Secure Programming and Data Security
Property of Assets
Theoretical Explanation:
The properties of an asset include its name, description, location, source, size, creation, and deletion times. It is also essential to determine how to protect an asset according to security needs like confidentiality, integrity, and authentication.
Applications:
- Asset Name: Defining the name of the asset and identifying what it represents.
- Description: Explaining the function and information contained in the asset.
- Location: Defining the physical location of the asset, such as a database, table, or column.
- Source: Identifying the process or data source from which the asset originated.
- Size: Defining the asset's size to optimize storage needs.
- Creation Time: Logging the date and time when the asset was created.
- Destruction Time: Determining when and how the asset should be destroyed.
- Default Value: Defining the default value of the asset and what it should be initially.
- Confidentiality, Integrity, and Authentication: Defining protection levels for assets according to security needs (C - Confidentiality, I - Integrity, A - Authentication).
- Asset Protection Schema: Developing a specific protection plan for each asset according to its security needs and determining which measures should be taken.