HOME LAB : HANDS-ON
- Get link
- X
- Other Apps
- Get link
- X
- Other Apps
means foreseeing the outcomes and trying to see what possible failures or roadblocks can happen in preventing the desired result or action or outcome.
Best Example:
TABLE 1: RISK REGISTER : SAMPLE
#S. NO |
RISK DETAILS |
OWNERSHIP |
IMPACT |
PROBABILITY |
RISK LEVEL |
MITIGATION PLAN |
CONTINGENCY |
STATUS |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
SAMPLE |
|
|
|
|
|
|
|
|
|
|
|
|
|
TABLE
2 : RISK SCORE
IMPACT |
|||||
PROBABILITY |
0.1 |
0.3 |
0.5 |
0.7 |
0.9 |
< 30% |
LOW |
LOW |
LOW |
MEDIUM |
MEDIUM |
>= 30% to < 50% |
LOW |
MEDIUM |
MEDIUM |
HIGH |
HIGH |
>= 50% to < 70% |
LOW |
MEDIUM |
HIGH |
HIGH |
HIGH |
>= 70% to <90% |
MEDIUM |
HIGH |
HIGH |
HIGH |
HIGH |
>= 90% |
MEDIUM |
HIGH |
HIGH |
HIGH |
HIGH |
TABLE 3: RISK REGISTER
Risk |
Risk Description | Probability Score | Severity Impact | Mitigation |
Documentation File loss/ corruption |
Project word documents lost or unable to recover |
0.1 |
High |
NTU OneDrive Backup is used |
Virtual Machine Configuration |
VM can be corrupted during the progress of then testing
attacks. |
0.3 |
Medium |
Reconfiguration of VM will be done |
Restricted Network Access |
NTU restricted network access |
0.5 |
Medium |
Alternative Connectivity will be used such mobile hotspot |
Malware infection |
Taking live sample Malware/ Ransomware for simulation in
Virtual machines could infect the host machine and network
connected |
0.9 |
High |
Simulation carried out in sandbox/ isolated network |
How to Collect, Manage, process personal data
GDPR requires parental concerns before collecting children's data who are less than 16 or 13.
Companies time to respond for a data breach and 72 Hrs to communicate with the EU regarding the breach.
Do I need all of the data I am Collecting here?
Could o do this work without using personal data at all.
Am I using the data in a way a user may not expect?
Do I have a plan to delete this data once I no longer need it?
DSRs - Data Subject rights :
6 GDPR DSRs
Methods to prove lawfulness of Processing:
GDPR Controllers and Processors
Controllers: are at risk of incurring high fines if they do not meet the obligations set forth in the GDPR
Comments
Post a Comment