0% found this document useful (0 votes)
5 views

unit 2 ethical hacking

hacking
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
5 views

unit 2 ethical hacking

hacking
Copyright
© © All Rights Reserved
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

THE BUSINESS

PERSPECTIVE
UNIT 2:-
ISHITA RAWAT
SACHIN KUMAR
ROHIT KUMAR
ROCKYPAL
MEENAKSHI NAUTIYAL
ETHICAL HACKING AIMS TO HELP BUSINESS
REDUCE RISK BY;

1.Finding security holes in their environment


2.Improving on detection security processes and procedures
3.Train security teams to think like a hacker
SECURITY POLICY:

• Security policies are important because they protect an organizations'


assets, both physical and digital.
• Security policies provide guidance on the conduct required to protect
assets.
• These policies help ensure the confidentiality, integrity and availability
known as the CIA triad of data.
TYPES OF SECURITY POLICIES

1.Organizational. These policies are a master blueprint of the entire


organization's security program.
2.System-specific. A system-specific policy covers security
procedures for an information system or network.
3.Issue-specific. These policies target certain aspects of the larger
organizational policy.
EXAMPLES OF ISSUE-RELATED SECURITY
POLICIES
• Access control policies say which employees can access which resources.
• Change management policies provide procedures for changing IT assets so
that adverse effects are minimized.
• Disaster recovery policies ensure business continuity after a service
disruption. These policies typically are enacted after the damage from an
incident has occurred.
• Incident response policies define procedures for responding to a security
breach or incident as it is happening.
PREVIOUS TEST RESULT:
• Previous test results are important for cybersecurity because they help organizations
identify and address vulnerabilities, and ensure that remediation efforts are
implemented:
• Identify vulnerabilities
• Cybersecurity testing helps organizations identify potential vulnerabilities,
misconfigurations, and other weaknesses in software, computers, or networks.
• Implement remediation
• Test results help organizations develop and implement strategies to reduce their
exposure to cyber risk.
• Verify remediation efforts
• Retesting helps organizations ensure that plans for remediation were implemented.
• Stay compliant
• Security testing helps organizations stay compliant with regulations and
standards.
• Protect sensitive data
• Security testing helps organizations protect sensitive data and intellectual
property from unauthorized access or misuse.
• Enhance user confidence
• Security testing helps organizations build trust with customers by demonstrating
that their data is secure.

You might also like