Hello and welcome back The Sigh Berry, 2019 Cop Tia Certified Van Secreted Practitioners Certification papers. Of course,
this is Martin. I'm a one, and a title is risk management
here again. The objectives which encompasses this particular module, ranging from understanding security concepts, understanding, threats and vulnerabilities. Understanding, risk assessment risk Mansion. Then we have a key takeaway, which is titled Cyber Security Fundamentals. So without further ado, let's turn our attention to what Section one
we just titled Understanding Security Concepts
here again are the objectives which encompasses Section one
We're going to begin by First are discussing the state of infant security today.
Take a look at the sea. I try it,
discuss classified assets, Look at Qi standards and guidelines, discussed controls and kind of marriages, Goes and Physical Security and last Vassilis, which this least of which, in other words, events and incidents.
So without further ado, let's turn our ticket or a pre assessment question, and the question is as follows. Which of the following terms indicates that the information is to be read only by those people for whom is intended? Isn't a come to jelly be integrity,
see availability or D accounting.
If you said like a, you're absolutely correct because companies Sally is a concept. We do it frequently in real life. For instance,
we expect doctors to keep our medical records confidential, and we trust our friends and keep my secrets confidential.
The business world finds company galley as the characteristics of a resource that ensures access is restricted only to permit it uses applications or computer systems.
This brings us to the state of it. My security. Today, according to the 2019 global State of Embassy Security survey,
digitalization has increased every security spending. The number security instance. Detective continues to drop along with the average financial laws due to cyber security attacks. However, the financial loss per instance continued to climb
over the past year. Over this. Believe that top source they have noticed a security incident were current employees opposite? That's your biggest risk.
You have your former employees. Also, you have your unknown hackers.
So before we start securing your environment, you need to have a fundamental understanding of the standard concepts of security. So when you look at security, some of the things you have to consider what you're trying to protect,
why does it need to be protected? And what are you put tech minute from?
We look at the C I A triumph.
It's an important security concept because all security controls mechanisms safeguards are impotent to about one arm or off these protection types.
All your risk, your threats and vulnerabilities. Imagine, for the potential capacity to compromise one are all off what we call the C. I. A. Try at principal
this try as the basis for create a holistic security plan to protect all your organization critical and sensitive assets. When you look at infant security world, the sea, I represent something we ascribe to attain rather than the agency of the United States government.
It stands for company jolly integrity and available E. On the unified attributes off infamous security program.
So when you look a company galleon of the words come to jelly, basically is it prevents the disclose of data or information to unauthorized entity
and Terry ensure that the data is protected from unauthorized modification or data corruption
available means ensuring that the data is accessible, went and where it's needed.
So let's look at confidentiality.
If Mason needs to be disclosed to authorize and it is for business processes, for example, and authorized employees accessing from it's about the prototype under development on a server
company has purpose isn't company. Allie is to ensure that the information is not disclosed to unauthorized, and it is, for example, company jealous, often achieved by encryption.
Then we look at integrity.
If Misha has to be consistent and not onto a modified without established, approved policies or procedures and technique is to maintain the consistency of the embassy. Internally, it's well, f externally.
This is to prevent unauthorized modification by authorized energy, for example, and update to a database record is made with approval and techniques. Also to prevent unauthorized modification by authorized entities, for example, with malicious code is inserted in a Web application by an unethical hacker.
In this scenario, hacker has order words and authorized any may modify an application to extend its procedures.
make some kind of update in other words, that perhaps they are not authorized to do, particularly because we're looking at hackers.
Then we have availability availabilities to ensure that Information Associates service is available to authorize entities as and when required, for example, in an attack on a network do
the now serves attack. Sometimes an authorized update to an application may stop. Certain essential service is and will constitute what we call our breach and availability requirement. For example, inadvertently tipping over a server power cable make constitutes unavailability of breach. In other words,
so who implements the CIA trad
in this particular dog when we see the confidentiality integrity, as was availability?
First of all, we looked on the comedy Jolly. We see the user. We see the IittIe administrated and network administrator the human resources. So four. These are the ones who implement what we call the CIA trap
on integrity. Have the user's. We had the I T administrated and network administrator him resources as well as see Imagine. But then, when we look over to availability, we see the item minutes Crater, that network administrator, 1/3 party vendor or Internet service providers.
So when you look at classified assets when you're going through the price actually identifying again, obviously performing what we call a risk assessment one of the first thing or other words imploring risk management first thing you need to do is what to identify your assets once you identify your *** that you need to go through a process of what we call
systematically classifying your assets. Now an asset is
in any data device or any component of environment that supports your information related activities. An example of it also could be intangible
or could be intangible, for example,
and tiger means it's something that you cannot touch. It could be a corporate image or intellectual property such as a patent, and as that can be, hard. Where it could be software, it could be data. It could be processed products or infrastructure that that is a value to an organization and hence needs protection
the level protection based on the value asset to that particular business.
This brings us to risk pantry, as I mentioned earlier. Risk managers, in fact, forward looking.
So when you look at risk man, first of all, a risk is the probably off a loss.
You have a vulnerability, which again is a system weakness, and you have a threat, which you call potential harm. So risk is a lightening of the lost will occur losses Kerwin a threat, exposes of vulnerability, other words or weakness owners, they all sizes face risk
risk cannot be again cannot be eliminated. Risk Henry. Somehow. What altered?
Other risks are minor and can be a set that without another thought, companies use risk management techniques to identify and different. Eight severe gris from your minor risks.
We look at a threat. Is any circumstances event with the potential harm and invasive resource by exploring a vulnerability so again they could be categorized as natural. Other words come on the floor. It could be unintentional, Which again, being a file of water or loss of utility service is it Give the intentional, such as a bomb off I'll water and
You can also be intentional, mean non physical threats such as fraud,
hacking, identity theft as well as social engineering.
When you think about a risk, a risk is considered a Taliban. Certain risk is a possible of suffering. A loss is a potential future harm that my occur due to some present action.
Every organization has risks.
Now there are some bonus days. They have what would higher degree of what we call a risk appetite now risk appetite is a level risk it always a super PAC to accept in pursuit of his objectives and before action is deemed necessary to reduce the risk
that there are three types of meds you have probably, which is a major of like the hood.
Impact is a measure of the laws that Kirk, when that threat is realized, your risk exposing is it helps to imagine the magnitude of the wrist.
This brings us to the different types of risk. You have technical risk, which again includes problem with languages, project size, project functionality. You have management risk, which includes a lack of manager experience and lack of planning
We have also financial risks include cast blow capital and budget risk budget issues. In other words,
we have a project which was the effect of project schedule Resource. We also have product wrist, which effective product quality. Also a person nervous because personal pose the greatest risk in terms to our organization.
This brings us to review during this particular course of destruction, we highlighted the topic's off the state of every security. Today we took a look at the CIA track. We don't how to classify assets. Well, what exactly what asset is discussed? Keep standards and guidelines, controls and comma marriages goes in physical security and also events in incidents. So
look forward to seeing the very next video
and our upcoming top. You're gonna continue on discussion of Section One understanding security concepts.
Look for to see you in a very next video.