SlideShare a Scribd company logo
a) In terms of software risk,an event is any situation or happening or real/virtual object that
causes risk which is an expectation of loss or a potential problem that may or may not occur in
the future.
a threat according to information security is a possible danger that might exploit a vulnerability
to breach security and therefore cause possible harm.
So,when a threat is in action it becomes an event .( security breach event).
b)Risk management is the process of identifying vulnerabilities and threats to the information
resources used by an organization in achieving business objectives, and deciding what
countermeasures, if any, to take in reducing risk to an acceptable level, based on the value of the
information resource to the organization. Here the information resources are called the assets.
According to Information security,an asset is any data, device, or other component of the
environment that supports information-related activities. Assets generally include hardware,
software and confidential information.Assets should be protected from illicit access, use,
disclosure, alteration, destruction, and/or theft, resulting in loss to the organization.
The goal of information security is to ensure the confidentiality, integrity and availability of
assets from various threats. For example, a hacker might attack a system in order to steal credit
card numbers by exploiting a vulnerability.
If the assests are under risk ,the organization may be driven towards losses in terms of its
business objective ( say information of customers , information regarding customer money and
transactions which affects customer loyalty , damage to infrastructure whether software or
hardware etc).So an asset is not only monetary.
We can broadly classify assets in the following categories:
1. Information assets
Every piece of information about your organization falls in this category. This information has
been collected, classified, organized and stored in various forms.
Example :
Databases: Information about your customers, personnel, production, sales, marketing, finances.
This information is critical for your business. It's confidentiality, integrity and availability is of
utmost importance.
Data files: Transactional data giving up-to-date information about each event.
Operational and support procedures: These have been developed over the years and provide
detailed instructions on how to perform various activities.
Archived information: Old information that may be required to be maintained by law.
Continuity plans, fallback arrangements: These would be developed to overcome any disaster
and maintain the continuity of business. Absence of these will lead to ad-hoc decisions in a
crisis.
2. Software assets
These can be divided into two categories:
a) Application software: Application software implements business rules of the organization.
Creation of application software is a time consuming task. Integrity of application software is
very important. Any flaw in the application software could impact the business adversely.
Example : Third party antivirus software
b) System software: An organization would invest in various packaged software programs like
operating systems, DBMS, development tools and utilities, software packages, office
productivity suites etc.
Most of the software under this category would be available off the shelf, unless the software is
obsolete or non-standard.
3. Physical assets
These are the visible and tangible equipment like:
a) Computer equipment: Mainframe computers, servers, desktops and notebook computers.
b) Communication equipment: Modems, routers, EPABXs and fax machines.
c) Storage media: Magnetic tapes, disks, CDs and DATs.
d) Technical equipment: Power supplies, air conditioners.
e) Furniture and fixtures
4. Services
a) Computing services that the organization has outsourced.
b) Communication services like voice communication, data communication, value added
services, wide area network etc.
c) Environmental conditioning services like heating, lighting, air conditioning and power.
Solution
a) In terms of software risk,an event is any situation or happening or real/virtual object that
causes risk which is an expectation of loss or a potential problem that may or may not occur in
the future.
a threat according to information security is a possible danger that might exploit a vulnerability
to breach security and therefore cause possible harm.
So,when a threat is in action it becomes an event .( security breach event).
b)Risk management is the process of identifying vulnerabilities and threats to the information
resources used by an organization in achieving business objectives, and deciding what
countermeasures, if any, to take in reducing risk to an acceptable level, based on the value of the
information resource to the organization. Here the information resources are called the assets.
According to Information security,an asset is any data, device, or other component of the
environment that supports information-related activities. Assets generally include hardware,
software and confidential information.Assets should be protected from illicit access, use,
disclosure, alteration, destruction, and/or theft, resulting in loss to the organization.
The goal of information security is to ensure the confidentiality, integrity and availability of
assets from various threats. For example, a hacker might attack a system in order to steal credit
card numbers by exploiting a vulnerability.
If the assests are under risk ,the organization may be driven towards losses in terms of its
business objective ( say information of customers , information regarding customer money and
transactions which affects customer loyalty , damage to infrastructure whether software or
hardware etc).So an asset is not only monetary.
We can broadly classify assets in the following categories:
1. Information assets
Every piece of information about your organization falls in this category. This information has
been collected, classified, organized and stored in various forms.
Example :
Databases: Information about your customers, personnel, production, sales, marketing, finances.
This information is critical for your business. It's confidentiality, integrity and availability is of
utmost importance.
Data files: Transactional data giving up-to-date information about each event.
Operational and support procedures: These have been developed over the years and provide
detailed instructions on how to perform various activities.
Archived information: Old information that may be required to be maintained by law.
Continuity plans, fallback arrangements: These would be developed to overcome any disaster
and maintain the continuity of business. Absence of these will lead to ad-hoc decisions in a
crisis.
2. Software assets
These can be divided into two categories:
a) Application software: Application software implements business rules of the organization.
Creation of application software is a time consuming task. Integrity of application software is
very important. Any flaw in the application software could impact the business adversely.
Example : Third party antivirus software
b) System software: An organization would invest in various packaged software programs like
operating systems, DBMS, development tools and utilities, software packages, office
productivity suites etc.
Most of the software under this category would be available off the shelf, unless the software is
obsolete or non-standard.
3. Physical assets
These are the visible and tangible equipment like:
a) Computer equipment: Mainframe computers, servers, desktops and notebook computers.
b) Communication equipment: Modems, routers, EPABXs and fax machines.
c) Storage media: Magnetic tapes, disks, CDs and DATs.
d) Technical equipment: Power supplies, air conditioners.
e) Furniture and fixtures
4. Services
a) Computing services that the organization has outsourced.
b) Communication services like voice communication, data communication, value added
services, wide area network etc.
c) Environmental conditioning services like heating, lighting, air conditioning and power.

More Related Content

Similar to a) In terms of software risk,an event is any situation or happening .pdf

Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
salmonpybus
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policy
RossMob1
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
toltonkendal
 
CCA study group
CCA study groupCCA study group
CCA study group
IIBA UK Chapter
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
IRJET Journal
 
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docxRISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
joellemurphey
 
It seminar isr
It seminar isrIt seminar isr
It seminar isrASNA p.a
 
Data security
Data securityData security
Data security
AbdulBasit938
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
moggdede
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas IlyasSundas Kayani
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
TheWalkerGroup1
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
mistryritesh
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics ppt
Wulax37
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
National Retail Federation
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
Mark Silver
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET Journal
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
Surendhar57
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - WebFahd Khan
 
digital marketing
digital marketingdigital marketing
digital marketing
abdullahanwarabdulla
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)Patrick Garrett
 

Similar to a) In terms of software risk,an event is any situation or happening .pdf (20)

Discuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docxDiscuss how a successful organization should have the followin.docx
Discuss how a successful organization should have the followin.docx
 
Building and implementing a successful information security policy
Building and implementing a successful information security policyBuilding and implementing a successful information security policy
Building and implementing a successful information security policy
 
Running Head SECURITY AWARENESSSecurity Awareness .docx
Running Head SECURITY AWARENESSSecurity Awareness              .docxRunning Head SECURITY AWARENESSSecurity Awareness              .docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
 
CCA study group
CCA study groupCCA study group
CCA study group
 
IRJET- Data Leak Prevention System: A Survey
IRJET-  	  Data Leak Prevention System: A SurveyIRJET-  	  Data Leak Prevention System: A Survey
IRJET- Data Leak Prevention System: A Survey
 
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docxRISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
RISK MITIGATION AND THREAT IDENTIFICATIONIntroductionInforma.docx
 
It seminar isr
It seminar isrIt seminar isr
It seminar isr
 
Data security
Data securityData security
Data security
 
11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx11What is Security 1.1 Introduction The central role of co.docx
11What is Security 1.1 Introduction The central role of co.docx
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
 
Cybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdfCybersecurity risk assessments help organizations identify.pdf
Cybersecurity risk assessments help organizations identify.pdf
 
10.1.1.436.3364.pdf
10.1.1.436.3364.pdf10.1.1.436.3364.pdf
10.1.1.436.3364.pdf
 
Business ethics ppt
Business ethics pptBusiness ethics ppt
Business ethics ppt
 
Cyber Security for the Small Business Experience
Cyber Security for the Small Business ExperienceCyber Security for the Small Business Experience
Cyber Security for the Small Business Experience
 
Anatomy of a cyber attack
Anatomy of a cyber attackAnatomy of a cyber attack
Anatomy of a cyber attack
 
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection SystemIRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
IRJET- Preventing of Key-Recovery Attacks on Keyed Intrusion Detection System
 
f6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdff6_cyber_security_and_your_agency.pdf
f6_cyber_security_and_your_agency.pdf
 
ZSAH Security - Web
ZSAH Security - WebZSAH Security - Web
ZSAH Security - Web
 
digital marketing
digital marketingdigital marketing
digital marketing
 
12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)12-19-14 CLE for South (P Garrett)
12-19-14 CLE for South (P Garrett)
 

More from anushafashions

we can predict that benzene(C6H6) will exhibit the highest enthalpy .pdf
we can predict that benzene(C6H6) will exhibit the highest enthalpy .pdfwe can predict that benzene(C6H6) will exhibit the highest enthalpy .pdf
we can predict that benzene(C6H6) will exhibit the highest enthalpy .pdf
anushafashions
 
The modulus of elasticity of a material (E) is given byE = Axial S.pdf
The modulus of elasticity of a material (E) is given byE = Axial S.pdfThe modulus of elasticity of a material (E) is given byE = Axial S.pdf
The modulus of elasticity of a material (E) is given byE = Axial S.pdf
anushafashions
 
Solution.cpp#include iostreamheader file for input output func.pdf
Solution.cpp#include iostreamheader file for input output func.pdfSolution.cpp#include iostreamheader file for input output func.pdf
Solution.cpp#include iostreamheader file for input output func.pdf
anushafashions
 
Insufficient dataSolutionInsufficient data.pdf
Insufficient dataSolutionInsufficient data.pdfInsufficient dataSolutionInsufficient data.pdf
Insufficient dataSolutionInsufficient data.pdf
anushafashions
 
Q5Although this question asks about SN1 reactivity, knowledge of a.pdf
Q5Although this question asks about SN1 reactivity, knowledge of a.pdfQ5Although this question asks about SN1 reactivity, knowledge of a.pdf
Q5Although this question asks about SN1 reactivity, knowledge of a.pdf
anushafashions
 
Portal Triad is an area in the liver named after its triangular shap.pdf
Portal Triad is an area in the liver named after its triangular shap.pdfPortal Triad is an area in the liver named after its triangular shap.pdf
Portal Triad is an area in the liver named after its triangular shap.pdf
anushafashions
 
Please find the answers and explanations belowPart 1The sequen.pdf
Please find the answers and explanations belowPart 1The sequen.pdfPlease find the answers and explanations belowPart 1The sequen.pdf
Please find the answers and explanations belowPart 1The sequen.pdf
anushafashions
 
NRSolutionNR.pdf
NRSolutionNR.pdfNRSolutionNR.pdf
NRSolutionNR.pdf
anushafashions
 
Manganese Manganese is a pinkinsh-gray, chemically active elemen.pdf
Manganese Manganese is a pinkinsh-gray, chemically active elemen.pdfManganese Manganese is a pinkinsh-gray, chemically active elemen.pdf
Manganese Manganese is a pinkinsh-gray, chemically active elemen.pdf
anushafashions
 
import java.util.ArrayList; import java.util.Iterator; A.pdf
import java.util.ArrayList; import java.util.Iterator;   A.pdfimport java.util.ArrayList; import java.util.Iterator;   A.pdf
import java.util.ArrayList; import java.util.Iterator; A.pdf
anushafashions
 
Humans first evovled in the African continent. Various sub species a.pdf
Humans first evovled in the African continent. Various sub species a.pdfHumans first evovled in the African continent. Various sub species a.pdf
Humans first evovled in the African continent. Various sub species a.pdf
anushafashions
 
FunctionFunctions in SQL SERVER are reusable. They can accept inpu.pdf
FunctionFunctions in SQL SERVER are reusable. They can accept inpu.pdfFunctionFunctions in SQL SERVER are reusable. They can accept inpu.pdf
FunctionFunctions in SQL SERVER are reusable. They can accept inpu.pdf
anushafashions
 
Financial Crisis is a situation which leads to complete turmoil in a.pdf
Financial Crisis is a situation which leads to complete turmoil in a.pdfFinancial Crisis is a situation which leads to complete turmoil in a.pdf
Financial Crisis is a situation which leads to complete turmoil in a.pdf
anushafashions
 
false (in linear region)Solutionfalse (in linear region).pdf
false (in linear region)Solutionfalse (in linear region).pdffalse (in linear region)Solutionfalse (in linear region).pdf
false (in linear region)Solutionfalse (in linear region).pdf
anushafashions
 
most of hydroxide salts (inorganic salts ) are in.pdf
                     most of hydroxide salts (inorganic salts ) are in.pdf                     most of hydroxide salts (inorganic salts ) are in.pdf
most of hydroxide salts (inorganic salts ) are in.pdf
anushafashions
 
CDKs (Cyclin-dependent Phosphokinases) are enzymes that play an impo.pdf
CDKs (Cyclin-dependent Phosphokinases) are enzymes that play an impo.pdfCDKs (Cyclin-dependent Phosphokinases) are enzymes that play an impo.pdf
CDKs (Cyclin-dependent Phosphokinases) are enzymes that play an impo.pdf
anushafashions
 
Benefit cost ratio = Incremental cash inflows InvestmentIncremen.pdf
Benefit cost ratio = Incremental cash inflows  InvestmentIncremen.pdfBenefit cost ratio = Incremental cash inflows  InvestmentIncremen.pdf
Benefit cost ratio = Incremental cash inflows InvestmentIncremen.pdf
anushafashions
 
Li2S Sol.pdf
                     Li2S                                      Sol.pdf                     Li2S                                      Sol.pdf
Li2S Sol.pdf
anushafashions
 
A. Packets addressed to a unicast address are delivered to a single .pdf
A. Packets addressed to a unicast address are delivered to a single .pdfA. Packets addressed to a unicast address are delivered to a single .pdf
A. Packets addressed to a unicast address are delivered to a single .pdf
anushafashions
 
In Niemann-Pick disease, the deficiency of a spec.pdf
                     In Niemann-Pick disease, the deficiency of a spec.pdf                     In Niemann-Pick disease, the deficiency of a spec.pdf
In Niemann-Pick disease, the deficiency of a spec.pdf
anushafashions
 

More from anushafashions (20)

we can predict that benzene(C6H6) will exhibit the highest enthalpy .pdf
we can predict that benzene(C6H6) will exhibit the highest enthalpy .pdfwe can predict that benzene(C6H6) will exhibit the highest enthalpy .pdf
we can predict that benzene(C6H6) will exhibit the highest enthalpy .pdf
 
The modulus of elasticity of a material (E) is given byE = Axial S.pdf
The modulus of elasticity of a material (E) is given byE = Axial S.pdfThe modulus of elasticity of a material (E) is given byE = Axial S.pdf
The modulus of elasticity of a material (E) is given byE = Axial S.pdf
 
Solution.cpp#include iostreamheader file for input output func.pdf
Solution.cpp#include iostreamheader file for input output func.pdfSolution.cpp#include iostreamheader file for input output func.pdf
Solution.cpp#include iostreamheader file for input output func.pdf
 
Insufficient dataSolutionInsufficient data.pdf
Insufficient dataSolutionInsufficient data.pdfInsufficient dataSolutionInsufficient data.pdf
Insufficient dataSolutionInsufficient data.pdf
 
Q5Although this question asks about SN1 reactivity, knowledge of a.pdf
Q5Although this question asks about SN1 reactivity, knowledge of a.pdfQ5Although this question asks about SN1 reactivity, knowledge of a.pdf
Q5Although this question asks about SN1 reactivity, knowledge of a.pdf
 
Portal Triad is an area in the liver named after its triangular shap.pdf
Portal Triad is an area in the liver named after its triangular shap.pdfPortal Triad is an area in the liver named after its triangular shap.pdf
Portal Triad is an area in the liver named after its triangular shap.pdf
 
Please find the answers and explanations belowPart 1The sequen.pdf
Please find the answers and explanations belowPart 1The sequen.pdfPlease find the answers and explanations belowPart 1The sequen.pdf
Please find the answers and explanations belowPart 1The sequen.pdf
 
NRSolutionNR.pdf
NRSolutionNR.pdfNRSolutionNR.pdf
NRSolutionNR.pdf
 
Manganese Manganese is a pinkinsh-gray, chemically active elemen.pdf
Manganese Manganese is a pinkinsh-gray, chemically active elemen.pdfManganese Manganese is a pinkinsh-gray, chemically active elemen.pdf
Manganese Manganese is a pinkinsh-gray, chemically active elemen.pdf
 
import java.util.ArrayList; import java.util.Iterator; A.pdf
import java.util.ArrayList; import java.util.Iterator;   A.pdfimport java.util.ArrayList; import java.util.Iterator;   A.pdf
import java.util.ArrayList; import java.util.Iterator; A.pdf
 
Humans first evovled in the African continent. Various sub species a.pdf
Humans first evovled in the African continent. Various sub species a.pdfHumans first evovled in the African continent. Various sub species a.pdf
Humans first evovled in the African continent. Various sub species a.pdf
 
FunctionFunctions in SQL SERVER are reusable. They can accept inpu.pdf
FunctionFunctions in SQL SERVER are reusable. They can accept inpu.pdfFunctionFunctions in SQL SERVER are reusable. They can accept inpu.pdf
FunctionFunctions in SQL SERVER are reusable. They can accept inpu.pdf
 
Financial Crisis is a situation which leads to complete turmoil in a.pdf
Financial Crisis is a situation which leads to complete turmoil in a.pdfFinancial Crisis is a situation which leads to complete turmoil in a.pdf
Financial Crisis is a situation which leads to complete turmoil in a.pdf
 
false (in linear region)Solutionfalse (in linear region).pdf
false (in linear region)Solutionfalse (in linear region).pdffalse (in linear region)Solutionfalse (in linear region).pdf
false (in linear region)Solutionfalse (in linear region).pdf
 
most of hydroxide salts (inorganic salts ) are in.pdf
                     most of hydroxide salts (inorganic salts ) are in.pdf                     most of hydroxide salts (inorganic salts ) are in.pdf
most of hydroxide salts (inorganic salts ) are in.pdf
 
CDKs (Cyclin-dependent Phosphokinases) are enzymes that play an impo.pdf
CDKs (Cyclin-dependent Phosphokinases) are enzymes that play an impo.pdfCDKs (Cyclin-dependent Phosphokinases) are enzymes that play an impo.pdf
CDKs (Cyclin-dependent Phosphokinases) are enzymes that play an impo.pdf
 
Benefit cost ratio = Incremental cash inflows InvestmentIncremen.pdf
Benefit cost ratio = Incremental cash inflows  InvestmentIncremen.pdfBenefit cost ratio = Incremental cash inflows  InvestmentIncremen.pdf
Benefit cost ratio = Incremental cash inflows InvestmentIncremen.pdf
 
Li2S Sol.pdf
                     Li2S                                      Sol.pdf                     Li2S                                      Sol.pdf
Li2S Sol.pdf
 
A. Packets addressed to a unicast address are delivered to a single .pdf
A. Packets addressed to a unicast address are delivered to a single .pdfA. Packets addressed to a unicast address are delivered to a single .pdf
A. Packets addressed to a unicast address are delivered to a single .pdf
 
In Niemann-Pick disease, the deficiency of a spec.pdf
                     In Niemann-Pick disease, the deficiency of a spec.pdf                     In Niemann-Pick disease, the deficiency of a spec.pdf
In Niemann-Pick disease, the deficiency of a spec.pdf
 

Recently uploaded

Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
JezreelCabil2
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
AyyanKhan40
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
chanes7
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
chanes7
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Akanksha trivedi rama nursing college kanpur.
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
NelTorrente
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
deeptiverma2406
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
Krisztián Száraz
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
ArianaBusciglio
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
SACHIN R KONDAGURI
 

Recently uploaded (20)

Landownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptxLandownership in the Philippines under the Americans-2-pptx.pptx
Landownership in the Philippines under the Americans-2-pptx.pptx
 
PIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf IslamabadPIMS Job Advertisement 2024.pdf Islamabad
PIMS Job Advertisement 2024.pdf Islamabad
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
Digital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments UnitDigital Artifact 1 - 10VCD Environments Unit
Digital Artifact 1 - 10VCD Environments Unit
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Digital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion DesignsDigital Artifact 2 - Investigating Pavilion Designs
Digital Artifact 2 - Investigating Pavilion Designs
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama UniversityNatural birth techniques - Mrs.Akanksha Trivedi Rama University
Natural birth techniques - Mrs.Akanksha Trivedi Rama University
 
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
Best Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDABest Digital Marketing Institute In NOIDA
Best Digital Marketing Institute In NOIDA
 
Advantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO PerspectiveAdvantages and Disadvantages of CMS from an SEO Perspective
Advantages and Disadvantages of CMS from an SEO Perspective
 
Assignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docxAssignment_4_ArianaBusciglio Marvel(1).docx
Assignment_4_ArianaBusciglio Marvel(1).docx
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
"Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe..."Protectable subject matters, Protection in biotechnology, Protection of othe...
"Protectable subject matters, Protection in biotechnology, Protection of othe...
 

a) In terms of software risk,an event is any situation or happening .pdf

  • 1. a) In terms of software risk,an event is any situation or happening or real/virtual object that causes risk which is an expectation of loss or a potential problem that may or may not occur in the future. a threat according to information security is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm. So,when a threat is in action it becomes an event .( security breach event). b)Risk management is the process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives, and deciding what countermeasures, if any, to take in reducing risk to an acceptable level, based on the value of the information resource to the organization. Here the information resources are called the assets. According to Information security,an asset is any data, device, or other component of the environment that supports information-related activities. Assets generally include hardware, software and confidential information.Assets should be protected from illicit access, use, disclosure, alteration, destruction, and/or theft, resulting in loss to the organization. The goal of information security is to ensure the confidentiality, integrity and availability of assets from various threats. For example, a hacker might attack a system in order to steal credit card numbers by exploiting a vulnerability. If the assests are under risk ,the organization may be driven towards losses in terms of its business objective ( say information of customers , information regarding customer money and transactions which affects customer loyalty , damage to infrastructure whether software or hardware etc).So an asset is not only monetary. We can broadly classify assets in the following categories: 1. Information assets Every piece of information about your organization falls in this category. This information has been collected, classified, organized and stored in various forms. Example : Databases: Information about your customers, personnel, production, sales, marketing, finances. This information is critical for your business. It's confidentiality, integrity and availability is of utmost importance. Data files: Transactional data giving up-to-date information about each event. Operational and support procedures: These have been developed over the years and provide detailed instructions on how to perform various activities. Archived information: Old information that may be required to be maintained by law. Continuity plans, fallback arrangements: These would be developed to overcome any disaster and maintain the continuity of business. Absence of these will lead to ad-hoc decisions in a
  • 2. crisis. 2. Software assets These can be divided into two categories: a) Application software: Application software implements business rules of the organization. Creation of application software is a time consuming task. Integrity of application software is very important. Any flaw in the application software could impact the business adversely. Example : Third party antivirus software b) System software: An organization would invest in various packaged software programs like operating systems, DBMS, development tools and utilities, software packages, office productivity suites etc. Most of the software under this category would be available off the shelf, unless the software is obsolete or non-standard. 3. Physical assets These are the visible and tangible equipment like: a) Computer equipment: Mainframe computers, servers, desktops and notebook computers. b) Communication equipment: Modems, routers, EPABXs and fax machines. c) Storage media: Magnetic tapes, disks, CDs and DATs. d) Technical equipment: Power supplies, air conditioners. e) Furniture and fixtures 4. Services a) Computing services that the organization has outsourced. b) Communication services like voice communication, data communication, value added services, wide area network etc. c) Environmental conditioning services like heating, lighting, air conditioning and power. Solution a) In terms of software risk,an event is any situation or happening or real/virtual object that causes risk which is an expectation of loss or a potential problem that may or may not occur in the future. a threat according to information security is a possible danger that might exploit a vulnerability to breach security and therefore cause possible harm. So,when a threat is in action it becomes an event .( security breach event). b)Risk management is the process of identifying vulnerabilities and threats to the information resources used by an organization in achieving business objectives, and deciding what countermeasures, if any, to take in reducing risk to an acceptable level, based on the value of the
  • 3. information resource to the organization. Here the information resources are called the assets. According to Information security,an asset is any data, device, or other component of the environment that supports information-related activities. Assets generally include hardware, software and confidential information.Assets should be protected from illicit access, use, disclosure, alteration, destruction, and/or theft, resulting in loss to the organization. The goal of information security is to ensure the confidentiality, integrity and availability of assets from various threats. For example, a hacker might attack a system in order to steal credit card numbers by exploiting a vulnerability. If the assests are under risk ,the organization may be driven towards losses in terms of its business objective ( say information of customers , information regarding customer money and transactions which affects customer loyalty , damage to infrastructure whether software or hardware etc).So an asset is not only monetary. We can broadly classify assets in the following categories: 1. Information assets Every piece of information about your organization falls in this category. This information has been collected, classified, organized and stored in various forms. Example : Databases: Information about your customers, personnel, production, sales, marketing, finances. This information is critical for your business. It's confidentiality, integrity and availability is of utmost importance. Data files: Transactional data giving up-to-date information about each event. Operational and support procedures: These have been developed over the years and provide detailed instructions on how to perform various activities. Archived information: Old information that may be required to be maintained by law. Continuity plans, fallback arrangements: These would be developed to overcome any disaster and maintain the continuity of business. Absence of these will lead to ad-hoc decisions in a crisis. 2. Software assets These can be divided into two categories: a) Application software: Application software implements business rules of the organization. Creation of application software is a time consuming task. Integrity of application software is very important. Any flaw in the application software could impact the business adversely. Example : Third party antivirus software b) System software: An organization would invest in various packaged software programs like operating systems, DBMS, development tools and utilities, software packages, office productivity suites etc.
  • 4. Most of the software under this category would be available off the shelf, unless the software is obsolete or non-standard. 3. Physical assets These are the visible and tangible equipment like: a) Computer equipment: Mainframe computers, servers, desktops and notebook computers. b) Communication equipment: Modems, routers, EPABXs and fax machines. c) Storage media: Magnetic tapes, disks, CDs and DATs. d) Technical equipment: Power supplies, air conditioners. e) Furniture and fixtures 4. Services a) Computing services that the organization has outsourced. b) Communication services like voice communication, data communication, value added services, wide area network etc. c) Environmental conditioning services like heating, lighting, air conditioning and power.