In this video, learn how an organization should conduct asset control to minimize their risk posture.
- [Instructor] Any item of value to an organization…is known as an asset.…These include things like physical devices,…such as a computer or a server,…but also things that are not physical,…like information and data.…While it may be easy to notice that a desktop computer…has been carried out the front door of your company,…it may not be as easy to know when…your data or information has been taken…outside your organization.…An important first step of asset control…is to ensure that you have a good,…complete inventory of all of your physical assets,…including your servers, computers,…routers, switches, firewalls, laptops,…and external storage devices like USB thumb drives…and hard drives.…
While conducting these physical inventories…can be time consuming,…they're essential to good asset control.…Portable storage devices like USB thumb drives,…external hard drives, CDs, and DVDs…pose an additional risk to your information.…CDs and DVDs are not often inventoried,…but they can be used to steal information…from within your company.…
Author
Released
8/27/2018We are a CompTIA Content Publishing Partner. As such, we are able to offer CompTIA exam vouchers at a 10% discount. For more information on how to obtain this discount, please download these PDF instructions.
- Security assessments
- Audits
- Code reviews
- Assessment tools: Scanners, enumerators, exploitation tools, and more
- Incident response
- Incident response tools: Disk imaging, packet capture, memory forensics, and more
Skill Level Advanced
Duration
Views
Related Courses
-
CASP+ Cert Prep: 1 Risk Management
with Jason Dion2h 34m Advanced
-
Introduction
-
What you should know1m 18s
-
About the exam1m 42s
-
1. Security Assessments
-
Vulnerability assessments4m 20s
-
Malware analysis2m 21s
-
Penetration testing2m 26s
-
Internal vs. external audits1m 37s
-
Code reviews2m 38s
-
2. Tools Used in Security Assessments
-
Port scanners1m 36s
-
Vulnerability scanners1m 14s
-
Protocol analyzers1m 26s
-
Network enumerator1m 52s
-
Password crackers1m 23s
-
Fuzzer1m 9s
-
HTTP interceptor1m 6s
-
Visualization tools1m 43s
-
Command line tools1m 20s
-
Physical security tools1m 38s
-
3. Incident Response
-
E-discovery1m 43s
-
Data retention policies1m 55s
-
Data recovery and storage1m 34s
-
Data ownership2m 44s
-
Data handling2m 41s
-
Legal holds1m 27s
-
Data breach4m 59s
-
Chain of custody4m 3s
-
Forensic analysis2m 5s
-
Order of volatility1m 33s
-
Severity of the incident3m 1s
-
Incident response team1m 57s
-
Post-incident response3m 5s
-
4. Tools Used in Incident Response and Recovery
-
Disk imaging2m 18s
-
nbtstat and netstat1m 12s
-
Netcat1m 2s
-
Memory forensics1m 14s
-
File carving1m 12s
-
FTK and EnCase1m 12s
-
Conclusion
-
Next steps2m 30s
-
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.
CancelTake notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.
Share this video
Embed this video
Video: Electronic inventory and asset control