0% found this document useful (0 votes)
6 views9 pages

Unit 2 Ethical Hacking

hacking
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views9 pages

Unit 2 Ethical Hacking

hacking
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 9

THE BUSINESS

PERSPECTIVE
UNIT 2:-
ISHITA RAWAT
SACHIN KUMAR
ROHIT KUMAR
ROCKYPAL
MEENAKSHI NAUTIYAL
ETHICAL HACKING AIMS TO HELP BUSINESS
REDUCE RISK BY;

1.Finding security holes in their environment


2.Improving on detection security processes and procedures
3.Train security teams to think like a hacker
SECURITY POLICY:

• Security policies are important because they protect an organizations'


assets, both physical and digital.
• Security policies provide guidance on the conduct required to protect
assets.
• These policies help ensure the confidentiality, integrity and availability
known as the CIA triad of data.
TYPES OF SECURITY POLICIES

1.Organizational. These policies are a master blueprint of the entire


organization's security program.
2.System-specific. A system-specific policy covers security
procedures for an information system or network.
3.Issue-specific. These policies target certain aspects of the larger
organizational policy.
EXAMPLES OF ISSUE-RELATED SECURITY
POLICIES
• Access control policies say which employees can access which resources.
• Change management policies provide procedures for changing IT assets so
that adverse effects are minimized.
• Disaster recovery policies ensure business continuity after a service
disruption. These policies typically are enacted after the damage from an
incident has occurred.
• Incident response policies define procedures for responding to a security
breach or incident as it is happening.
PREVIOUS TEST RESULT:
• Previous test results are important for cybersecurity because they help organizations
identify and address vulnerabilities, and ensure that remediation efforts are
implemented:
• Identify vulnerabilities
• Cybersecurity testing helps organizations identify potential vulnerabilities,
misconfigurations, and other weaknesses in software, computers, or networks.
• Implement remediation
• Test results help organizations develop and implement strategies to reduce their
exposure to cyber risk.
• Verify remediation efforts
• Retesting helps organizations ensure that plans for remediation were implemented.
• Stay compliant
• Security testing helps organizations stay compliant with regulations and
standards.
• Protect sensitive data
• Security testing helps organizations protect sensitive data and intellectual
property from unauthorized access or misuse.
• Enhance user confidence
• Security testing helps organizations build trust with customers by demonstrating
that their data is secure.

You might also like