<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>B&#039;Cognizance &#187; I Wiz</title>
	<atom:link href="http://bcognizance.iiita.ac.in/archive/aug-nov14/?cat=7&#038;feed=rss2" rel="self" type="application/rss+xml" />
	<link>https://bcognizance.iiita.ac.in/archive/aug-nov14</link>
	<description></description>
	<lastBuildDate>Fri, 10 Apr 2015 04:56:11 +0000</lastBuildDate>
	<language>en</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	
		<item>
		<title>Protecting the enterprise with integrated Governance Risk &amp;Compliances (iGRC)</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=789</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=789#comments</comments>
		<pubDate>Fri, 14 Nov 2014 08:44:07 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[I Wiz]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=789</guid>
		<description><![CDATA[We are living in a complex and rapidly changing world in which there is a vast growth of opportunities and the innovations are broadly accepted and at the same time we are inviting risks and threats for the organisation. This causes a situation of dilemma of whether to increase the amount of data or not<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=789" title="Read Protecting the enterprise with integrated Governance Risk &#038;Compliances (iGRC)">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p>We are living in a complex and rapidly changing world in which there is a vast growth of opportunities and the innovations are broadly accepted and at the same time we are inviting risks and threats for the organisation. This causes a situation of dilemma of whether to increase the amount of data or not but with the global expansion of the firms the overshoot of the data is inevitable. To overcome this daunting risk it becomes salient to have compliance obligations which can provide well framed policies to be implemented. </p>
<p>A GRC approach is a well disciplined, organised and a structured way to co-ordinate the information and the activities of a firm.  It is very important to monitor the data on a regular basis which can be scheduled by GRC by enforcing certain rules and procedures. GRC merely involves the installation that harmonize the data in multiple departments including IT control self assessment and evaluation, IT asset repository, finance and auditing, Enterprise risk management, IT compliances as well as in the legal domain. The tools provided by GRC become increasingly important for the company to manage the risk. The Gartner’s approach to GRC have defined 6 cases and they are-</p>
<p><strong>IT risk management :</strong> It mainly consider the data security issues, the processes of data security and its implementation.</p>
<p><strong>Operational risk management :</strong> This area deals with the operational risk in the organisation, the capital allocation, time and expense management, predictive analytics all comes under this GRC vendor.</p>
<p><strong>Audit Management :</strong> The audit team maintains an audit cycle such as audit planning, audit risk management, audit repository, evidence management etc</p>
<p><strong>Vendor risk management :</strong> It uses the VRM tools for measuring the management and considers the third party related risk.</p>
<p><strong>Business continuity management :</strong> facilitating the services after any major disruption takes place. The protection of the data when any disaster happens is controlled by GRC tools.</p>
<p><strong>Corporate compliance and oversight :</strong> The corporate ethics, code of conduct, the governance codes and the standards and policies that affect the overall efficiency of the firm. </p>
<p>Despite of the well organised structure there are certain issues which act as a barrier in achieving the GRC goals and they are:<br />
1.	Lack of collaboration and the co-operation<br />
2.	Lack of clear leadership<br />
3.	The organisational changes which are not very easily acceptable at each level<br />
4.	Difficulty in hiring those people who are skilled in GRC implemented field only.<br />
5.	Inadequacy of that particular technology.<br />
6.	The imbalance created in the other departments.</p>
<p>The main stumbling block for GRC is that it can be applied to any specific domain or we can say to an individual area at a time which causes various other problems. This flaw is very well routed by Integrated Governance, Risk and Compliances (iGRC). There are basically four components of GRC and they are strategy, people, technology and processes. The subjects, components and the rules of GRC are merged to make an integrated GRC. The impact of iGRC can be seen when we understand the benefits it can have over other compliances. The benefits of Having IGRC are given below.</p>
<p><strong>Integrity of Critical controls :</strong> The critical infrastructure of the firms are required to be controlled at an early stage which can be substantially handled by iGRC software and tools.</p>
<p><strong>Management system with network security :</strong> The GRC technology is being configured with the network sensors and thus providing high security by recognising the threats at a significant level.  The data leakage and e-mail spamming can be easily detected if network security is being provided with GRC.</p>
<p><strong>Vulnerability detection :</strong> The main cause of risks are that the vulnerabilities in the system are not detected by the system makers themselves which causes a loophole in the system. </p>
<p><strong>Keeping the Users login data :</strong> The entries of the new users as well as the existing ones can be maintained which can easily detect the attackers. Maintaining the record of all the end points so that any new entity can be easily observed.  </p>
<p><strong>Firewalls and other network security essentials :</strong> Data entering and leaving the system is to be re-checked and recorded. It can provide with the network intrusion detection and preventions and the router management system.</p>
<p><strong>Elevated automation :</strong> The automation of control checks at each level, the change in threat levels and taking the measures to avoid it. </p>
<blockquote><p><strong><em>Archita Srivastava<br />
MBA-IT<br />
IIIT Allahabad<br />
</em></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=789</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
		<item>
		<title>Data Security In India</title>
		<link>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=737</link>
		<comments>https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=737#comments</comments>
		<pubDate>Fri, 14 Nov 2014 05:23:35 +0000</pubDate>
		<dc:creator>admin</dc:creator>
				<category><![CDATA[I Wiz]]></category>

		<guid isPermaLink="false">http://bcognizance.iiita.ac.in/archive/aug-nov14/?p=737</guid>
		<description><![CDATA[With the expansion of the IT Industry, the world has shrunk into a local microcosm where data privacy and security breaches have become norms. This vulnerability is a thing of concern when we talk about outsourcing of companies. If the confidential information lands up in wrong hands, the outcome could be disastrous. With the need<p class="readmore"> <a href="https://bcognizance.iiita.ac.in/archive/aug-nov14/?p=737" title="Read Data Security In India">  CONTINUE READING ...</a> </p>]]></description>
			<content:encoded><![CDATA[<p>With the expansion of the IT Industry, the world has shrunk into a local microcosm where data privacy and security breaches have become norms. This vulnerability is a thing of concern when we talk about outsourcing of companies. If the confidential information lands up in wrong hands, the outcome could be disastrous. With the need and the availability to use network at public places such as café or airports, more stringent data security compliance is needed.</p>
<p>The IT Act of 2000 has set in a framework for electronic transactions by creating provisions for checking crimes such as computer hacking. Fast Track Civil Courts and Appellate Tribunals are there to hear the disputes under the act. But a stricter measure is required to protect data and a more rigorous legal environment providing measure against data leaking and cyber crime is needed. </p>
<p>Previously, the original act called for penalty for damaging computer and computer systems under Section 43, but with the amendment compensation can be claimed for stealing computer source codes too. Clause 43A has made data protection more explicit. If a company uses a person’s data and sensitive personal data is leaked – the person can claim for damage. This forces the companies to protect data by maintaining and implementing reasonable security priorities. And if a Company fails to provide such a measure the Central Government will prescribe some practices and procedures in consultation with the professional bodies and association. </p>
<p>The amended Act of 2000 imposes imprisonment of three years and a fine of rupees five lakh for any person or intermediary who discloses the personal information of an individual or a firm without his consent. This to some extent ensures a smooth business flow against international borders. Also, the original act had been updated for crime specific subsections related to hacking and obscene material. Traffic data, logs and information is maintained by intermediaries for Cyber security with respect to guidelines provided by Central Government. This ensures availability of Cyber Forensic Data needed in the investigation and prosecution of cyber crimes. </p>
<p>The Government has updated and included new definitions for communication devices, cyber cafes, cyber security and electronic signatures and the Indian Computer Emergency Response Team (ICERT). Intermediaries too need to provide assistance to ICERT in doing its job. The nodal agency provides procedure for the same. The ICERT will perform all functions related to the Cyber Security: Service providers, intermediaries, companies, and others will have to provide information to the agency when required and in accordance with procedures that shall be prescribed by the Nodal Agency.</p>
<p>What is next needed are the Right Tools that are able to dynamically classify content and identify the scope of information in real time as much needs to be done in incorporating accountability of the data shared.</p>
<p><strong>Source:</strong> Whitepaper</p>
<blockquote><p><strong><em>Sonam Sharma<br />
MBA-IT<br />
IIIT Allahabad<br />
</em></strong></p></blockquote>
]]></content:encoded>
			<wfw:commentRss>https://bcognizance.iiita.ac.in/archive/aug-nov14/?feed=rss2&#038;p=737</wfw:commentRss>
		<slash:comments>0</slash:comments>
		</item>
	</channel>
</rss>
