Isca for discussion chapter wise

Final 1906 views 36 replies

can anyone join me with ISCA now 

Replies (36)

yes i can join..

tell me which chapter we will discuss now

chap 5,6,2

let us start 5 today

ok...

 

In 5th Chapter in this way we do discussion

1. Definition of Risk, Threat, Exposure, Vulnerability

2. Threats to Computerised environment

3.Threats due to cyber crime

4.Risk Assessment

5. Risk management

6. Risk Management process

7. Risk management cycle

8.Techiniques of evaluation

9. Risk Ranking

10.Risk Mitigation and methods

Vulnerability=Weakness.

A lean man could be overpowered by strong (threat)

 

Objective of this Chap-To bring down risk to an Acceptable level...

 

how?

 

Risk Avoidance

Risk mitigation 

Risk transferring

Risk Acceptance

 

Think of an Organization

 

RA=Not doing the work

RM=Putting up an Antivirus Software for a network virus risk

RT=Insurance lelo

RA=take risk

 

A risk is the likelihood that an organization would face a vulnerability being exploited or a threat becoming harmful. Information systems can generate many direct and indirect risks. These risks lead to a gap between the need to protect systems and the degree of protection applied

 

Exposure if threat materialises ,the loss that organisation has to face

very nice explanation pl carry on further

Threats to Computerised environment

Power Failure= power fails,business stops,Exposure= loss of business,till restoration ,Goodwill. etc

 

Network Failure=Will again have impact on operations...

 

Disgruntled Employee=Dhokebaz employee

 

Errors=Wrong data validation Feature will give inappopriate Info system to orgnization there by messing up business decisions.

 

Malicous code= virus im network

Abuse of Access preveleges by employees=A data back up centre, software organization,having in and out access to bank operations,Employee of the Software company misusing the access powers,to make temporary transfer of funds from dormant account,which remained inoperative for many years.Fraud = threat.

 

Natura disaster

 

theft

 

Techonology failure

 

Fire.

 

 

The gap is caused by 

a. Widespread use of technology

b.interconnectivity of systems

c.Elimination of distance, time and space as constraints

d.unevenness of technological changes

e. Devolution of management and control

f. Attractiveness of conducting unconventional electronic attacks against organizations

Threats due to cyber Crime

 

1)Embezzlement=simple transfer of funds to personal account

2)Fraud=ATM misuse

3)Theft of proprietart info=misuse of electronic data copywrights( Sale of Camera print movie)

4)denial of Service=Got to see

5)Virus

6)other

What are the area's requires while doing risk assessment ?


CCI Pro

Leave a Reply

Your are not logged in . Please login to post replies

Click here to Login / Register