SlideShare a Scribd company logo
1 of 1
Download to read offline
Common Areas
ALL l/P Add ressed
Hardware Devices
lnternal / External;
Owned / Managed
of Breach Risk,,,
Networked Devices
a.'
Dimver
--8 . t l
@ , J
,.!::&!-;€g;&. t*;-;.t 1:j
-11::
e*:% F'
€=*re Prioritize
81re Aasets
q:=====7
r€======7
T Vulnerability ,r::
F=q Management
*=:g ...: , '-'
INVENTORY ALL ITEMS:
Hardware & Software
Operating System(s)
Application Software
Utilities
Life Cycle -*;.,
t'
I Ate*e l
1i1'
I 1..
l---f3h f-::.V i.alw,t,..i
llt,.l.. ' ..: .1,, 1
1':r' ::-;i
V M. Life Cycle Frequency Determined By Delta
& Frequency Required By Your Standards Policy
Data Breach I ncident Response P I an
What's your written plan in the event of a Data Breach?
Have you identified the roles each employee must play in a response?
Have you had a Data Breach Drill in the past Quarter, 6-Months, Year?
ALL 3'o Pa rty
Databases & Payment
Porta I s
Ensure ALL External
Systems & Software have been remediated
for ALL Known Vulnerabilities
Letter of Certification from
External Vendors
Web / e-Mail Servers Network Servers
Laptops / Notebooks
Multi-Function Machines
&Routers:
Wired & Wireless
Credit Card Reader Smart Phone
Other End-Point Devices
Firewalls
Copyright@ 2015 Global 1 Research & Deveiopment, Ltd, ALL Rights Reserved

More Related Content

What's hot (8)

Shahzad Khan
Shahzad KhanShahzad Khan
Shahzad Khan
 
Medical Device Software
Medical Device SoftwareMedical Device Software
Medical Device Software
 
V&V Considerations In Implementing IEC61508-3
V&V Considerations In Implementing IEC61508-3V&V Considerations In Implementing IEC61508-3
V&V Considerations In Implementing IEC61508-3
 
QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304QAdvis - software risk management based on IEC/ISO 62304
QAdvis - software risk management based on IEC/ISO 62304
 
8. operational risk management
8.  operational risk management8.  operational risk management
8. operational risk management
 
Hardware review rubrics
Hardware review rubricsHardware review rubrics
Hardware review rubrics
 
Reliability Instrumented System | Arrelic Insights
Reliability Instrumented System | Arrelic Insights Reliability Instrumented System | Arrelic Insights
Reliability Instrumented System | Arrelic Insights
 
Malewareanalysis
Malewareanalysis Malewareanalysis
Malewareanalysis
 

Similar to Common Areas of Data Breach

Mw training slide
Mw training slideMw training slide
Mw training slide
dedoyin
 
Peripheral devices2.pptx
Peripheral devices2.pptxPeripheral devices2.pptx
Peripheral devices2.pptx
marlete4
 
511718784-maintain-inventory-of-equipment-software-and-documentation.pptx
511718784-maintain-inventory-of-equipment-software-and-documentation.pptx511718784-maintain-inventory-of-equipment-software-and-documentation.pptx
511718784-maintain-inventory-of-equipment-software-and-documentation.pptx
teferiGetachew1
 
BRKDCT-3144 - Advanced - Troubleshooting Cisco Nexus 7000 Series Switches (20...
BRKDCT-3144 - Advanced - Troubleshooting Cisco Nexus 7000 Series Switches (20...BRKDCT-3144 - Advanced - Troubleshooting Cisco Nexus 7000 Series Switches (20...
BRKDCT-3144 - Advanced - Troubleshooting Cisco Nexus 7000 Series Switches (20...
aaajjj4
 
Marko Gargenta_Remixing android
Marko Gargenta_Remixing androidMarko Gargenta_Remixing android
Marko Gargenta_Remixing android
Droidcon Berlin
 
Forti gate troubleshooting_guide_v0.10
Forti gate troubleshooting_guide_v0.10Forti gate troubleshooting_guide_v0.10
Forti gate troubleshooting_guide_v0.10
Phong Nguyễn
 

Similar to Common Areas of Data Breach (20)

DeviceDriverNov18.ppt
DeviceDriverNov18.pptDeviceDriverNov18.ppt
DeviceDriverNov18.ppt
 
Smart phone application
Smart phone applicationSmart phone application
Smart phone application
 
BASIC COMPUTER PERIPHERALS/DEVICES/SYSTEMS
BASIC COMPUTER PERIPHERALS/DEVICES/SYSTEMSBASIC COMPUTER PERIPHERALS/DEVICES/SYSTEMS
BASIC COMPUTER PERIPHERALS/DEVICES/SYSTEMS
 
6 profiling tools
6 profiling tools6 profiling tools
6 profiling tools
 
Mw training slide
Mw training slideMw training slide
Mw training slide
 
Troubleshooting & Tools
Troubleshooting & ToolsTroubleshooting & Tools
Troubleshooting & Tools
 
UserManual43.pdf
UserManual43.pdfUserManual43.pdf
UserManual43.pdf
 
PLUG : Presentation Layer Universal Generator
 PLUG : Presentation Layer Universal Generator PLUG : Presentation Layer Universal Generator
PLUG : Presentation Layer Universal Generator
 
Peripheral devices2.pptx
Peripheral devices2.pptxPeripheral devices2.pptx
Peripheral devices2.pptx
 
511718784-maintain-inventory-of-equipment-software-and-documentation.pptx
511718784-maintain-inventory-of-equipment-software-and-documentation.pptx511718784-maintain-inventory-of-equipment-software-and-documentation.pptx
511718784-maintain-inventory-of-equipment-software-and-documentation.pptx
 
BRKDCT-3144 - Advanced - Troubleshooting Cisco Nexus 7000 Series Switches (20...
BRKDCT-3144 - Advanced - Troubleshooting Cisco Nexus 7000 Series Switches (20...BRKDCT-3144 - Advanced - Troubleshooting Cisco Nexus 7000 Series Switches (20...
BRKDCT-3144 - Advanced - Troubleshooting Cisco Nexus 7000 Series Switches (20...
 
Process
ProcessProcess
Process
 
Simens plc training. simatic working-with-step-7
Simens  plc  training. simatic working-with-step-7Simens  plc  training. simatic working-with-step-7
Simens plc training. simatic working-with-step-7
 
V center operations enterprise standalone technical presentation
V center operations enterprise standalone technical presentationV center operations enterprise standalone technical presentation
V center operations enterprise standalone technical presentation
 
.conf2011: Web Analytics Throwdown: with NPR and Intuit
.conf2011: Web Analytics Throwdown: with NPR and Intuit.conf2011: Web Analytics Throwdown: with NPR and Intuit
.conf2011: Web Analytics Throwdown: with NPR and Intuit
 
A Case Study of the Capital One Data Breach
A Case Study of the Capital One Data BreachA Case Study of the Capital One Data Breach
A Case Study of the Capital One Data Breach
 
Introduction to EMBEDDED SYSTEM.pdf
Introduction to EMBEDDED SYSTEM.pdfIntroduction to EMBEDDED SYSTEM.pdf
Introduction to EMBEDDED SYSTEM.pdf
 
Permission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine LearningPermission Driven Malware Detection using Machine Learning
Permission Driven Malware Detection using Machine Learning
 
Marko Gargenta_Remixing android
Marko Gargenta_Remixing androidMarko Gargenta_Remixing android
Marko Gargenta_Remixing android
 
Forti gate troubleshooting_guide_v0.10
Forti gate troubleshooting_guide_v0.10Forti gate troubleshooting_guide_v0.10
Forti gate troubleshooting_guide_v0.10
 

More from William Kiss

More from William Kiss (8)

North America's Electrical Grid @ Risk v1.3
North America's Electrical Grid @ Risk v1.3North America's Electrical Grid @ Risk v1.3
North America's Electrical Grid @ Risk v1.3
 
The Silver Bullet of Cyber Security v1.1
The Silver Bullet of Cyber Security v1.1The Silver Bullet of Cyber Security v1.1
The Silver Bullet of Cyber Security v1.1
 
Ali
AliAli
Ali
 
Your Cyber Security Picture - A Starting Point
Your Cyber Security Picture - A Starting PointYour Cyber Security Picture - A Starting Point
Your Cyber Security Picture - A Starting Point
 
One Way Hackers Steal Data From Your Systems
One Way Hackers Steal Data From Your SystemsOne Way Hackers Steal Data From Your Systems
One Way Hackers Steal Data From Your Systems
 
Cyber Security Weakest Links
Cyber Security Weakest LinksCyber Security Weakest Links
Cyber Security Weakest Links
 
4 A's BillKiss
4 A's BillKiss4 A's BillKiss
4 A's BillKiss
 
Cyber Attack Phase Progression
Cyber Attack Phase ProgressionCyber Attack Phase Progression
Cyber Attack Phase Progression
 

Common Areas of Data Breach

  • 1. Common Areas ALL l/P Add ressed Hardware Devices lnternal / External; Owned / Managed of Breach Risk,,, Networked Devices a.' Dimver --8 . t l @ , J ,.!::&!-;€g;&. t*;-;.t 1:j -11:: e*:% F' €=*re Prioritize 81re Aasets q:=====7 r€======7 T Vulnerability ,r:: F=q Management *=:g ...: , '-' INVENTORY ALL ITEMS: Hardware & Software Operating System(s) Application Software Utilities Life Cycle -*;., t' I Ate*e l 1i1' I 1.. l---f3h f-::.V i.alw,t,..i llt,.l.. ' ..: .1,, 1 1':r' ::-;i V M. Life Cycle Frequency Determined By Delta & Frequency Required By Your Standards Policy Data Breach I ncident Response P I an What's your written plan in the event of a Data Breach? Have you identified the roles each employee must play in a response? Have you had a Data Breach Drill in the past Quarter, 6-Months, Year? ALL 3'o Pa rty Databases & Payment Porta I s Ensure ALL External Systems & Software have been remediated for ALL Known Vulnerabilities Letter of Certification from External Vendors Web / e-Mail Servers Network Servers Laptops / Notebooks Multi-Function Machines &Routers: Wired & Wireless Credit Card Reader Smart Phone Other End-Point Devices Firewalls Copyright@ 2015 Global 1 Research & Deveiopment, Ltd, ALL Rights Reserved