Identify an itam solution

Assignment Help Computer Networking
Reference no: EM133442256

Assignment:

Project of ITAM and Data

The technology refresh project is in full swing, as is your group's efforts to identify an ITAM solution. However, as you have been looking into how to deploy an ITAM solution and classify the company's IT assets, you keep seeing the phrase "data classification pop up. After a bit of digging you realize that not only does the company not classify its assets, but it doesn't classify its data either. You bring your concerns to the Team Lead and tell them that this is something that you think should be included in the project. The Team Lead is concerned about "scope creep" (as any good project manager should be), so they ask you to document your findings and justify why it should be made a part of the project. The paper should include the following:

? Definition, scope and benefits of data classification

? How it could help the company from both a cost and compliance perspective

? List specific compliance regimes such as Sarbanes-Oxley, export controls, and GDPR (Explain that please)

? Proposed classification categories and what they might include

? Data retention: why it's important and how it might be implemented

? Document and data destruction

? How data classification would integrate with the new ITAM solution

Reference no: EM133442256

Questions Cloud

Were involved in the coding required to build new website : Were you involved in the coding required to build the new website, or was that someone else's responsibility?
Creating an unsecure environment : Without these certifications anyone could say they "know" how to fix/build a network but may end up causing damage or creating an unsecure environment.
What is the role of the network administrator in designing : What is the role of the network administrator in designing, maintaining, and troubleshooting any network?
Create a network of a private class : You want to create a network of a private class A to accommodate a maximum of 1000 devices, equally distributed over four floors (each floor max 250 devices).
Identify an itam solution : As you have been looking into how to deploy an ITAM solution and classify the company's IT assets, you keep seeing the phrase "data classification pop up.
Is arp susceptible to a cyberattack : In the Link Layer, discuss any possible weaknesses in the Address Resolution Protocol. Is ARP susceptible to a cyberattack?
Does this suggest relativism is true since morality would : does this suggest relativism is true since morality would be forever changing? Give reasons for your answers. please cite and quote if you use other resources.
What is the total cost of the optimal bundle : Now suppose that we know that w=1, r=3 and Q=16. Solve the optimal bundle (L and K). What is the total cost of the optimal bundle
What is ransomware : What is Ransomware? Research malware and ransomware solutions. Investigate real examples of ransomware exploits.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd