0% found this document useful (0 votes)
32 views

Presentation 1

The document outlines seven key sources of risk to personal data and systems: 1) Device theft or loss allows easy theft of personal data. 2) Weak or stolen credentials enable unauthorized access to data. 3) Internet spyware can allow unauthorized access and data transfer without knowledge via unverified links. 4) Vulnerable systems and applications cannot monitor or detect issues if not regularly monitored. 5) New systems are useless if employees do not know how to handle them. 6) Insufficient testing can cause serious issues if systems are not properly checked. 7) Insufficient risk management does not properly identify, analyze, and pay attention to risks.

Uploaded by

Pallabi Nag
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views

Presentation 1

The document outlines seven key sources of risk to personal data and systems: 1) Device theft or loss allows easy theft of personal data. 2) Weak or stolen credentials enable unauthorized access to data. 3) Internet spyware can allow unauthorized access and data transfer without knowledge via unverified links. 4) Vulnerable systems and applications cannot monitor or detect issues if not regularly monitored. 5) New systems are useless if employees do not know how to handle them. 6) Insufficient testing can cause serious issues if systems are not properly checked. 7) Insufficient risk management does not properly identify, analyze, and pay attention to risks.

Uploaded by

Pallabi Nag
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 1

THE SOURCHES OF RISK

1. Device theft or lost- Personal data can be easily stolen from those
devices.
2. Weak and stolen credentials- By this hackers can get access to the
unauthorized data.
3. Internet spyware- Clicking on a link without any verification might
cause major issues like unauthorized access to the system and transfer
of data without anyone’s knowledge.
4. Vulnerable systems and applications- If systems and applications are
not monitored on a regular, even if any issue occurs nobody will have
any idea about it.
5. Change in systems – the new systems are useless if employees do not
know how to handle them.
6. Insufficient testing – Not properly checking if the system is working or
not can cause serious issues.
7. Insufficient Risk management - identification and analysis of the risk is
a complex process which needs proper attention.

You might also like