波音游戏源码-波音博彩公司评级_百家乐园天将_新全讯网3344111.c(中国)·官方网站

IV. Hardening Steps for Data Leakage Prevention - Preparation

by JUCC ISTF
/* The following article is extracted from the "Information Security Newsletter" published by the JUCC IS Task Force. */ 

A comprehensive DLP solution that protects data in motion, data at rest and data in user require complex and significant amount of preparation activities. Among these activities, data classification, risk assessment and policy development are the most critical ones and involve both the commitment from senior management and IT security personnel in universities.

1. Risk Assessment

The main purpose for a risk assessment is to identify all types of data within the universities and the associated threats and vulnerabilities. Key stakeholders from different parties should be gathered together to discuss and reach agreements on topics including, but not limited to, the following:

  • What data should be protected? E.g. Internal, Confidential, Highly Confidential

  • What applications or infrastructure should be covered by DLP?

  • What regulatory and legal requirement we need to comply with?

  • Who are the authorised personnel that can receive data from us?

  • What is the reporting and workflow of DLP solutions?

  • What are the expected accuracy rates for different kinds of data? E.g. statistical / conceptual analysis or partial database matching?

2. Data Classification

Data classification helps to categorise data based on the value to universities and add additional controls to limit the access and movements of sensitive data. Proper data classification allows universities to determine the order of protection for different types of data and focus DLP capabilities on information with higher priorities. A typical data classification should include the following:

  • Develop a standard or policy for data classification

  • Identify data type by departments

  • Identify administrator/custodian/users for each data type

  • Identify systems maintaining, processing, or storing each data type

  • Specify the criteria of how the data will be classified and labelled

  • Create an user awareness program

3. Develop Policies, Standards and Procedures

Comprehensive policies, standards, and procedures are the basis for an effective DLP solution. By referencing to established policies, standards, and procedures, the following criteria can be defined for DLP tools to meet:

  • Target data classification(s) that require protection from DLP

  • What actions are permitted to be performed on such data

  • What are the security violations that require DLP to prevent and alert

  • What are the handling processes for identified violations

  • Whom should be informed when there are security violations identified

Developed policies, standards, and procedures should be reviewed and approved by management of relevant parties before finalisation.

Reference:

http://www.isaca.org/Knowledge-Center/Research/Documents/DLP-WP-14Sept2010-Research.pdf
http://www.ironport.com/pdf/ironport_dlp_booklet.pdf

 
 
大发888老虎机技巧| 乐九百家乐官网现金网| 大发888官网充值| 河曲县| 菲律宾百家乐的说法| 百乐彩博彩| 天地人百家乐现金网| 百家乐官网庄家抽水| 真人百家乐蓝盾| 百家乐官网筹码方形| 大发888在线娱乐游戏| 百家乐官网投注技巧球讯网| 百家乐官网犯法| 请问下百家乐去哪个娱乐城玩最好呢| 红桃k娱乐城备用网址| 属虎和属猴牛人做生意| 大发888 bet娱乐场下载| 现金百家乐| 百家乐官网视频官方下载| 大发888下载ylc8| 足球竞彩网| 百家乐对保| 百家乐官网关台| 足球博彩网站| 百家乐怎么完才能嬴| 百家乐官网家乐娱乐城| 百家乐官网筛子游戏| 大发888娱乐捕鱼游戏| 百家乐磁力录| 百家乐官网龙虎台布价格| 克什克腾旗| bet365备用主页器| 澳门百家乐官网游戏下| 玩百家乐官网最好方法| 彩票大赢家| 全讯网信息| 百家乐走势图| 百家乐网上最好网站| 15人百家乐官网桌| 百家乐官网有几种打法| 乐博娱乐|