Spending unnecessary resources to protect worthless data is not a good business practice. Classifying data appropriately is an important policy to implement in order to manage the security expense associated with storage, use, and sharing of sensitive information. This applies to Department of Defense security classifications, corporate proprietary levels, or even personal identifying information.
- [Narrator] Over-Classification.…So the 80/20 rule works in a lot of places in life.…Definitely works here.…Out of all the data around there is only…a small percentage of it that is valuable.…Identifying that data and narrowing things down even…further with classification is important…in order to optimize security costs.…Spending 80 percent of your resources…on the top 20 percent valuable data,…vulnerabilities, or risks will probably have the best ROI.…
If everything is classified secret and valuable to…include emails with everyone's favorite recipes,…then the costs will quickly become unmanageable…as the data becomes unmanageable as well.…This is easy to think about when considering data backups.…If it isn't important enough to have backups…then why spend resources on it?…You can't just throw your garbage out…though in case something is missed.…That is where the dumpster diving concept came from.…
DoD has simple layers but a ton of caveats.…Unrestricted, which is the lowest risk,…restricted, confidential, secret, top secret,…
Note: This course was recorded and produced by Mentor Source, Inc. We're pleased to host this training in our library.
- Introduction to Spring
- Configuring the ApplicationContext
- Using the Spring expression language
- Configuring proxies
- Autowiring beans
- Using lifecycle methods
- Configuring beans with XML
- Understanding the initialization phases of the bean lifecycle
- Aspect-oriented programming and Spring