When considering the diagram below, remember that the perceived value of an information asset depends in part upon the ease with which that asset can be replaced. Certain components of an information system such as hardware, mobile devices, operating systems, and off-the-shelf software can be easily replaced. By contrast, custom applications, custom mobile apps, files, and data are often unique and essentially irreplaceable.
Perhaps you can think of an example in your own life where you or someone you know has lost a laptop computer or a mobile device. Many times people who lose such devices are not upset primarily about the loss of the physical device or the physical hardware itself, but rather are upset about the loss of their photos, documents, or other valuable data. It is such files and data items that represent much of the value of an information system to its users, and we can understand intuitively through examples such as this why the value of an information asset commonly depends upon the ease with which that asset can be replaced.
Related Posts
Using Multiple Controls or Countermeasures for Information Security
In this post I would like to talk about using multiple controls or countermeasures for information s[...]
Defending against Attacks on Information Systems
In broad terms, there are six different approaches that can be used to defend information systems ag[...]
Prerequisites for Attacking an Information System
In order for an attack on an information system to succeed, an attacker must possess three specific [...]
Harm and the Value of Information Assets
Although in an earlier post I discussed the four types of acts that can cause harm to an information[...]
Harm and Information Assets
In this post, I’d like to discuss harmful acts in the context of information assets. To begin, recal[...]
Subscribe to:
Post Comments
(
Atom
)
0 comments :
Post a Comment
Click to see the code!
To insert emoticon you must added at least one space before the code.