Given the following information BACKGROUND AND DEFINITIONS A
Given the following information:
BACKGROUND AND DEFINITIONS
Asset – An asset is something of value to the enterprise. Assets are used by organizations to achieve goals, provide a return on investment, and generate revenue. The overall value of the or- ganization can be represented collectively by the value of its assets.
Critical information asset – Critical information assets are the most important assets to an or- ganization. The organization will suffer an adverse impact if
a critical asset is disclosed to unauthorized people
a critical asset is modified without authorization
a critical asset is lost or destroyed
access to a critical asset is interrupted
Information asset – An information asset can be described as information or data that is of value to the organization, including such information as patient records, intellectual property, or cus- tomer information. These assets can exist in physical form (on paper, CDs, or other media) or electronically (stored on databases, in files, on personal computers).
Create a list of information assets that you personally own; Then, what are some of the ways you protect your information assets?
Solution
Information Assets:
1)
I have done a survey in hostels of certain colleges, where I have collected the data about food wastage. Of-Course, every time certain amount of food is wasted in each hostel mess. Using this data we can create an initiative for some people who are not able get food for themselves. Data includes,Hostel location, time of lunch, breakfast, Approximate amount of food wasted etc.
2)
While doing a course in Rural Development, I have done a survey in some villages in near by area. The data I collected is about the ladies in villages. Many ladies were suffering from a common disease which was the result of uncleanliness, regular cooking work using traditional stoves. For each lady, we asked her age, family, members in the house, average working hours in a day, frequency of cleaning the surrounding area, etc. This data can be useful to do some predictions about the reasons of illness of ladies.
Protection:
1) One way is to use private passwords for our system so that no one can access our data.
2) I have implemented LZW compression algorithm in python language and compressed my data into some format, such that if a person gets the data he will not easily decode it.
