SIM QB TT1 Ans Khan??
SIM QB TT1 Ans Khan??
documeh.
Ensueu he aceuuaoy
ndthoizd allasction.
t consstony of ata.paerting
Aighála.
COBIT Stuctie
’ Key Conmponentt n CoBI1:
OPuáncapki: Guwdes I oenance tooyh stalkeholder neds,
bostic
to 11 seutee delive
3l Enates: nclde pocemes, aganizotonal claes, 7 etreultuae
all enential for attoie 17 ovenanee.
na sal
(isbonaplati) t s(opiizig
Coe1 FrameWose
olighed wietn butnes goala.
4
cleud
() Data Bueachesi
Unatho'zed accs to seitie data.
Can tad ti data tegt, cinanial lon, t soputatina damage.
(2J Data ox& lue to grouide enou
Accidelal oe anten ienal lou f data kua
Alsactou.
Rlek c cxManod dala tos wethot prope backups.
Jhouats from omployas ox autnistooa
autnistalorn wiith aceu to
ctoud parn.
Potential fer data anipälon, thatt. or smue
"VuneaItiee in cloud siece APts.
"Can be exrlotad tor unauthoszad occes on data wonpltion
"Ctoud prouideiu may not mat eplatouy upiumgnta.
Bayal ' feinancal sutske Bus 'to nos- comliadee
compliaree with stan
tGj Shasad tchnoloy Valncabilties
" Risks foy thasu nfrantvctices b mlb'-tenanl emio
met.
Valnenabilities in shanef eomponenti Kon otteet mile
tentasta
Aceout tiackig
-Unauthoized arcos thvu stolen cdetale
Can lead to dota thet, unauthoi ze tronaclion,Qx sesut
duption:
31 Lack Contos
"lemit
linnite coiol oveL 6ecusety nyeasses
btbielty essn cotstint ecusi ti compad to' on
"
|l Datt Povaey oncoans
stoe acsox mallple fudictiene
"Lisues ieth data
Conmplanu t posváey'prdtaetons
Gomplicatonu wieth
(l DDos Attaclese
atacka thatoehl cloul
Ditibuta Denial nf Sesulee
senies.
Caunes snices
L Explasn siek amesnent techques atlnf is 1so soJo.
fny 150 uldelins o
5101° rulo "sgmatially k amesment technjquen
to help organi zoatiens dotib erabuat bks.
tHoee aco
sfandati
J Bainsfoxmeny: Gerunatte a ide anze of sid ideas iruh
group ditdh Encounapes cataie tedbacl from eopet'do
GI Delpli techiqu: lses anonymousconsenssus oh 9sld
teatine pounds dinys to acheue
-atuon anesyet.
das(o-thuat:
-Detnitioni dpoarlial <awes of an unatil incident that may
qewit in haum to a hystm or agonizalia,.
"Exawmplay Cylbonatacke tep maluad, phishiny), nalasal deanosu,
huyan eion.
Repausent an extonal oa oniznal souse potnil ham.
*Coplortof
Doinution:byd wealnes
a theat.
a
er ap in a ydtinle de7ersee that cadbe
Eranugles hpotchd softoae, weak
enty pent or
ecplód 4 caune Aomaye'
Risk!
Di7inilien:thi potinta! lox ox fmapken a that
lones fro a eybenatoch enploiting tieale pasuorte.
eplout
Examples Data baches due to weak
inpatelad oßtcae, finanial lons
yberattck eploitin. pansois
"vulnasl-tiea.
Role: Ropsumite the poetinl inapact -thuati exploitiy
Relation bitueen thnc, nailtiu guekc
"Thuat leveae lnnablies to cete' edshes. for antanea
eoploitin arofitgasa flas (nlat
a yberattacle "(thina) tAgt
- ita) con lead t data ee suem disrupn(susla).
Netuodee
Zaltenet
Sedurdanig
Eannay
Hisewale
tetaste tbs +Eucation
Cafamatien) Ycogle tktraant
Netwoea
itnet
Acces cnuhols
i avallable
netuoe eometen
oga£n accens to the netaadeone
an tieanet conneien
next layex.
poliei'