Evaluate data asset classification levels for CIA Triad.Identify adequate data handling controls for operations, namely, access control , encryption and monitoring for high, moderate, and low sensitive data.
Security and threat management
Shows the operating landscape of Smart Care. The main Smart Care participants include patients, healthcare service providers,
pharmaceutical companies, regulatory bodies and Government entities.
Once you have moved from the Boardroom to the Break room, you have scribbled down the following requirements that you aim to complete as a
set of activities as part of the more complex process:
Question 1: Identify data assets, their owners, their sensitivity level and specify data handling controls:
a) Identify data assets
b) Identify data asset owner for all identified 15 data assets .
c) Evaluate data asset classification levels for CIA Triad.
d) Identify adequate data handling controls for operations, namely, access control , encryption and monitoring for high, moderate, and low sensitive data.