Problem
Course: Issues in Cybersecurity
Using the attached template can you assist with a sample solution for an already-filled personal Asset Inventory? I would like a full asset inventory. Conduct the inventory and be sure to consider people, procedures, data, software, hardware, and networking devices. Also, identify systems.
Also, assist with a writeup on this exercise that follows 3 question format.
For what you did, I want you to explain the systematic process for conducting the inventory, including discussing how you dealt with assets that could be in multiple groups.
For results discuss how the inventory translates into the attack surface
From what was learned, is your attack surface bigger or smaller than expected? do you have more or less risk?
Provide a sample of how to enter personal asset inventory using the below template:
Asset Inventory and Risk Assessment Table Template.
Be sure to include a write-up for providing me with some context on what you list
ID Asset Name Description Sys ID CIA Asset Value Priority Threat Categorization Vulneration Description ARO Controls in Place Uncertainty Risk
Value Controls Needed Action Plan ID