preview

Risk Identification

Decent Essays

Risk identification takes place when an organization identify their assets by organizing, categorizing, and prioritizing the data into small groups that are alike (Whitman & Mattord, 2014). Risk identification starts with detecting information assets. An information asset is a set of data that is structured, well defined, and managed as a single component. The information assets in my personal life include my home computer (desktop), laptop, tablet, application software, cell phone, and myself.
My home computer is an information asset that I use to perform many tasks when I am at home. I surf the web, make purchases, and pay bills. I am also able to watch movies and listen to music. I like to use my personal computer when I am at home because the monitor that comes with it is much bigger than my laptop, cell phone, or tablet. I tend to store a lot of personal information on this device. The downside to using this device is that when I am away from home is that there are times when I need information that is on this computer when I am way from home. My home computer gets a classified weighted score of 34 out of 100. It is ranked number 2 for the level of importance.

My laptop is also an information asset that I use in my personal life. I use it most of the time to complete my school work. I need to be able to access the information …show more content…

I have all my contacts, pictures, and important receipts stored on my cell phone. I take this device with me everywhere I go. I am able to perform many of the same functions on my cell phone that I can perform on the desktop, laptop, and tablet. I am able to download many of the same applications that I have on my tablet. However, the cell phone is a handheld device that is smaller and harder to see many of the different applications on. My cell phone gets a classified weighted score of 36 out of 100. It is ranked number 1 for the level of

Get Access