From the course: Ethical Hacking: Introduction to Ethical Hacking

Unlock the full course today

Join today to access over 23,200 courses taught by industry experts.

Asset inventory

Asset inventory

- [Instructor] An organization has multiple assets that can be at risk of a cyber attack. In this segment, we'll discover the different types of assets, along with a discussion on how to conduct an inventory. Companies, government bodies, and individuals have assets, which are resources that can be assigned a value. Assets include tangible assets, such as printers, servers, infrastructure devices, and workstations. There's also intangible assets, such as trade secrets, databases, and company records. Knowing what assets that you have is essential. So let's talk about why this is important. Prior to completing a risk analysis exercise, you must identify and prioritize your assets so that you understand exactly what is at risk. Once done, the next step is to develop and implement policies and procedures to protect the assets. For this task, the team will need to inventory all assets and then assign a business value based on how…

Contents