Professional Documents
Culture Documents
Unit-V Part-2
Unit-V Part-2
Unit-V Part-2
Part-II
2. Secure coding: These practices are important because they are a good mitigation control
to protect organizations from “Malicious Code” inside business applications (especially those
applications that are mission critical).
3. H R checks: These are important prior to employment as well as after employment (from
malicious insiders’ considerations).
UNIT-IV Cyber Security - Organizational implications
Cost of cyber crimes and IPR issues
Organizational Implications of Software Piracy
Again, there are lessons to learn:
4. Access controls:
These are always important, for example, shared IDs and shared laptops are dangerous.
Access privileges should be granted carefully, especially when they involve access to
confidential and sensitive information of the organization.
In the benchmark study mentioned earlier, it was found that there was a direct positive
correlation between the amount of money organizations spent and the cybercrimes
prevented/minimized in the long run.
5. Importance of security governance:
It cannot be ignored – policies, procedures and their effective implementation cannot be
over-emphasized.
G o od governance is essential for maintaining a healthy security posture in the
organization.
Ultimately it helps to reduce cybercrime incidents.
UNIT-IV Cyber Security - Organizational implications
Web threats for organizations
Overview of Web Threats to Organizations
Large number of companies as well as individuals have a connection to the Internet.
Employees expect to have Internet access at work just like they do at home.
Mobile workforce has various categories.
Workforce mobility poses challenges for IT managers whose agenda is to protect the
business and business assets against malware.
Protection of information assets is important; especially protection of removable/detachable
media.