[To be … well, started really]
Areas of Responsibility; Areas of Interest; Areas of …
Include areas that you don’t control but your assets still exist in or move through.
Individual devices vs physical locations (eg ‘office’, ‘home’)
Map out the space - the computer networks - where your assets are located and moved through. Include:
technical links.
Include physical as well as virtual computer network locations
(business with teams and large hands network)
(home with individual devices)
What defences are already in place on each route to prevent unauthorised access?
Tools to explore, monitor and alert