Asset Management And Data Security

Read Complete Research Material


Asset Management and Data Security

Asset Management and Data Security


It is becoming increasingly important in business realities in regards to optimal management of IT assets. An asset is an entity owned by the company, which affects trace the life cycle. Starting from the simple reality in which the assets of interest are personal computers (desktop and laptops), you can get to more complex situations that manage the installed software as an asset, the network devices, handhelds, and sometimes even equipment such as UPS, or the LCD on the walls of the company (Bender et al., 1996).

The service appointed to the management of these entities is called Asset Management. In the course of financial assets, also called portfolio management, is an activity which manages the funds entrusted in accordance with contractual and regulatory constraints by applying the investment policies set internally, to get the best possible return for risk chosen.

Fixed assets management systems are in the IT field often to manage and track hardware, and software used, i.e. what assets are or were present where they were located locally and for which accounting purposes, resulting in cost as they are and how long will they remain in use. The asset management system typically has a more technical orientation and refers to the data concerning the commercial accounting data (Bohm et al., 2000).


Asset Management

In the case of an Asset Management systems acquired and managed assets; there is usually a product which is the accounting of the subject company. It is often necessary to the commercial and technical data of these goods in a close relationship to consider, which is possible with a separation between commercial and technical plant management only through references between these systems. The procurement of these assets via sales contracts, often includes details that have the technical treatment of decisive influence (for example, warranty period for hardware or license terms for software), so there is also a need for a mutual Differentiation ability.

Depending on the complexity of the corporate reality and number of assets, it may be considered a more or less sophisticated platform of Asset Management. A platform for asset management essentially involves a centralized database that will contain the information of all corporate assets, and a set of processes that persists on the database and allow the query and update of operations. So one can start with a simple custom application to manage this database until one gets to established products on the market that already have everything you need, including built-in tool integration with other elements of the corporate information system (Ellison & Schneier, 2000).

Data Security

As information security refers to properties of information processing systems and stored, which the confidentiality, availability and integrity ensure. Information security helps protect against threats, prevention of damage and minimizing risks. In practice, the information security today is based among others on the ISO / IEC 2700x standard series but also increasingly to ISO / IEC 15408 or common criteria for evaluating IT security. The German share in this standardization work is the DIN NIA-01-27 IT security procedures supervised (Benantar et al., 1996).

The term often refers to a global information security, where the number of potential adverse scenarios is reduced or ...
Related Ads