Access over 35 million academic & study documents

Book Summary

Content type
User Generated
Subject
Computer Science
Type
Homework
Rating
Showing Page:
1/33

Sign up to view the full document!

lock_open Sign Up
Showing Page:
2/33

Sign up to view the full document!

lock_open Sign Up
Showing Page:
3/33

Sign up to view the full document!

lock_open Sign Up
End of Preview - Want to read all 33 pages?
Access Now
Unformatted Attachment Preview
Surname 1 Name Course Professor January 26, 2019 Financial Cybersecurity Risk Management: A summary Chapter 1 What Are We Afraid of? Various cybersecurity risks exist in various industries on which our everyday lives depend on such as architecture in technology, personnel, and process domains. Our sensitive information together with important systems are at risk. Management of cybersecurity risks can be challenging. Understanding the threat environment Over the years, the complexity of cybersecurity attacks has heightened. It is important to understand the level of threat in order to manage and prevent them effectively. It is important that the criticality of the threat situation is shared with the leaders in the business to ensure that cybersecurity is given a priority in terms of budget allocation. Overview of risk landscape Cyber threats are identified as one of the operational risks of any financial institution. This means it can potentially cause failures or influence results of the organization’s normal performance. Operational risks in the financial industry is greater where technology is involved. Surname 2 Understanding the adversary Very little evidence and information exists concerning the cyber threats that have been experienced before. The officials that deal with them do not avail much of this information to the public. Cyber threats can be caused either intentionally, by hackers, or intentionally, without knowledge by lack of competence. The following can b ...
Purchase document to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Anonymous
Excellent resource! Really helped me get the gist of things.

Studypool
4.7
Indeed
4.5
Sitejabber
4.4