Posts

Showing posts from November, 2014

Threat Vs Vulnerability Vs Risk (In layman story)

 In Simple language  : we forgot take out the key from the Car  in public area is an Vulnerability and the  Threat here is where we put the car & key, is it in City area or in a Village ! ?, that is, how  much probability on potential to the vulnerability.  and finally , the Asset value is what kind car we using Ford or Ferrari  :). The term “vulnerability” refers to the security flaws (Weakness ) in a system that allow an attack to be successful. Threat is the frequency or probability of potentially adverse events.  Risk = Threat * Vulnerability * Asset Value  Come to Tech Scenario :Think we left server / laptop unlocked in home or office a vulnerability assessment is the process of identifying and quantifying vulnerabilities in an environment. It is an in-depth evaluation of your posture, indicating weaknesses as well as providing the appropriate mitigation procedures required to either eliminate those weakne...

‘Lazy’ in pet name called comfort!!

Image
Don’t be lazy to set minimum level of required security! Information Technology era shrinks the global economy into small virtual village with good and bad, as always two side of one coin, yes as usual olds were foresighted. Internet, Cloud and Big data are now great enabler for business and life. But some where we should keep the limit as it’s shouldn’t peak nose into our privacy and healthy life!!!  Each new technology brings human to more comfort than had and its make humans lazier and weaker. Anyway here I’m not focusing on life style and health impacts. As I’m fan of Wills Smith and his movie I, Robot, in the movie plot robot had the “three laws of robotics”   directives - to never harm a human or let a human come to harm, to always obey humans unless this violates the First Law, and to protect its own existence unless this violates the First or Second Laws. The reason I mentioned here human is important than any other. But our views are changing, Yes, we al...