Njx Flashcards
Slide 1:
Introduction
Interactive Session
Good Morning Everyone, I am Chris Xavier working with ATCI Local Security Support which is a part of information security management Team. We perform security audits for all projects under ATCI Delivery Centers.
I will be talking about Information Security and security practices of Accenture, This would be an interactive session, I request your active participation throughout the session.
Slide 3:
What is Information?
Information is that which gives a sense of understanding on something. Something that people can learn, know about.
For us Information is an asset and it is essential to an organization’s business.
Now Why do you think it needs Security?
Slide 3:
Information Security
Information Security is protection of information assets from wide range of threats ensuring Confidentiality, Integrity, and Availability.
Slide 3:
Core: Information Security Management System
Accenture has Information Security Management System at its Core created to define ways to identify and protect the company’s key information systems and data assets.
Slide 3:
Information Security Achieved?
Information Security is achieved by implementing a suitable set of controls, defining policies, processes, procedures, software and hardware controls.
Slide 4:
Aspects of Information Security
There are 3 Aspects of Information Security or the driving focus of information security?
Examples: UPI transactions,
Slide 4:
Confidentiality
Confidentiality is ensuring that information is not made available or disclosed to unauthorized individuals, entities or processes.
Slide 4:
Integrity
Protecting the accuracy of completeness of information/assets.
Slide 4:
Availability
Information or property of being accessible and usable as needed by an authorized entity.
Slide 4:
The idea is protecting data with management and technical controls from.
Unauthorized access, Unauthorized disclosure, Unauthorized modification, Destruction, Disruption
Slide 5:
Impact of Information Security Breaches
Financial Loss, Reputational Damage, Operational Downtime, Legal and Regulatory Actions, Loss of Sensitive Data.
Slide 5:
Example of Security Breach OKTA - Identity Management Services Provider Company called OKTA.
The Hackers have stolen an administrator credentials and have accessed to sensitive customer information on their Customer Support Platforms. The hackers tried to use those information to hack their clients.
Once this security breach got public, the company’s reputation got damaged, share prices fell down around 21%, lost market value of 2 Billion.
Here we can see for this company has faced Financial loss, Reputational damage, loss of sensitive information.
Slide 7:
Protect your Password
- Passwords Unique
- Never reuse passwords
- Never use Accenture credentials
- Do not write passwords
- Password Managers
a. Dashlane, Lastpass, Keeper - Use Passphrase
- Hello for Business
Slide 8:
Let’s Classify?
What data needs to be protected?
Different types of Data
Not every information/data needs to protected
Multiple times
1. Restricted
2. Highly Confidential
3. Confidential
4. Unrestricted
Question: Example of any classification?
Slide 9:
Let’s Use Permissions?
Classified information, tools to protect
1. Encrypt or Sensitivity Option
2. Levels of encryption
a. Do not forward
b. Internal use editable, read-only
3. Use of Permissions
a. Encrypts email, data file
b. Supports external sharing with permissions set
c. Control - read, forward, save, modify, print or copy etc.
d. Retains protection even after its downloaded.