SlideShare a Scribd company logo
1 of 4
Download to read offline
a) In terms of software risk,an event is any situation or happening or real/virtual object that
causes risk which is an expectation of loss or a potential problem that may or may not occur in
the future.
a threat according to information security is a possible danger that might exploit a vulnerability
to breach security and therefore cause possible harm.
So,when a threat is in action it becomes an event .( security breach event).
b)Risk management is the process of identifying vulnerabilities and threats to the information
resources used by an organization in achieving business objectives, and deciding what
countermeasures, if any, to take in reducing risk to an acceptable level, based on the value of the
information resource to the organization. Here the information resources are called the assets.
According to Information security,an asset is any data, device, or other component of the
environment that supports information-related activities. Assets generally include hardware,
software and confidential information.Assets should be protected from illicit access, use,
disclosure, alteration, destruction, and/or theft, resulting in loss to the organization.
The goal of information security is to ensure the confidentiality, integrity and availability of
assets from various threats. For example, a hacker might attack a system in order to steal credit
card numbers by exploiting a vulnerability.
If the assests are under risk ,the organization may be driven towards losses in terms of its
business objective ( say information of customers , information regarding customer money and
transactions which affects customer loyalty , damage to infrastructure whether software or
hardware etc).So an asset is not only monetary.
We can broadly classify assets in the following categories:
1. Information assets
Every piece of information about your organization falls in this category. This information has
been collected, classified, organized and stored in various forms.
Example :
Databases: Information about your customers, personnel, production, sales, marketing, finances.
This information is critical for your business. It's confidentiality, integrity and availability is of
utmost importance.
Data files: Transactional data giving up-to-date information about each event.
Operational and support procedures: These have been developed over the years and provide
detailed instructions on how to perform various activities.
Archived information: Old information that may be required to be maintained by law.
Continuity plans, fallback arrangements: These would be developed to overcome any disaster
and maintain the continuity of business. Absence of these will lead to ad-hoc decisions in a
crisis.
2. Software assets
These can be divided into two categories:
a) Application software: Application software implements business rules of the organization.
Creation of application software is a time consuming task. Integrity of application software is
very important. Any flaw in the application software could impact the business adversely.
Example : Third party antivirus software
b) System software: An organization would invest in various packaged software programs like
operating systems, DBMS, development tools and utilities, software packages, office
productivity suites etc.
Most of the software under this category would be available off the shelf, unless the software is
obsolete or non-standard.
3. Physical assets
These are the visible and tangible equipment like:
a) Computer equipment: Mainframe computers, servers, desktops and notebook computers.
b) Communication equipment: Modems, routers, EPABXs and fax machines.
c) Storage media: Magnetic tapes, disks, CDs and DATs.
d) Technical equipment: Power supplies, air conditioners.
e) Furniture and fixtures
4. Services
a) Computing services that the organization has outsourced.
b) Communication services like voice communication, data communication, value added
services, wide area network etc.
c) Environmental conditioning services like heating, lighting, air conditioning and power.
Solution
a) In terms of software risk,an event is any situation or happening or real/virtual object that
causes risk which is an expectation of loss or a potential problem that may or may not occur in
the future.
a threat according to information security is a possible danger that might exploit a vulnerability
to breach security and therefore cause possible harm.
So,when a threat is in action it becomes an event .( security breach event).
b)Risk management is the process of identifying vulnerabilities and threats to the information
resources used by an organization in achieving business objectives, and deciding what
countermeasures, if any, to take in reducing risk to an acceptable level, based on the value of the
information resource to the organization. Here the information resources are called the assets.
According to Information security,an asset is any data, device, or other component of the
environment that supports information-related activities. Assets generally include hardware,
software and confidential information.Assets should be protected from illicit access, use,
disclosure, alteration, destruction, and/or theft, resulting in loss to the organization.
The goal of information security is to ensure the confidentiality, integrity and availability of
assets from various threats. For example, a hacker might attack a system in order to steal credit
card numbers by exploiting a vulnerability.
If the assests are under risk ,the organization may be driven towards losses in terms of its
business objective ( say information of customers , information regarding customer money and
transactions which affects customer loyalty , damage to infrastructure whether software or
hardware etc).So an asset is not only monetary.
We can broadly classify assets in the following categories:
1. Information assets
Every piece of information about your organization falls in this category. This information has
been collected, classified, organized and stored in various forms.
Example :
Databases: Information about your customers, personnel, production, sales, marketing, finances.
This information is critical for your business. It's confidentiality, integrity and availability is of
utmost importance.
Data files: Transactional data giving up-to-date information about each event.
Operational and support procedures: These have been developed over the years and provide
detailed instructions on how to perform various activities.
Archived information: Old information that may be required to be maintained by law.
Continuity plans, fallback arrangements: These would be developed to overcome any disaster
and maintain the continuity of business. Absence of these will lead to ad-hoc decisions in a
crisis.
2. Software assets
These can be divided into two categories:
a) Application software: Application software implements business rules of the organization.
Creation of application software is a time consuming task. Integrity of application software is
very important. Any flaw in the application software could impact the business adversely.
Example : Third party antivirus software
b) System software: An organization would invest in various packaged software programs like
operating systems, DBMS, development tools and utilities, software packages, office
productivity suites etc.
Most of the software under this category would be available off the shelf, unless the software is
obsolete or non-standard.
3. Physical assets
These are the visible and tangible equipment like:
a) Computer equipment: Mainframe computers, servers, desktops and notebook computers.
b) Communication equipment: Modems, routers, EPABXs and fax machines.
c) Storage media: Magnetic tapes, disks, CDs and DATs.
d) Technical equipment: Power supplies, air conditioners.
e) Furniture and fixtures
4. Services
a) Computing services that the organization has outsourced.
b) Communication services like voice communication, data communication, value added
services, wide area network etc.
c) Environmental conditioning services like heating, lighting, air conditioning and power.

More Related Content

Similar to a) In terms of software risk,an event is any situation or happening .pdf

Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxsalmonpybus
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policyRossMob1
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docxtoltonkendal
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A SurveyIRJET Journal
 
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docxRISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docxjoellemurphey
 
It seminar isr
It seminar isrIt seminar isr
It seminar isrASNA p.a
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docxmoggdede
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas IlyasSundas Kayani
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfTheWalkerGroup1
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdfmistryritesh
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics pptWulax37
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceNational Retail Federation
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attackMark Silver
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET Journal
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdfSurendhar57
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)Patrick Garrett
 

Similar to a) In terms of software risk,an event is any situation or happening .pdf (20)

Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policy
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
CCA study group
CCA study groupCCA study group
CCA study group
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docxRISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
 
It seminar isr
It seminar isrIt seminar isr
It seminar isr
 
Data security
Data securityData security
Data security
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics ppt
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
digital marketing
digital marketingdigital marketing
digital marketing
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 

More from anushafashions

we can predict that benzene(C6H6) will exhibit the highest enthalpy .pdf
we can predict that benzene(C6H6) will exhibit the highest enthalpy .pdfwe can predict that benzene(C6H6) will exhibit the highest enthalpy .pdf
we can predict that benzene(C6H6) will exhibit the highest enthalpy .pdfanushafashions
 
The modulus of elasticity of a material (E) is given byE = Axial S.pdf
The modulus of elasticity of a material (E) is given byE = Axial S.pdfThe modulus of elasticity of a material (E) is given byE = Axial S.pdf
The modulus of elasticity of a material (E) is given byE = Axial S.pdfanushafashions
 
Solution.cpp#include iostreamheader file for input output func.pdf
Solution.cpp#include iostreamheader file for input output func.pdfSolution.cpp#include iostreamheader file for input output func.pdf
Solution.cpp#include iostreamheader file for input output func.pdfanushafashions
 
Insufficient dataSolutionInsufficient data.pdf
Insufficient dataSolutionInsufficient data.pdfInsufficient dataSolutionInsufficient data.pdf
Insufficient dataSolutionInsufficient data.pdfanushafashions
 
Q5Although this question asks about SN1 reactivity, knowledge of a.pdf
Q5Although this question asks about SN1 reactivity, knowledge of a.pdfQ5Although this question asks about SN1 reactivity, knowledge of a.pdf
Q5Although this question asks about SN1 reactivity, knowledge of a.pdfanushafashions
 
Portal Triad is an area in the liver named after its triangular shap.pdf
Portal Triad is an area in the liver named after its triangular shap.pdfPortal Triad is an area in the liver named after its triangular shap.pdf
Portal Triad is an area in the liver named after its triangular shap.pdfanushafashions
 
Please find the answers and explanations belowPart 1The sequen.pdf
Please find the answers and explanations belowPart 1The sequen.pdfPlease find the answers and explanations belowPart 1The sequen.pdf
Please find the answers and explanations belowPart 1The sequen.pdfanushafashions
 
Manganese Manganese is a pinkinsh-gray, chemically active elemen.pdf
Manganese Manganese is a pinkinsh-gray, chemically active elemen.pdfManganese Manganese is a pinkinsh-gray, chemically active elemen.pdf
Manganese Manganese is a pinkinsh-gray, chemically active elemen.pdfanushafashions
 
import java.util.ArrayList; import java.util.Iterator; A.pdf
import java.util.ArrayList; import java.util.Iterator;   A.pdfimport java.util.ArrayList; import java.util.Iterator;   A.pdf
import java.util.ArrayList; import java.util.Iterator; A.pdfanushafashions
 
Humans first evovled in the African continent. Various sub species a.pdf
Humans first evovled in the African continent. Various sub species a.pdfHumans first evovled in the African continent. Various sub species a.pdf
Humans first evovled in the African continent. Various sub species a.pdfanushafashions
 
FunctionFunctions in SQL SERVER are reusable. They can accept inpu.pdf
FunctionFunctions in SQL SERVER are reusable. They can accept inpu.pdfFunctionFunctions in SQL SERVER are reusable. They can accept inpu.pdf
FunctionFunctions in SQL SERVER are reusable. They can accept inpu.pdfanushafashions
 
Financial Crisis is a situation which leads to complete turmoil in a.pdf
Financial Crisis is a situation which leads to complete turmoil in a.pdfFinancial Crisis is a situation which leads to complete turmoil in a.pdf
Financial Crisis is a situation which leads to complete turmoil in a.pdfanushafashions
 
false (in linear region)Solutionfalse (in linear region).pdf
false (in linear region)Solutionfalse (in linear region).pdffalse (in linear region)Solutionfalse (in linear region).pdf
false (in linear region)Solutionfalse (in linear region).pdfanushafashions
 
most of hydroxide salts (inorganic salts ) are in.pdf
                     most of hydroxide salts (inorganic salts ) are in.pdf                     most of hydroxide salts (inorganic salts ) are in.pdf
most of hydroxide salts (inorganic salts ) are in.pdfanushafashions
 
CDKs (Cyclin-dependent Phosphokinases) are enzymes that play an impo.pdf
CDKs (Cyclin-dependent Phosphokinases) are enzymes that play an impo.pdfCDKs (Cyclin-dependent Phosphokinases) are enzymes that play an impo.pdf
CDKs (Cyclin-dependent Phosphokinases) are enzymes that play an impo.pdfanushafashions
 
Benefit cost ratio = Incremental cash inflows InvestmentIncremen.pdf
Benefit cost ratio = Incremental cash inflows  InvestmentIncremen.pdfBenefit cost ratio = Incremental cash inflows  InvestmentIncremen.pdf
Benefit cost ratio = Incremental cash inflows InvestmentIncremen.pdfanushafashions
 
A. Packets addressed to a unicast address are delivered to a single .pdf
A. Packets addressed to a unicast address are delivered to a single .pdfA. Packets addressed to a unicast address are delivered to a single .pdf
A. Packets addressed to a unicast address are delivered to a single .pdfanushafashions
 
In Niemann-Pick disease, the deficiency of a spec.pdf
                     In Niemann-Pick disease, the deficiency of a spec.pdf                     In Niemann-Pick disease, the deficiency of a spec.pdf
In Niemann-Pick disease, the deficiency of a spec.pdfanushafashions
 

More from anushafashions (20)

we can predict that benzene(C6H6) will exhibit the highest enthalpy .pdf
we can predict that benzene(C6H6) will exhibit the highest enthalpy .pdfwe can predict that benzene(C6H6) will exhibit the highest enthalpy .pdf
we can predict that benzene(C6H6) will exhibit the highest enthalpy .pdf
 
The modulus of elasticity of a material (E) is given byE = Axial S.pdf
The modulus of elasticity of a material (E) is given byE = Axial S.pdfThe modulus of elasticity of a material (E) is given byE = Axial S.pdf
The modulus of elasticity of a material (E) is given byE = Axial S.pdf
 
Solution.cpp#include iostreamheader file for input output func.pdf
Solution.cpp#include iostreamheader file for input output func.pdfSolution.cpp#include iostreamheader file for input output func.pdf
Solution.cpp#include iostreamheader file for input output func.pdf
 
Insufficient dataSolutionInsufficient data.pdf
Insufficient dataSolutionInsufficient data.pdfInsufficient dataSolutionInsufficient data.pdf
Insufficient dataSolutionInsufficient data.pdf
 
Q5Although this question asks about SN1 reactivity, knowledge of a.pdf
Q5Although this question asks about SN1 reactivity, knowledge of a.pdfQ5Although this question asks about SN1 reactivity, knowledge of a.pdf
Q5Although this question asks about SN1 reactivity, knowledge of a.pdf
 
Portal Triad is an area in the liver named after its triangular shap.pdf
Portal Triad is an area in the liver named after its triangular shap.pdfPortal Triad is an area in the liver named after its triangular shap.pdf
Portal Triad is an area in the liver named after its triangular shap.pdf
 
Please find the answers and explanations belowPart 1The sequen.pdf
Please find the answers and explanations belowPart 1The sequen.pdfPlease find the answers and explanations belowPart 1The sequen.pdf
Please find the answers and explanations belowPart 1The sequen.pdf
 
NRSolutionNR.pdf
NRSolutionNR.pdfNRSolutionNR.pdf
NRSolutionNR.pdf
 
Manganese Manganese is a pinkinsh-gray, chemically active elemen.pdf
Manganese Manganese is a pinkinsh-gray, chemically active elemen.pdfManganese Manganese is a pinkinsh-gray, chemically active elemen.pdf
Manganese Manganese is a pinkinsh-gray, chemically active elemen.pdf
 
import java.util.ArrayList; import java.util.Iterator; A.pdf
import java.util.ArrayList; import java.util.Iterator;   A.pdfimport java.util.ArrayList; import java.util.Iterator;   A.pdf
import java.util.ArrayList; import java.util.Iterator; A.pdf
 
Humans first evovled in the African continent. Various sub species a.pdf
Humans first evovled in the African continent. Various sub species a.pdfHumans first evovled in the African continent. Various sub species a.pdf
Humans first evovled in the African continent. Various sub species a.pdf
 
FunctionFunctions in SQL SERVER are reusable. They can accept inpu.pdf
FunctionFunctions in SQL SERVER are reusable. They can accept inpu.pdfFunctionFunctions in SQL SERVER are reusable. They can accept inpu.pdf
FunctionFunctions in SQL SERVER are reusable. They can accept inpu.pdf
 
Financial Crisis is a situation which leads to complete turmoil in a.pdf
Financial Crisis is a situation which leads to complete turmoil in a.pdfFinancial Crisis is a situation which leads to complete turmoil in a.pdf
Financial Crisis is a situation which leads to complete turmoil in a.pdf
 
false (in linear region)Solutionfalse (in linear region).pdf
false (in linear region)Solutionfalse (in linear region).pdffalse (in linear region)Solutionfalse (in linear region).pdf
false (in linear region)Solutionfalse (in linear region).pdf
 
most of hydroxide salts (inorganic salts ) are in.pdf
                     most of hydroxide salts (inorganic salts ) are in.pdf                     most of hydroxide salts (inorganic salts ) are in.pdf
most of hydroxide salts (inorganic salts ) are in.pdf
 
CDKs (Cyclin-dependent Phosphokinases) are enzymes that play an impo.pdf
CDKs (Cyclin-dependent Phosphokinases) are enzymes that play an impo.pdfCDKs (Cyclin-dependent Phosphokinases) are enzymes that play an impo.pdf
CDKs (Cyclin-dependent Phosphokinases) are enzymes that play an impo.pdf
 
Benefit cost ratio = Incremental cash inflows InvestmentIncremen.pdf
Benefit cost ratio = Incremental cash inflows  InvestmentIncremen.pdfBenefit cost ratio = Incremental cash inflows  InvestmentIncremen.pdf
Benefit cost ratio = Incremental cash inflows InvestmentIncremen.pdf
 
Li2S Sol.pdf
                     Li2S                                      Sol.pdf                     Li2S                                      Sol.pdf
Li2S Sol.pdf
 
A. Packets addressed to a unicast address are delivered to a single .pdf
A. Packets addressed to a unicast address are delivered to a single .pdfA. Packets addressed to a unicast address are delivered to a single .pdf
A. Packets addressed to a unicast address are delivered to a single .pdf
 
In Niemann-Pick disease, the deficiency of a spec.pdf
                     In Niemann-Pick disease, the deficiency of a spec.pdf                     In Niemann-Pick disease, the deficiency of a spec.pdf
In Niemann-Pick disease, the deficiency of a spec.pdf
 

Recently uploaded

Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...EduSkills OECD
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfsanyamsingh5019
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactdawncurless
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...Sapna Thakur
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 

Recently uploaded (20)

INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptxINDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
INDIA QUIZ 2024 RLAC DELHI UNIVERSITY.pptx
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Sanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdfSanyam Choudhary Chemistry practical.pdf
Sanyam Choudhary Chemistry practical.pdf
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
BAG TECHNIQUE Bag technique-a tool making use of public health bag through wh...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 

a) In terms of software risk,an event is any situation or happening .pdf

  • 1. a) In terms of software risk,an event is any situation or happening or real/virtual object that causes risk which is an expectation of loss or a potential problem that may or may not occur in the future. a threat according to information security is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm. So,when a threat is in action it becomes an event .( security breach event). b)Risk management is the process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives, and deciding what countermeasures, if any, to take in reducing risk to an acceptable level, based on the value of the information resource to the organization. Here the information resources are called the assets. According to Information security,an asset is any data, device, or other component of the environment that supports information-related activities. Assets generally include hardware, software and confidential information.Assets should be protected from illicit access, use, disclosure, alteration, destruction, and/or theft, resulting in loss to the organization. The goal of information security is to ensure the confidentiality, integrity and availability of assets from various threats. For example, a hacker might attack a system in order to steal credit card numbers by exploiting a vulnerability. If the assests are under risk ,the organization may be driven towards losses in terms of its business objective ( say information of customers , information regarding customer money and transactions which affects customer loyalty , damage to infrastructure whether software or hardware etc).So an asset is not only monetary. We can broadly classify assets in the following categories: 1. Information assets Every piece of information about your organization falls in this category. This information has been collected, classified, organized and stored in various forms. Example : Databases: Information about your customers, personnel, production, sales, marketing, finances. This information is critical for your business. It's confidentiality, integrity and availability is of utmost importance. Data files: Transactional data giving up-to-date information about each event. Operational and support procedures: These have been developed over the years and provide detailed instructions on how to perform various activities. Archived information: Old information that may be required to be maintained by law. Continuity plans, fallback arrangements: These would be developed to overcome any disaster and maintain the continuity of business. Absence of these will lead to ad-hoc decisions in a
  • 2. crisis. 2. Software assets These can be divided into two categories: a) Application software: Application software implements business rules of the organization. Creation of application software is a time consuming task. Integrity of application software is very important. Any flaw in the application software could impact the business adversely. Example : Third party antivirus software b) System software: An organization would invest in various packaged software programs like operating systems, DBMS, development tools and utilities, software packages, office productivity suites etc. Most of the software under this category would be available off the shelf, unless the software is obsolete or non-standard. 3. Physical assets These are the visible and tangible equipment like: a) Computer equipment: Mainframe computers, servers, desktops and notebook computers. b) Communication equipment: Modems, routers, EPABXs and fax machines. c) Storage media: Magnetic tapes, disks, CDs and DATs. d) Technical equipment: Power supplies, air conditioners. e) Furniture and fixtures 4. Services a) Computing services that the organization has outsourced. b) Communication services like voice communication, data communication, value added services, wide area network etc. c) Environmental conditioning services like heating, lighting, air conditioning and power. Solution a) In terms of software risk,an event is any situation or happening or real/virtual object that causes risk which is an expectation of loss or a potential problem that may or may not occur in the future. a threat according to information security is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm. So,when a threat is in action it becomes an event .( security breach event). b)Risk management is the process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives, and deciding what countermeasures, if any, to take in reducing risk to an acceptable level, based on the value of the
  • 3. information resource to the organization. Here the information resources are called the assets. According to Information security,an asset is any data, device, or other component of the environment that supports information-related activities. Assets generally include hardware, software and confidential information.Assets should be protected from illicit access, use, disclosure, alteration, destruction, and/or theft, resulting in loss to the organization. The goal of information security is to ensure the confidentiality, integrity and availability of assets from various threats. For example, a hacker might attack a system in order to steal credit card numbers by exploiting a vulnerability. If the assests are under risk ,the organization may be driven towards losses in terms of its business objective ( say information of customers , information regarding customer money and transactions which affects customer loyalty , damage to infrastructure whether software or hardware etc).So an asset is not only monetary. We can broadly classify assets in the following categories: 1. Information assets Every piece of information about your organization falls in this category. This information has been collected, classified, organized and stored in various forms. Example : Databases: Information about your customers, personnel, production, sales, marketing, finances. This information is critical for your business. It's confidentiality, integrity and availability is of utmost importance. Data files: Transactional data giving up-to-date information about each event. Operational and support procedures: These have been developed over the years and provide detailed instructions on how to perform various activities. Archived information: Old information that may be required to be maintained by law. Continuity plans, fallback arrangements: These would be developed to overcome any disaster and maintain the continuity of business. Absence of these will lead to ad-hoc decisions in a crisis. 2. Software assets These can be divided into two categories: a) Application software: Application software implements business rules of the organization. Creation of application software is a time consuming task. Integrity of application software is very important. Any flaw in the application software could impact the business adversely. Example : Third party antivirus software b) System software: An organization would invest in various packaged software programs like operating systems, DBMS, development tools and utilities, software packages, office productivity suites etc.
  • 4. Most of the software under this category would be available off the shelf, unless the software is obsolete or non-standard. 3. Physical assets These are the visible and tangible equipment like: a) Computer equipment: Mainframe computers, servers, desktops and notebook computers. b) Communication equipment: Modems, routers, EPABXs and fax machines. c) Storage media: Magnetic tapes, disks, CDs and DATs. d) Technical equipment: Power supplies, air conditioners. e) Furniture and fixtures 4. Services a) Computing services that the organization has outsourced. b) Communication services like voice communication, data communication, value added services, wide area network etc. c) Environmental conditioning services like heating, lighting, air conditioning and power.