Data can be classified based on following criteria
Excerpt From: Mike Chapple. “(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide.” iBooks.
- Usefulness of the data
- Timeliness of the data
- Value or cost of the data
- Maturity or age of the data
- Lifetime of the data (or when it expires)
- Association with personnel
- Data disclosure damage assessment (that is, how the disclosure of the data would affect the organization)
- Data modification damage assessment (that is, how the modification of the data would affect the organization)
- National security implications of the data
- Authorized access to the data (that is, who has access to the data)
- Restriction from the data (that is, who is restricted from the data)
- Maintenance and monitoring of the data (that is, who should maintain and monitor the data)
- Storage of the data
Excerpt From: Mike Chapple. “(ISC)2 CISSP Certified Information Systems Security Professional Official Study Guide.” iBooks.
No comments:
Post a Comment