Service desk link into IT asset disposal: A case of a discarded IT asset
2013
With the advent of Big Data and strategic investment into complex best-in-breed Governance, Risk, Compliance initiative, and the imminent introduction of Protection of Personal Information Bill in South Africa, are organizations in control of Information Technology Asset throughout its useful life. We look at oversight over IT Asset interface with IT Service Desk support function. Intruders like flowing water will explore the weakest opening much like a chain with the weakest link. In so far sound an organization's information security and internal controls are; it takes just the non-effectiveness or non-existence of a control, such as during IT Asset disposal for a vulnerability to be exploited and a breach to occur. This paper illustrates our finding from forensic analysis of a disposed IT Asset and discovered that we are far from improper disposal and its attendant risk. In actual fact, we are able to link improper disposal to lack of integration between IT Service Desk and IT Asset Disposal. We conclude by outlining considerations an organization should consider in integrating IT asset disposal with IT service desk.
Keywords:
- Correction
- Source
- Cite
- Save
- Machine Reading By IdeaReader
4
References
2
Citations
NaN
KQI