentation
 
McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)McAfee Total Protection for Data Loss Prevention (DLP)
McAfee Total Protection for Data Loss Prevention (DLP)
 
Overview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) TechnologyOverview of Data Loss Prevention (DLP) Technology
Overview of Data Loss Prevention (DLP) Technology
 
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow CanyonData Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
Data Loss Prevention in SharePoint 2016 Webinar with Crow Canyon
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epo
 
Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)Technology Overview - Symantec Data Loss Prevention (DLP)
Technology Overview - Symantec Data Loss Prevention (DLP)
 
Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)Data Leakage Prevention (DLP)
Data Leakage Prevention (DLP)
 
DLP
DLPDLP
DLP
 
Data Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify ItData Security: Why You Need Data Loss Prevention & How to Justify It
Data Security: Why You Need Data Loss Prevention & How to Justify It
 

Viewers also liked

Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
Yun Lu
 
Bio rx interview questions and answers'
Bio rx interview questions and answers'Bio rx interview questions and answers'
Bio rx interview questions and answers'
JulianDraxler
 
Gyoergy adrienn e3_k42r_
Gyoergy adrienn e3_k42r_Gyoergy adrienn e3_k42r_
Gyoergy adrienn e3_k42r_
Adrienn György
 
LinkedIn Infographic draft 11_1200
LinkedIn Infographic draft 11_1200LinkedIn Infographic draft 11_1200
LinkedIn Infographic draft 11_1200
AMComms
 

Viewers also liked (18)

Information Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based ApproachInformation Leakage - A knowledge Based Approach
Information Leakage - A knowledge Based Approach
 
Information Leakage & DLP
Information Leakage & DLPInformation Leakage & DLP
Information Leakage & DLP
 
"Disaster Risk Reducion DRR
"Disaster Risk Reducion DRR "Disaster Risk Reducion DRR
"Disaster Risk Reducion DRR
 
Ceph Introduction 2017
Ceph Introduction 2017  Ceph Introduction 2017
Ceph Introduction 2017
 
Presentation1
Presentation1Presentation1
Presentation1
 
Bio rx interview questions and answers'
Bio rx interview questions and answers'Bio rx interview questions and answers'
Bio rx interview questions and answers'
 
1. dasar pneumatik
1. dasar pneumatik1. dasar pneumatik
1. dasar pneumatik
 
ตรรกวิทยา
ตรรกวิทยาตรรกวิทยา
ตรรกวิทยา
 
Gyoergy adrienn e3_k42r_
Gyoergy adrienn e3_k42r_Gyoergy adrienn e3_k42r_
Gyoergy adrienn e3_k42r_
 
Thrust block
Thrust blockThrust block
Thrust block
 
Appilicious
AppiliciousAppilicious
Appilicious
 
ระบบต่อมไร้ท่อ
ระบบต่อมไร้ท่อระบบต่อมไร้ท่อ
ระบบต่อมไร้ท่อ
 
الشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابع
الشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابعالشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابع
الشروط والضوابط العامة للمشاركة في المؤتمر الطلابي السابع
 
สถิติ
สถิติสถิติ
สถิติ
 
OSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security PresentationOSAC: Personal Digital Security Presentation
OSAC: Personal Digital Security Presentation
 
LinkedIn Infographic draft 11_1200
LinkedIn Infographic draft 11_1200LinkedIn Infographic draft 11_1200
LinkedIn Infographic draft 11_1200
 
Diapositivas de Deportes
Diapositivas de Deportes Diapositivas de Deportes
Diapositivas de Deportes
 
PDHPE 5P
PDHPE 5PPDHPE 5P
PDHPE 5P
 

Similar to Data Loss Prevention: Brainstorming

Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backupPdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
lverb
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
Tiffany Graham
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
mariuse18nolet
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
vrickens
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
Sridhar Karnam
 
It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009
Diontealley
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. Statement
Diontealley
 

Similar to Data Loss Prevention: Brainstorming (20)

RWDG Slides: Using Tools to Advance Your Data Governance Program
RWDG Slides: Using Tools to Advance Your Data Governance ProgramRWDG Slides: Using Tools to Advance Your Data Governance Program
RWDG Slides: Using Tools to Advance Your Data Governance Program
 
Network Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster recNetwork Strategy and Design Final assignment disaster rec
Network Strategy and Design Final assignment disaster rec
 
The Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss PreventionThe Definitive Guide to Data Loss Prevention
The Definitive Guide to Data Loss Prevention
 
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
IRJET- An Approach Towards Data Security in Organizations by Avoiding Data Br...
 
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backupPdf wp-emc-mozyenterprise-hybrid-cloud-backup
Pdf wp-emc-mozyenterprise-hybrid-cloud-backup
 
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
M365 Virtual Marthon: Protecting your Teamwork across Microsoft 365
 
Blackberry in Government
Blackberry in GovernmentBlackberry in Government
Blackberry in Government
 
Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...Découvrez comment mettre en place un programme de protection des données effi...
Découvrez comment mettre en place un programme de protection des données effi...
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
Dell's Intelligent Data Management Strategy by IDC
Dell's Intelligent Data Management Strategy by IDCDell's Intelligent Data Management Strategy by IDC
Dell's Intelligent Data Management Strategy by IDC
 
Energy Databank in Nigeria: Management ,Technology and Security
Energy Databank in Nigeria:   Management ,Technology and SecurityEnergy Databank in Nigeria:   Management ,Technology and Security
Energy Databank in Nigeria: Management ,Technology and Security
 
What's Next with Government Big Data
What's Next with Government Big Data What's Next with Government Big Data
What's Next with Government Big Data
 
Risk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs ProvidedRisk Mitigation Plan Based On Inputs Provided
Risk Mitigation Plan Based On Inputs Provided
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
 
Securing your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWPSecuring your IT infrastructure with SOC-NOC collaboration TWP
Securing your IT infrastructure with SOC-NOC collaboration TWP
 
The BYOD Security Battleground
The BYOD Security BattlegroundThe BYOD Security Battleground
The BYOD Security Battleground
 
IRJET- Analysis of Big Data Technology and its Challenges
IRJET- Analysis of Big Data Technology and its ChallengesIRJET- Analysis of Big Data Technology and its Challenges
IRJET- Analysis of Big Data Technology and its Challenges
 
It Capabilities.2009
It Capabilities.2009It Capabilities.2009
It Capabilities.2009
 
Innovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. StatementInnovative-Consulting Technology Capabilities. Statement
Innovative-Consulting Technology Capabilities. Statement
 

More from Dr. Lydia Kostopoulos

Micro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle TrackerMicro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle Tracker
Dr. Lydia Kostopoulos
 

More from Dr. Lydia Kostopoulos (20)

Versatility at the Tip of the Spear: Food Security and the Utility of SOF
Versatility at the  Tip of the Spear:  Food Security and  the Utility of SOFVersatility at the  Tip of the Spear:  Food Security and  the Utility of SOF
Versatility at the Tip of the Spear: Food Security and the Utility of SOF
 
The Corporate Social Responsibility of Artificial Intelligence
The Corporate Social Responsibility  of Artificial IntelligenceThe Corporate Social Responsibility  of Artificial Intelligence
The Corporate Social Responsibility of Artificial Intelligence
 
The Longevity Dividend: What advancements in longevity science mean for indiv...
The Longevity Dividend: What advancements in longevity science mean for indiv...The Longevity Dividend: What advancements in longevity science mean for indiv...
The Longevity Dividend: What advancements in longevity science mean for indiv...
 
Letter from the Frontline in 2050
Letter from the Frontline in 2050Letter from the Frontline in 2050
Letter from the Frontline in 2050
 
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
Concept: Metaverse Center for Women's Human Performance, Healthy Aging and Lo...
 
Imagination Performance: Thinking Beyond GPT
Imagination Performance: Thinking Beyond GPT Imagination Performance: Thinking Beyond GPT
Imagination Performance: Thinking Beyond GPT
 
Decoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDecoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic Capabilities
 
Micro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle TrackerMicro Journaling - Intermediate Cycle Tracker
Micro Journaling - Intermediate Cycle Tracker
 
Decoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic CapabilitiesDecoupling Human Characteristics from Algorithmic Capabilities
Decoupling Human Characteristics from Algorithmic Capabilities
 
Strategic Foresight: Sense-making in an Era of Rapid Change
Strategic Foresight: Sense-making in an Era of Rapid ChangeStrategic Foresight: Sense-making in an Era of Rapid Change
Strategic Foresight: Sense-making in an Era of Rapid Change
 
Technological Surrogacy & Predictive Powers
Technological Surrogacy & Predictive PowersTechnological Surrogacy & Predictive Powers
Technological Surrogacy & Predictive Powers
 
Humans over Hardware: Posturing SOF for the Future
Humans over Hardware:  Posturing SOF for the FutureHumans over Hardware:  Posturing SOF for the Future
Humans over Hardware: Posturing SOF for the Future
 
The Mindset to Thrive in Uncertain, Turbulent & Exponential Times
The Mindset to Thrive in Uncertain, Turbulent & Exponential TimesThe Mindset to Thrive in Uncertain, Turbulent & Exponential Times
The Mindset to Thrive in Uncertain, Turbulent & Exponential Times
 
Leadx: Public-Private Partnership Exercise Handout
Leadx: Public-Private Partnership Exercise HandoutLeadx: Public-Private Partnership Exercise Handout
Leadx: Public-Private Partnership Exercise Handout
 
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
Due Diligence Considerations for Scientists, Commanders, and Politicians As T...
 
Part IV: Workwear Fashion, Human Anatomy, Transparency & Technology
Part IV: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart IV: Workwear Fashion, Human Anatomy, Transparency & Technology
Part IV: Workwear Fashion, Human Anatomy, Transparency & Technology
 
Part III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart III: Workwear Fashion, Human Anatomy, Transparency & Technology
Part III: Workwear Fashion, Human Anatomy, Transparency & Technology
 
Part II: Workwear Fashion, Human Anatomy, Transparency & Technology
Part II: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart II: Workwear Fashion, Human Anatomy, Transparency & Technology
Part II: Workwear Fashion, Human Anatomy, Transparency & Technology
 
Part I: Workwear Fashion, Human Anatomy, Transparency & Technology
Part I: Workwear Fashion, Human Anatomy, Transparency & TechnologyPart I: Workwear Fashion, Human Anatomy, Transparency & Technology
Part I: Workwear Fashion, Human Anatomy, Transparency & Technology
 
#ArtAboutAI - The First Pieces [Digital Exhibit]
#ArtAboutAI - The First Pieces [Digital Exhibit]#ArtAboutAI - The First Pieces [Digital Exhibit]
#ArtAboutAI - The First Pieces [Digital Exhibit]
 

Recently uploaded

Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Riyadh +966572737505 get cytotec
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
AroojKhan71
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
amitlee9823
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
amitlee9823
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
amitlee9823
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
amitlee9823
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
only4webmaster01
 
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
amitlee9823
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
amitlee9823
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
amitlee9823
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
amitlee9823
 

Recently uploaded (20)

Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get CytotecAbortion pills in Doha Qatar (+966572737505 ! Get Cytotec
Abortion pills in Doha Qatar (+966572737505 ! Get Cytotec
 
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al BarshaAl Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
Al Barsha Escorts $#$ O565212860 $#$ Escort Service In Al Barsha
 
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
Digital Advertising Lecture for Advanced Digital & Social Media Strategy at U...
 
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Marol Naka Call On 9920725232 With Body to body massage...
 
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
Mg Road Call Girls Service: 🍓 7737669865 🍓 High Profile Model Escorts | Banga...
 
Sampling (random) method and Non random.ppt
Sampling (random) method and Non random.pptSampling (random) method and Non random.ppt
Sampling (random) method and Non random.ppt
 
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICECHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
CHEAP Call Girls in Saket (-DELHI )🔝 9953056974🔝(=)/CALL GIRLS SERVICE
 
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
Call Girls Jalahalli Just Call 👗 7737669865 👗 Top Class Call Girl Service Ban...
 
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 7737669865 👗 Top Class Call Girl Service B...
 
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
Call Girls Indiranagar Just Call 👗 9155563397 👗 Top Class Call Girl Service B...
 
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night StandCall Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
Call Girls In Hsr Layout ☎ 7737669865 🥵 Book Your One night Stand
 
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
Vip Mumbai Call Girls Thane West Call On 9920725232 With Body to body massage...
 
Invezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signalsInvezz.com - Grow your wealth with trading signals
Invezz.com - Grow your wealth with trading signals
 
April 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's AnalysisApril 2024 - Crypto Market Report's Analysis
April 2024 - Crypto Market Report's Analysis
 
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
Call Girls Hsr Layout Just Call 👗 7737669865 👗 Top Class Call Girl Service Ba...
 
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
Chintamani Call Girls: 🍓 7737669865 🍓 High Profile Model Escorts | Bangalore ...
 
Anomaly detection and data imputation within time series
Anomaly detection and data imputation within time seriesAnomaly detection and data imputation within time series
Anomaly detection and data imputation within time series
 
Discover Why Less is More in B2B Research
Discover Why Less is More in B2B ResearchDiscover Why Less is More in B2B Research
Discover Why Less is More in B2B Research
 
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
Thane Call Girls 7091864438 Call Girls in Thane Escort service book now -
 
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdfAccredited-Transport-Cooperatives-Jan-2021-Web.pdf
Accredited-Transport-Cooperatives-Jan-2021-Web.pdf
 

Data Loss Prevention: Brainstorming

  • 1. Inventory of Digital Information Assets and Corresponding Data Loss Prevention Plan @LKCYBER | 2015 This data centric exercise is intended for individuals who want to gain a better understanding of their information assets and run through a structured brainstorming guide for a Data Loss Prevention (DLP) plan in efforts to protect their data. Part A: Understand what information assets exist. Information Assets List information assets in each box. Ex: Calendar, photos, videos, emails, banking documents, tax files etc… 1 (ex: Family Videos) 21 2 22 3 23 4 24 5 25 6 26 7 27 8 28 9 29 10 30 11 31 12 32 13 33 14 34 15 35 16 36 17 37 18 38 19 39 20 40 Feel free to copy, distribute and amend.
  • 2. Inventory of Digital Information Assets and Corresponding Data Loss Prevention Plan @LKCYBER | 2015 Part B: Categorize the information assets identified in part A into Low, Medium and High. Classification of Sensitivity Level Description High Information assets classified as high include, but are not limited to, information that can cause significant harm to physical security, financial security and/or ability to carry on with necessary operations. Medium Information assets classified as medium include, but are not limited to, information that can cause moderate harm to physical security, financial security and/or ability to carry on with necessary operations. Low Information assets classified as low include, but are not limited to, information that can cause limited or no harm to physical security, financial security and/or ability to carry on with necessary operations. Classify the sensitivity level of each information asset identified in Part A. 1 (ex: High) 21 2 22 3 23 4 24 5 25 6 26 7 27 8 28 9 29 10 30 11 31 12 32 13 33 14 34 15 35 16 36 17 37 18 38 19 39 20 40 Feel free to copy, distribute and amend.
  • 3. Inventory of Digital Information Assets and Corresponding Data Loss Prevention Plan @LKCYBER | 2015 Part C: Identify where the information assets are located. [Mirrors & backups included] Ex: Desktop, Laptop, Mobile, Cloud, External Drives etc… Information Asset (From Part A) Classification (From Part B) Location (Including backups & the cloud) Information Asset (From Part A) Classification (From Part B) Location (Including backups & the cloud) 1 21 2 22 3 23 4 24 5 25 6 26 7 27 8 28 9 29 10 30 11 31 12 32 13 33 14 34 15 35 16 36 17 37 18 38 19 39 20 40 Feel free to copy, distribute and amend.
  • 4. Inventory of Digital Information Assets and Corresponding Data Loss Prevention Plan @LKCYBER | 2015 Part D: Considering the sensitivity classification identified in Part B and the location of the information assets identified in Part C, create a Data Loss Prevention (DLP) plan for when the information assets are at rest, in motion, in use, or when they disposed of. Data at Rest Stored data that is not being transmitted or acted on. Ex: Backup drives, databases etc… Data in Motion When data is being transmitted from one location to another. Ex: Email, cloud uploads etc… Data in Use Data that is accessed by the end user on devices. Ex: Desktop, tablet, mobile, IOT etc… Data Disposal Data that no longer needs to be stored. Ex: Discarded files, draft documents, etc… Classification Measures for Data Protection High Data at Rest Data in Motion Data in Use Data Disposal Medium Data at Rest Data in Motion Data in Use Data Disposal Feel free to copy, distribute and amend.
  • 5. Inventory of Digital Information Assets and Corresponding Data Loss Prevention Plan @LKCYBER | 2015 Low Data at Rest Data in Motion Data in Use Data Disposal Notes: Feel free to copy, distribute and amend.