...
The following table provides a examples that can be used to assist in selecting a security category for an information system. For assistance classifying the information system you manage, review the information provided in the Security Objectives section or contact Information Security Services at infosec@mail.wvu.edu.
Level | 1 3 - | LowHigh | Level 2 - Moderate | Level | 3 1 - | HighLow | |
---|---|---|---|---|---|---|---|
Impact on WVU’s mission | NonePotential impact | No impact | Potential impactNone | ||||
Impact on WVU’s reputation | At most a minimal Significant risk | Moderate risk | Significant At most a minimal risk | ||||
Impact on WVU’s finances | NoneSignificant impact | Mild impact | Significant impactNone | ||||
Risk to the security of other systems protecting data | NoneSignificant impact | Mild impact | Significant impactNone | ||||
Risk to life safety | Potential risk | None | None | Potential risk||||
Data Classification | PublicConfidential/Sensitive | Internal/Confidential | Confidential/SensitivePublic |
Minimum Security Requirements
...