Completed
Intro
Class Central Classrooms beta
YouTube videos curated by Class Central.
Classroom Contents
Extending Information Security Methodologies for Personal User in Protecting PII
Automatically move to the next video in the Classroom when playback concludes
- 1 Intro
- 2 Why are we here
- 3 This is not a checklist
- 4 The methodology
- 5 Application of methodologies
- 6 Who am I
- 7 What are you protecting
- 8 Identify critical information assets
- 9 Identify sensitive information
- 10 Identify where sensitive information exists
- 11 Separate data by classification
- 12 Assign impact value
- 13 Assign highwater mark
- 14 Family Personal Assessment
- 15 Third Parties
- 16 Gap in Privacy
- 17 The Basic Process
- 18 Testing Policies
- 19 Evaluating Information
- 20 Document Vulnerability
- 21 Number
- 22 Results
- 23 Opportunities for Improvement