2 hours 39 minutes
welcome back to asset Security. Of course, in this course, in this lesson, I'm going to talk about types of assets that exist in the company.
So I will talk about types of senses that exist in a company and which assets are subject to focus if I t security. So because there are assets like, for example, chairs and tables that are definitely not the focus off this course and in general
something that I t security has to take care about.
So when we talk of type of facets and company, we have physical assets. So,
like being buildings on everything to go with buildings like chairs, tables like they said. And then we have I t equipment,
um, which is like PCs printers.
And we have also vehicles,
which can be also interesting even for I t security. So
when we talk about buildings,
it is a trend today that most of companies
are involved in leasing the space. So they're leasing the office space or buildings in which they're working in,
easier to just write it off as an expense than to invest and and have a
huge capital investment in building office space.
In that case, everything that goes with the building is absolutely nothing to do with any kind of security within the company because it's usually provided by the
company that's leasing you to space.
Same thing is with vehicles
Onda, and it is also quite modern now to lease the idea equipment. For example, if you're involved in some kind of print outsourcing than the printers on which your employees air printing, they are not yours they released.
And your painful paying monthly fee ive either for racing and then additionally, perp azure per toner. Expend whatever same thing can be with the pieces. The infrastructure equipment like servers, network equipment
industry still hasn't reached the
point in which these things can be leased.
when you talk about data, uh,
becoming more and more important essence in every company, and we're going to talk about the data in general so it can be data like in database day town. The PC data in storage, different kinds of data can exist in a company that are subject to security.
Next, that's it.
But the company has its intellectual property,
and it can be a patent, which is a public kind of record doesn't need any kind of protection. But it also can be people working in the company who are developing new things or
the data regarding the new products and technologies that are being developed in the moment
and then, in the end, in the company, we have financial assets
that consists off
basically money, but it can also be hard currency cash and also can be something like bonds or or precious metals in safe thes. Last ones are definitely because there
currency or bonds or precious metals, they're not focused of I t security, their focus off physical security.
let's talk about those assets that are subject to 80 security. Focus.
So out of physical assets we have I t equipment, which is very important,
and we also can have vehicles. So don't forget that modern legal, especially electric ones, are essentially a self propelled computer.
So you have ah, PC or computer that is running old week ALS and very little moving parts. You have some electric vehicles that have just the four motor. Reductive is on each wheel, and everything else is just electric and electronic
and even even if they're older ones, sometimes they need to be tracked, and this also falls under I t. Security off assets.
Then we have data. They can be on the PC's on the servers or in story Jennings the cloud
and we can have intellectual property again in the form of data.
So when we talk about financial dead assets were talking about protecting those assets that are in the ones and zeros so so virtual money that is stored in in a in a account of a company or accounts.
So in this video or this lesson, I have been talking about types of facets that exist in the company and which one of those our focus off security. So if you have learned this, you are now ready for the
next ah lesson, which is going to be about protecting physical assets in a company.
Intermediate PC Security
The Intermediate PC Security course will teach students about endpoint protection. Students will learn ...
4 CEU/CPE Hours Available
Certificate of Completion Offered
MTA 98-367 Security Fundamentals
The Microsoft Technology Associate (MTA) is Microsoft’s newest suite of technology certification exams that validate ...
2 CEU/CPE Hours Available
Certificate of Completion Offered