Please enable JavaScript.
Coggle requires JavaScript to display documents.
Project, Assigning the tasks and details on how its gonna get done -…
Project
current scenario (everyone)
we dont update our anti virus regularly
nobody run internal/external network vulnerability scans
security policy hasnt been updated since 2 years ago
employee's computer don't have personal firewall software
weak protection for data in transit
data sensitivity not specified
can state some of the existing policies that we currently have and how we need to review them
risk analysis & management (qian ping)
Analyzing the impact of the threats
Evaluating the course of action
Identify threats
Risk Priority Number (RPN)
Risk Analysis table
Security Policies (Thahirah)
Policy 1: Access Control Policy
Policy 2: Encryption Policy
Policy 3: Vulnerability Management Policy
Policy 4: Data Retention Policy
Overview of proposed solution
Solution 1:
Solution 2:
Solution 3
Types of security & access control (rui wen)
Role Based Access Control (RBAC)
Industry Compliance (yy)
PCI-DSS
PDPA
IT Security Weaknesses (yy & nabook)
Strategy (prototype) (nabil & rui wen)
Assigning the tasks and details on how its gonna get done