Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

IAS SIR WENDELL

INFORMATION SECURITY AND CYBER 04 COMPLIANCE MEETING


SECURITY REGULATORY AND LEGAL
REQUIREMENTS, SUCH AS THOSE
INFORMATION SECURITY
RELATED TO DATA PRIVACY AND CYBER SECURITY IS THE PRACTICE OF
IS THE PRACTICE OF PROTECTING PROTECTION. PROTECTING COMPUTERS, MOBILE
INFORMATION BY MITIGATING DEVICES, SERVERS, ELECTRONIC
05 RISK MANAGEMENT IDENTIFYING
INFORMATION RISKS SYSTEMS, NETWORKS, AND DATA
AND MITIGATING POTENTIAL
INFORMATION SECURITY OBJECTIVES SECURITY THREATS TO PREVENT
HARM TO THE ORGANIZATION..
CONFIDENTIALITY INFORMATION IS TYPES OF CYBER SECURITY
NOT DISCLOSED TO UNAUTHORIZED 06 DISASTER RECOVERY DEVELOPING
AND IMPLEMENTING A PLAN TO 01 APPLICATION SECURITY MOST OF
INDIVIDUALS, ENTITIES AND PROCESS.
QUICKLY RECOVER FROM DATA LOSS THE APPS THAT WE USE ON OUR
INTEGRITY MAINTAINING ACCURACY OR SYSTEM FAILURES. CELL- PHONE ARE SECURED
AND COMPLETENESS OF DATA
07 AUTHENTICATION VERIFYING THE 02 NETWORK SECURITY GUARD YOUR
AVAILABILTY INFORMATION MUST BE IDENTITY OF USERS INTERNAL NETWORK
AVAILABLE WHEN NEEDED.
08 ENCRYPTION PROTECTING 03 CLOUD SECURITY IT ENHANCES
SENSITIVE INFORMATION PRIVACY AND SAVES DATA ON THE
CLOUD
OTHER PRINCIPLE THAT GOVERNS 09 NETWORK SECURITY PROTECTING
INFORMATION SECURITY COMPUTER NETWORKS FROM 04 MOBILE SECURITY MOBILE IS THE
PROGRAMS. UNAUTHORIZED ACCESS VERY COMMON GADGETS WE USE
DAILY
NON REPUDATION ONE PARTY 10 PHYSICAL SECURITY PROTECTING
CANNOT DENY RECEIVING A INFORMATION SYSTEMS AND THE 05 CRITICAL INFRASTRUCTURE
MESSAGE. INFORMATION SECURITY THE FAILURE OR BLACKOUT

AUTHENTICITY VERIFYING THAT ISSUES OF INFORMATION SECURITY 06 INTERNET OF THINGS SECURITY


USERS ARE WHO THEY SAY THEY ARE THESE DEVICES ARE EASY TARGETS
AND THAT EACH INPUT ARRIVING AT 01 CYBER THREATS FOR ATTACKERS USING AUTOMATED
DESTINATION IS FROM A TRUSTED SCRIPTS
INCREASING SOPHISTICATION OF
SOURCE.
CYBER ATTACKS. IMPORTANCE OF CYBER SECURITY
ACCOUNTABILITY IT SHOULD BE
02 HUMAN ERROR 01 CYBER CRIME IS ON RISING
POSSIBLE TO TRACE ACTIONS.
PEOPLE CAN INADVERTENTLY THERE ARE 4000 ROUGHLY CYBER
ATTACKS EVERY DAY. ONE OF THE
03 INSIDER THREATS
REASONS CYBERCRIME IS INCREASING
EMPLOYEES WITH ACCESS TO IS BECAUSE IT IS CHEAP, FAST, AND
SENSITIVE INFORMATION CAN POSE A HIGHLY PROFITABLE COMPARED TO
RISK OTHER TYPES OF CRIME, WHICH IS
WHY CYBERCRIMINALS ARE HEADED.
04 LEGACY SYSTEM OLDER
INFORMATION SYSTEMS MAY NOT 02 DAMAGE IS SIGNIFICANT
HAVE THE SECURITY FEATURES CYBERCRIME CAN COST
ORGANIZATIONS CAN CAUSE
05 COMPLEXITY INCREASING
MILLIONS OF DOLLARS IN DAMAGE
COMPLEXITY OF INFORMATION
03 CYBERSECURITY BUILDS TRUST
06 MOBILE AND IOT DEVICES
CYBERSECURITY AFFECTS TRUST WITH
DEVICES CREATES NEW SECURITY CUSTOMERS AND EMPLOYEES. WHEN
CHALLENGES PEOPLE FEEL THAT THEIR
USERS OF INFORMATION SECURITY INFORMATION IS NOT BEING
07 INTEGRATION WITH THIRD-PARTY PROPERLY SECURED AND KEPT
01 CONFIDENTIALITY KEEPING SYSTEMS MAY HAVE SECURITY PRIVATE, THEY LOSE TRUST IN THE
SENSITIVE INFORMATION VULNERABILITIES. BRAND, PRODUCT, AND SERVICES..
CONFIDENTIAL
08 DATA PRIVACY 04 OUR IDENTITIES PROTECT OUR
02 INTEGRITY MAINTAINING THE DATA USER IDENTITY NOW PROTECTS
PROTECTING PERSONAL AND
ACCURACY AND CONSISTENCY OF BILLIONS OF POINTS OF DATA.
SENSITIVE INFORMATION
DATA,
05 EVERY ORGANIZATION HAS
09 GLOBALIZATION MAKES IT MORE
03 AVAILABILITY ENSURING THAT VULNERABILITIES AS ORGANIZATIONS
DIFFICULT TO SECURE
AUTHORIZED USERS HAVE ACCESS TO EVOLVE, MERGE, AND GROW OVER
INFORMATION,,
THE INFORMATION THEY NEED, TIME, THEIR NETWORKS AND
WHEN THEY NEED IT. SYSTEMS BECOME MORE
IAS SIR WENDELL
COMPLICATED, AND THINGS MAY SLIP
THROUGH THE CRACKS.

RISK CYBER RISK IS A POTENTIAL


CYBER ATTACK IS A DELIBERATE CONSEQUENCE OF THE LOSS OR
ATTEMPT BY EXTERNAL OR INTERNAL DAMAGE OF ASSETS OR DATA
THREATS OR ATTACKERS CAUSED BY A CYBER THREAT. RISK
CAN NEVER BE COMPLETELY
• MALWARE
REMOVED.
 RANSOMWARE
 INJECTION ATTACKS TYPES OF RISKS ASSETS AND ASSETS TYPES
• PHISHING
01 EXTERNAL EXTERNAL CYBER RISKS ASSET AN ASSET CAN BE DEFINED AS
 PRIVILEGE ESCALATIONS
ARE THOSE WHICH COME FROM AN IMPORTANT RESOURCE THAT AN
• UNPATCHED VULNERABLE
OUTSIDE AN ORGANIZATION, SUCH INDIVIDUAL, COMPANY, OR NATION
SOFTWARE
AS CYBERATTACKS, PHISHING, HOLDS WHICH HAS AN ECONOMIC
THREAT A CYBER THREAT IS A RANSOMWARE, DDOS ATTACKS, ETC. VALUE, THAT CAN GENERATE PROFIT
MALICIOUS ACT THAT SEEKS TO STEAL IN THE FUTURE.
02 INTERNAL INTERNAL CYBER RISKS
OR DAMAGE DATA OR DISCOMPOSE
COME FROM INSIDERS. CLASSIFICATION OF ASSETS
THE DIGITAL NETWORK OR SYSTEM. 
RESPONSES TO INFORMATION 01 CONVERTIBILITY
TYPES OF THREATS
SECURITY THREATS
IT SHOWS HOW EASILY AN ASSET CAN
01 INTENTIONAL MALWARE,
01 REDUCE OR MITIGATE BE LIQUIDATED INTO CASH.
PHISHING, AND ACCESSING
IMPLEMENT SAFEGUARDS AND
SOMEONE'S ACCOUNT ILLEGALLY. 02 PHYSICAL EXISTENCE
COUNTERMEASURES TO ELIMINATE
02 UNINTENTIONAL VULNERABILITIES OR BLOCK THREATS. IT SHOWS WHETHER AN ASSET IS
TANGIBLE OR INTANGIBLE.
UNINTENTIONAL THREATS ARE 02 ASSIGN OR TRANSFER
CONSIDERED HUMAN ERRORS, FOR 03 USAGE
PLACE THE COST OF THE THREAT
EXAMPLE, FORGETTING TO UPDATE
ONTO ANOTHER ENTITY OR IT FURTHER CATEGORIZES THE
THE FIREWALL 
ORGANIZATION SUCH AS INSURANCE AVAILABLE ASSETS, BASED ON THEIR
03 NATURAL OR OUTSOURCING. USAGE.

NATURAL DISASTERS CAN ALSO 03 ACCEPT TYPES OF AN ASSETS


DAMAGE THE DATA, THEY ARE
EVALUATE IF THE COST OF THE 01 CURRENT ASSETS
KNOWN AS NATURAL THREATS
COUNTERMEASURE OUTWEIGHS THE
POSSIBLE COST OF LOSS DUE TO THE CURRENT ASSETS ARE ALSO OFTEN
VULNERABILITY
THREAT. REFERRED TO AS SHORT-TERM
IN CYBERSECURITY, A VULNERABILITY ASSETS IN ACCOUNTING TERMS, AS
IS A FLAW IN A SYSTEM'S DESIGN, RISK CATEGORY SCORES CURRENT ASSETS ARE HELD BY A
SECURITY PROCEDURES, INTERNAL COMPANY FOR A SHORT PERIOD.
THE GOAL OF RISK MANAGEMENT IS
CONTROLS, 
TO DETERMINE THE EXACT 02 INTANGIBLE ASSETS
TYPES OF VULNERABILITY LIKELIHOOD THAT A SECURITY EVENT
MIGHT HAPPEN AND THE EXPECTED INTANGIBLE ASSETS ARE SOME OF
01 NETWORK IS CAUSED WHEN FINANCIAL DAMAGE EACH TIME. THE ASSETS, THAT DO NOT HAVE A
THERE ARE SOME FLAWS IN THE PHYSICAL PRESENCE BUT ARE STILL
NETWORK'S HARDWARE OR QUITE VALUABLE FOR A COMPANY.
SOFTWARE.
03 FIXED ASSETS
02 OPERATING SYSTEM GRANTS
A FIXED ASSET IS A LONG-TERM
EVERY PROGRAM/USER TO HAVE
ASSET, THAT HOLDS FOR MANY YEARS
FULL ACCESS TO THE COMPUTER.
(MORE THAN A YEAR).
03 HUMAN USERS' NEGLIGENCE CAN
CAUSE VULNERABILITIES IN THE
SYSTEM. 04 FINANCIAL ASSET - REFER TO THE
INVESTMENT MADE IN THE STOCKS
04 PROCESS SPECIFIC PROCESS
OF OTHER COMPANIES, BANK
CONTROL CAN ALSO CAUSE
INVESTMENTS, PREFERRED EQUITY,
VULNERABILITIES IN THE SYSTEM.
CORPORATE AND SOVEREIGN BONDS
ETC.
IAS SIR WENDELL
REGISTERED MOBILE NUMBER OR
PHONE NUMBER. 

04 SINGLE SIGN-ON SINGLE SIGN-ON


OR SSO IS A WAY TO ENABLE ACCESS
AUTHENTICATION AND TO MULTIPLE APPLICATIONS WITH A
AUTHORIZATION SINGLE SET OF CREDENTIALS.

AUTHENTICATION - IS THE PROCESS 05 SOCIAL AUTHENTICATION


OF IDENTIFYING SOMEONE'S
SOCIAL AUTHENTICATION DOES NOT
IDENTITY BY ASSURING THAT THE
REQUIRE ADDITIONAL SECURITY;
PERSON IS THE SAME AS WHAT HE IS
INSTEAD, IT VERIFIES THE USER WITH
CLAIMING FOR.
THE EXISTING CREDENTIALS FOR THE
TYPES OF AUTHENTIFICATION AVAILABLE SOCIAL NETWORK.

01 SINGLE-FACTOR AUTHENTICATION AUTHORIZATION IS THE PROCESS OF


SINGLE-FACTOR AUTHENTICATION IS GRANTING SOMEONE TO DO
THE SIMPLEST WAY OF SOMETHING.
AUTHENTICATION. IT JUST NEEDS A
* IT DEFINES THAT WHAT DATA AND
USERNAME AND PASSWORD TO
INFORMATION ONE USER CAN
ALLOWS A USER TO ACCESS A
ACCESS. IT IS ALSO SAID AS AUTHZ.
SYSTEM.
*THE AUTHORIZATION USUALLY
02 TWO-FACTOR AUTHENTICATION WORKS WITH AUTHENTICATION SO
AS PER THE NAME, IT IS TWO-LEVEL THAT THE SYSTEM COULD KNOW
SECURITY; HENCE IT NEEDS TWO-STEP WHO IS ACCESSING THE
VERIFICATION TO AUTHENTICATE A INFORMATION.
USER. IT DOES NOT REQUIRE ONLY A
AUTHORIZATION TECHNIQUE
USERNAME AND PASSWORD.
01 ROLE-BASED ACCESS CONTROL
RBAC OR ROLE-BASED ACCESS
03MULTI-FACTOR AUTHENTICATION CONTROL TECHNIQUE IS GIVEN TO
USERS AS PER THEIR ROLE OR PROFILE
THIS IS THE MOST SECURE AND IN THE ORGANIZATION.
ADVANCED LEVEL OF
AUTHORIZATION. IT REQUIRES TWO 02 JSON WEB TOKEN JSON WEB
OR MORE THAN TWO LEVELS OF TOKEN OR JWT IS AN OPEN
SECURITY FROM DIFFERENT AND STANDARD USED TO SECURELY
INDEPENDENT CATEGORIES. TRANSMIT THE DATA BETWEEN THE
PARTIES IN THE FORM OF THE JSON
OBJECT.
FAMOUS AUTHENTICATION 03 OPENID AUTHORIZATION
TECHNIQUES
IT HELPS THE CLIENTS TO VERIFY THE
01PASSWORD-BASED IDENTITY OF END- USERS ON THE
AUTHENTICATION BASIS OF AUTHENTICATION.
IT IS THE SIMPLEST WAY OF 04 SAML
AUTHENTICATION. IT REQUIRES THE
PASSWORD FOR THE PARTICULAR SAML STANDS FOR SECURITY
USERNAME. ASSERTION MARKUP LANGUAGE. IT IS
AN OPEN STANDARD THAT PROVIDES
03 2FA/MFA AUTHORIZATION CREDENTIALS TO
SERVICE PROVIDERS.
2FA/MFA OR 2-FACTOR
AUTHENTICATION MULTI-FACTOR 05 OAUTH
AUTHENTICATION IS THE HIGHER
LEVEL OF AUTHENTICATION. OAUTH IS AN AUTHORIZATION
PROTOCOL, WHICH ENABLES THE API
02 PASSWORD LESS TO AUTHENTICATE AND ACCESS THE
AUTHENTICATION REQUESTED RESOURCES.
IN THIS TECHNIQUE, THE USER
DOESN'T NEED ANY PASSWORD;
INSTEAD, HE GETS AN OTP (ONE-TIME
PASSWORD) OR LINK ON HIS

You might also like