Management Of Information Security
Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
Expert Solution & Answer
Book Icon
Chapter 6, Problem 10RQ

Explanation of Solution

Value of an automated asset inventory system:

  • An automated asset inventory system will assign a high value for the risk identification process.
  • It is because; all hardware components are already identified by model, make, and location.
  • This is attributable to the fact that this is the initial step and it aims at finding out the assets of a firm...

Blurred answer
Students have asked these similar questions
What is the definition of risk management in an information system?
How can risk management strategies be applied during the acquisition of information systems, and why are they important?
A recommended approach is that the people assigned to implement a risk management program should begin by studying the models presented earlier in this chapter and identifying what each offers to the envisioned process. Once the organization understands what each risk management model offers, it can adapt one that is a good fit for the specific needs at hand. Which risk control strategy would you consider the most effective and why? When should the strategy be used and why should it not be used for all risks?
Knowledge Booster
Background pattern image
Similar questions
Recommended textbooks for you
Text book image
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Text book image
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Text book image
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning