Taking stock of your information assets

zfqjvupBefore you can take steps to protect your corner of cyberspace, you need to know what information you have that needs protection: your information assets. This will be your inventory template.

 Compile a list, perhaps in a spreadsheet or using the template below, of the different types of information you store on your computer or online. For example, you may have personal correspondence, photographs, work documents or personal details such as your National Insurance number, insurance policy details and passwords for online services.

For each type of information, think of its value to you. Label the most valuable types of information as ‘High’, the least valuable as ‘Low’ and those that are in between as ‘Medium’.

The value could be the cost to replace the information, in time or money, or the impact of its loss on your reputation, for example, all your emails or photographs could all be published online.

Do the same exercise for the online activities you engage in. For example, you might use online banking, shopping or social networking services. This time, label each one with a value based on the potential cost of an unauthorized person gaining access to it.

© The Open University


Comments

Leave a Reply