Extending Information Security Methodologies for Personal User in Protecting PII

Extending Information Security Methodologies for Personal User in Protecting PII

via YouTube Direct link

Intro

1 of 23

1 of 23

Intro

Class Central Classrooms beta

YouTube videos curated by Class Central.

Classroom Contents

Extending Information Security Methodologies for Personal User in Protecting PII

Automatically move to the next video in the Classroom when playback concludes

  1. 1 Intro
  2. 2 Why are we here
  3. 3 This is not a checklist
  4. 4 The methodology
  5. 5 Application of methodologies
  6. 6 Who am I
  7. 7 What are you protecting
  8. 8 Identify critical information assets
  9. 9 Identify sensitive information
  10. 10 Identify where sensitive information exists
  11. 11 Separate data by classification
  12. 12 Assign impact value
  13. 13 Assign highwater mark
  14. 14 Family Personal Assessment
  15. 15 Third Parties
  16. 16 Gap in Privacy
  17. 17 The Basic Process
  18. 18 Testing Policies
  19. 19 Evaluating Information
  20. 20 Document Vulnerability
  21. 21 Number
  22. 22 Results
  23. 23 Opportunities for Improvement

Never Stop Learning.

Get personalized course recommendations, track subjects and courses with reminders, and more.

Someone learning on their laptop while sitting on the floor.