EN | PL | ES | IT | RO

Toolkit


Your inventory list
Feedback form    |       Play Audio    |   Download:
Your inventory list

Template

1. Devices

 no.

 model

 memory, storage

 operating system

 IP, serial number

 current user

 date of entry

 1.

           

 2.

           

 3.

           

 4.

           

 5.

           

 6.

           

 7.

           

 8.

           

 

2. Network connections, network protections, and VPN

 

 no.

 type

 provider, contact details

 location

 status

 configuration

 date of entry

 1.

           

 2.

           

 3.

           

 4.

           

 5.

           

 6.

           

 7.

           

 8.

           

 

3. Antivirus and other protection software

 no.

 type

 provider, contact details

 location

 status

 date of last update

 update version

 date of entry

 1.

             

 2.

             

 3.

             

 4.

             

 5.

             

 6.

             

 7.

             

 8.

             

 

4. List of apps and software

 no.

 name

 provider, contact details

 update version

 person authorized to access

 device authorized to access

 date of entry

 1.

           

 2.

           

 3.

           

 4.

           

 5.

           

 6.

           

 7.

           

 8.

           

 

5. List of users' accounts

 

 no.

 user's account

 location

status: active, inactive, dormant, shared, local, admin

 date of entry

 1.

       

 2.

       

 3.

       

 4.

       

 5.

       

 6.

       

 7.

       

 8.

       

 

 

6. List of vulnerabilities, gaps, and attacks

 

 no.

 type

 location

 status

 response steps

 recovery steps

date of entry

 1.

           

 2.

           

 3.

           

 4.

           

 5.

           

 6.

           

 7.

           

 8.

           


Keywords

cyber security, corporate resources, table, template, printable

Objectives/goals:

Thanks to this toolkit, a trainee will understand how to create an inventory list of company resources; enhance his/ her company's security; and prepare for a possible hacker attack.

Description:

In this toolkit, you will find 6 templates for an inventory list in a table format. You can use each template for your company's use, either by editing it on your computer or printing and handwriting the data.


Related training material

CONSORTIUM


team img
team img
team img



team img
team img
team img
The European Commission's support for the production of this publication does not constitute an endorsement of the contents, which reflect the views only of the authors, and the Commission cannot be held responsible for any use which may be made of the information contained therein.
Legal description – Creative Commons licensing:
The materials published on the CyberMSME project website are classified as Open Educational Resources' (OER) and can be freely (without permission of their creators): downloaded, used, reused, copied, adapted, and shared by users, with information about the source of their origin.