Skip to content
Casturity.com
  • HOME
  • CAREER
  • VENDORS
  • RESOURCES
  • ABOUT
  • ARTICLES
Casturity.com
cyber security training
Documentation

What is an Asset? – Risk Management Terminology

An asset is anything in an organization that should be protected. Assets can be very broad and some examples include:

  • Laptops
  • Servers
  • Databases
  • Hard drives
  • Company products
  • Facilities
  • Processes
  • Furniture
  • Employees

Assets can vary from organization to organization. In theory, anything an organization classifies as important enough to protect, can be labeled as an asset for risk management purposes.

Post navigation

Previous Previous
What is Risk Management?
NextContinue
What is Asset Valuation? – Risk Management Terminology

Similar Posts

What is a Threat? – Risk Management Terminology
Documentation

What is a Threat? – Risk Management Terminology

Read More What is a Threat? – Risk Management TerminologyContinue

HTTP Status Code 308 – Permanent Redirect
Documentation

HTTP Status Code 308 – Permanent Redirect

Read More HTTP Status Code 308 – Permanent RedirectContinue

What is a Breach? – Risk Management Terminology
Documentation

What is a Breach? – Risk Management Terminology

Read More What is a Breach? – Risk Management TerminologyContinue

HTTP Status Code 416 – Requested Range Not Satisfiable
Documentation

HTTP Status Code 416 – Requested Range Not Satisfiable

Read More HTTP Status Code 416 – Requested Range Not SatisfiableContinue

HTTP Status Code 203 – Non-Authoritative Information
Documentation

HTTP Status Code 203 – Non-Authoritative Information

Read More HTTP Status Code 203 – Non-Authoritative InformationContinue

What is Abstraction in Security?
Documentation

What is Abstraction in Security?

Read More What is Abstraction in Security?Continue

Casturity.com

Network & Infrastructure Security

Documentation

  • What is an IAVM? | DoD RMF
  • What Is A Cross-layer function?
  • Cross-layer functions
    Cross-layer functions | OSI Model
  • Seven Layers of OSI Model Explained
    7 Layers of OSI Model Explained

Guides

  • HTML Injection. Tryhackme. Free cyber security training.
    HTML Injection Explained
  • How to perform a Penetration Test.
    Comprehensive Guide to Penetration Tests | Tools, Process & Methods
  • Universal XSS via Evernote WebClipper
    Universal XSS via Evernote WebClipper
  • Semmle QL
    Vulnerability hunting with Semmle QL: DOM XSS

Tutorials

  • How to use exiftool. Learn cyber security.
    How to use ExifTool? Metadata Tool
  • How to use inurlbr dork automation tool. Learn cyber security.
    How to use Inurlbr? Dork Automation Tool
  • How to use search engine dorks with Google.
    How to use Search Engine Dorks?
  • How to use Photon for OSINT. Learn cyber security.
    How to use Photon.py? | RECON

© 2020-2022 Casturity.com

  • HOME
  • CAREER
  • VENDORS
  • RESOURCES
  • ABOUT
  • ARTICLES