際際滷shows by User: NIIConsulting / http://www.slideshare.net/images/logo.gif 際際滷shows by User: NIIConsulting / Thu, 18 Feb 2016 10:00:39 GMT 際際滷Share feed for 際際滷shows by User: NIIConsulting Vapt pci dss methodology ppt v1.0 /slideshow/vapt-pci-dss-methodology-ppt-v10/58413590 vaptpcidssmethodologypptv10-160218100039
Vapt pci dss methodology ppt v1.0]]>

Vapt pci dss methodology ppt v1.0]]>
Thu, 18 Feb 2016 10:00:39 GMT /slideshow/vapt-pci-dss-methodology-ppt-v10/58413590 NIIConsulting@slideshare.net(NIIConsulting) Vapt pci dss methodology ppt v1.0 NIIConsulting Vapt pci dss methodology ppt v1.0 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/vaptpcidssmethodologypptv10-160218100039-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Vapt pci dss methodology ppt v1.0
Vapt pci dss methodology ppt v1.0 from Network Intelligence India
]]>
5334 7 https://cdn.slidesharecdn.com/ss_thumbnails/vaptpcidssmethodologypptv10-160218100039-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
The Economics of Security /slideshow/the-economics-of-security-52322802/52322802 theeconomicsofsecurity-150902044534-lva1-app6891
Presentation given by K.K.Mookhey on "The Economics of Security" at Cyberoam.]]>

Presentation given by K.K.Mookhey on "The Economics of Security" at Cyberoam.]]>
Wed, 02 Sep 2015 04:45:34 GMT /slideshow/the-economics-of-security-52322802/52322802 NIIConsulting@slideshare.net(NIIConsulting) The Economics of Security NIIConsulting Presentation given by K.K.Mookhey on "The Economics of Security" at Cyberoam. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/theeconomicsofsecurity-150902044534-lva1-app6891-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Presentation given by K.K.Mookhey on &quot;The Economics of Security&quot; at Cyberoam.
The Economics of Security from Network Intelligence India
]]>
707 8 https://cdn.slidesharecdn.com/ss_thumbnails/theeconomicsofsecurity-150902044534-lva1-app6891-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web Application Security Strategy /slideshow/web-application-security-strategy-k-k-mookhey-rohit-salecha/25836986 webapplicationsecuritystrategy-k-130903014238-phpapp02
A presentation is given by K.K.Mookhey & Rohit Salecha at OWASP India 2013.]]>

A presentation is given by K.K.Mookhey & Rohit Salecha at OWASP India 2013.]]>
Tue, 03 Sep 2013 01:42:38 GMT /slideshow/web-application-security-strategy-k-k-mookhey-rohit-salecha/25836986 NIIConsulting@slideshare.net(NIIConsulting) Web Application Security Strategy NIIConsulting A presentation is given by K.K.Mookhey & Rohit Salecha at OWASP India 2013. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/webapplicationsecuritystrategy-k-130903014238-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A presentation is given by K.K.Mookhey &amp; Rohit Salecha at OWASP India 2013.
Web Application Security Strategy from Network Intelligence India
]]>
2586 4 https://cdn.slidesharecdn.com/ss_thumbnails/webapplicationsecuritystrategy-k-130903014238-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
ISO 27004- Information Security Metrics Implementation /slideshow/iso-27004-for-information-security-metrics/23938133 iso27004forinformationsecuritymetrics-130705051715-phpapp01
ISO 27004 provides guidance and describes a set of best practices for measuring the result of ISMS in an organization. The standard specifies how to set up a measurement program, what parameters to measure, when to measure, how to measure and helps organizations to decide on how to set performance targets and success criteria.]]>

ISO 27004 provides guidance and describes a set of best practices for measuring the result of ISMS in an organization. The standard specifies how to set up a measurement program, what parameters to measure, when to measure, how to measure and helps organizations to decide on how to set performance targets and success criteria.]]>
Fri, 05 Jul 2013 05:17:15 GMT /slideshow/iso-27004-for-information-security-metrics/23938133 NIIConsulting@slideshare.net(NIIConsulting) ISO 27004- Information Security Metrics Implementation NIIConsulting ISO 27004 provides guidance and describes a set of best practices for measuring the result of ISMS in an organization. The standard specifies how to set up a measurement program, what parameters to measure, when to measure, how to measure and helps organizations to decide on how to set performance targets and success criteria. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/iso27004forinformationsecuritymetrics-130705051715-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> ISO 27004 provides guidance and describes a set of best practices for measuring the result of ISMS in an organization. The standard specifies how to set up a measurement program, what parameters to measure, when to measure, how to measure and helps organizations to decide on how to set performance targets and success criteria.
ISO 27004- Information Security Metrics Implementation from Network Intelligence India
]]>
11015 2 https://cdn.slidesharecdn.com/ss_thumbnails/iso27004forinformationsecuritymetrics-130705051715-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
National Cyber Security Policy 2013 /NIIConsulting/national-cyber-security-policy-2013 nationalcybersecuritypolicy2013-130703010534-phpapp01
Indian government released National Cyber Security Policy 2013 on July 2, 2013]]>

Indian government released National Cyber Security Policy 2013 on July 2, 2013]]>
Wed, 03 Jul 2013 01:05:33 GMT /NIIConsulting/national-cyber-security-policy-2013 NIIConsulting@slideshare.net(NIIConsulting) National Cyber Security Policy 2013 NIIConsulting Indian government released National Cyber Security Policy 2013 on July 2, 2013 <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nationalcybersecuritypolicy2013-130703010534-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Indian government released National Cyber Security Policy 2013 on July 2, 2013
National Cyber Security Policy 2013 from Network Intelligence India
]]>
850 2 https://cdn.slidesharecdn.com/ss_thumbnails/nationalcybersecuritypolicy2013-130703010534-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
RBI Gopalakrishna Committee Report on IT /NIIConsulting/gopalakrishna-committee-report-summary-presentation gopalakrishnacommitteereport-summarypresentation-130701040313-phpapp02
The RBI constituted the Working Group on Information Security, Electronic Banking, Technology Risk Management and Cyber Frauds, which produced its report in January 2011. The Working Group was headed by Mr. G. Gopalakrishna and is popularly known as the Gopalakrishna Committee Report. The presentation below highlights some of the salient points, with special emphasis on Chapters 1 (IT Governance), 3 (IT Operations) and 4 (IT Outsourcing). The original report is available here http://rbidocs.rbi.org.in/rdocs/PublicationReport/Pdfs/WREB210111.pdf. Our analysis of this is available here http://www.niiconsulting.com/innovation/RBI%20Guidelines_Summary.pdf. NII provides advisory services to Banks to help them comply with the Guidelines in the Report.]]>

The RBI constituted the Working Group on Information Security, Electronic Banking, Technology Risk Management and Cyber Frauds, which produced its report in January 2011. The Working Group was headed by Mr. G. Gopalakrishna and is popularly known as the Gopalakrishna Committee Report. The presentation below highlights some of the salient points, with special emphasis on Chapters 1 (IT Governance), 3 (IT Operations) and 4 (IT Outsourcing). The original report is available here http://rbidocs.rbi.org.in/rdocs/PublicationReport/Pdfs/WREB210111.pdf. Our analysis of this is available here http://www.niiconsulting.com/innovation/RBI%20Guidelines_Summary.pdf. NII provides advisory services to Banks to help them comply with the Guidelines in the Report.]]>
Mon, 01 Jul 2013 04:03:13 GMT /NIIConsulting/gopalakrishna-committee-report-summary-presentation NIIConsulting@slideshare.net(NIIConsulting) RBI Gopalakrishna Committee Report on IT NIIConsulting The RBI constituted the Working Group on Information Security, Electronic Banking, Technology Risk Management and Cyber Frauds, which produced its report in January 2011. The Working Group was headed by Mr. G. Gopalakrishna and is popularly known as the Gopalakrishna Committee Report. The presentation below highlights some of the salient points, with special emphasis on Chapters 1 (IT Governance), 3 (IT Operations) and 4 (IT Outsourcing). The original report is available here http://rbidocs.rbi.org.in/rdocs/PublicationReport/Pdfs/WREB210111.pdf. Our analysis of this is available here http://www.niiconsulting.com/innovation/RBI%20Guidelines_Summary.pdf. NII provides advisory services to Banks to help them comply with the Guidelines in the Report. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/gopalakrishnacommitteereport-summarypresentation-130701040313-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The RBI constituted the Working Group on Information Security, Electronic Banking, Technology Risk Management and Cyber Frauds, which produced its report in January 2011. The Working Group was headed by Mr. G. Gopalakrishna and is popularly known as the Gopalakrishna Committee Report. The presentation below highlights some of the salient points, with special emphasis on Chapters 1 (IT Governance), 3 (IT Operations) and 4 (IT Outsourcing). The original report is available here http://rbidocs.rbi.org.in/rdocs/PublicationReport/Pdfs/WREB210111.pdf. Our analysis of this is available here http://www.niiconsulting.com/innovation/RBI%20Guidelines_Summary.pdf. NII provides advisory services to Banks to help them comply with the Guidelines in the Report.
RBI Gopalakrishna Committee Report on IT from Network Intelligence India
]]>
20289 8 https://cdn.slidesharecdn.com/ss_thumbnails/gopalakrishnacommitteereport-summarypresentation-130701040313-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
PCI DSS for Penetration Testing /slideshow/pci-dss-for-penetration-testing/18102874 pcidssforpentesting-130403040314-phpapp01
Understanding PCI DSS and PA DSS is crucial to the role of a penetration tester. Quoting the relevant PCI-DSS or PA-DSS control reference for your findings would help demonstrate the proper risk arising from common security findings such as support of older SSL versions, weak encryption when storing cardholder data, lack of proper logs from the application, and of course the entire gamut of web application security bugs.]]>

Understanding PCI DSS and PA DSS is crucial to the role of a penetration tester. Quoting the relevant PCI-DSS or PA-DSS control reference for your findings would help demonstrate the proper risk arising from common security findings such as support of older SSL versions, weak encryption when storing cardholder data, lack of proper logs from the application, and of course the entire gamut of web application security bugs.]]>
Wed, 03 Apr 2013 04:03:13 GMT /slideshow/pci-dss-for-penetration-testing/18102874 NIIConsulting@slideshare.net(NIIConsulting) PCI DSS for Penetration Testing NIIConsulting Understanding PCI DSS and PA DSS is crucial to the role of a penetration tester. Quoting the relevant PCI-DSS or PA-DSS control reference for your findings would help demonstrate the proper risk arising from common security findings such as support of older SSL versions, weak encryption when storing cardholder data, lack of proper logs from the application, and of course the entire gamut of web application security bugs. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/pcidssforpentesting-130403040314-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Understanding PCI DSS and PA DSS is crucial to the role of a penetration tester. Quoting the relevant PCI-DSS or PA-DSS control reference for your findings would help demonstrate the proper risk arising from common security findings such as support of older SSL versions, weak encryption when storing cardholder data, lack of proper logs from the application, and of course the entire gamut of web application security bugs.
PCI DSS for Penetration Testing from Network Intelligence India
]]>
2446 6 https://cdn.slidesharecdn.com/ss_thumbnails/pcidssforpentesting-130403040314-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Understanding Governance /slideshow/understanding-governance-by-manas-deep/17898848 understandinggovernancebymanasdeep-130330030815-phpapp02
NII Consulting Monthly Meet Talk on Understanding Governance by Manas Deep http://www.niiconsulting.com]]>

NII Consulting Monthly Meet Talk on Understanding Governance by Manas Deep http://www.niiconsulting.com]]>
Sat, 30 Mar 2013 03:08:15 GMT /slideshow/understanding-governance-by-manas-deep/17898848 NIIConsulting@slideshare.net(NIIConsulting) Understanding Governance NIIConsulting NII Consulting Monthly Meet Talk on Understanding Governance by Manas Deep http://www.niiconsulting.com <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/understandinggovernancebymanasdeep-130330030815-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> NII Consulting Monthly Meet Talk on Understanding Governance by Manas Deep http://www.niiconsulting.com
Understanding Governance from Network Intelligence India
]]>
979 6 https://cdn.slidesharecdn.com/ss_thumbnails/understandinggovernancebymanasdeep-130330030815-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber Security in Civil Aviation /NIIConsulting/cyber-security-in-civil-aviation-by-parag-desai cybersecurityincivilaviationbyparagdesai-130330030529-phpapp01
NII Consulting Monthly Meet Talk on Cyber Security in Civil Aviation by Parag Desai http://www.niiconsulting.com]]>

NII Consulting Monthly Meet Talk on Cyber Security in Civil Aviation by Parag Desai http://www.niiconsulting.com]]>
Sat, 30 Mar 2013 03:05:29 GMT /NIIConsulting/cyber-security-in-civil-aviation-by-parag-desai NIIConsulting@slideshare.net(NIIConsulting) Cyber Security in Civil Aviation NIIConsulting NII Consulting Monthly Meet Talk on Cyber Security in Civil Aviation by Parag Desai http://www.niiconsulting.com <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityincivilaviationbyparagdesai-130330030529-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> NII Consulting Monthly Meet Talk on Cyber Security in Civil Aviation by Parag Desai http://www.niiconsulting.com
Cyber Security in Civil Aviation from Network Intelligence India
]]>
6026 11 https://cdn.slidesharecdn.com/ss_thumbnails/cybersecurityincivilaviationbyparagdesai-130330030529-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Spear Phishing Methodology /slideshow/spear-phishing-methodology/17189477 spearphishingmethodology-130314021244-phpapp02
Spear phishing is an e-mail spoofing fraud attempt that targeting an organization to glean out confidential data and gain unauthorized access to organization's confidential data or internal network. Attacker may be motivated to carry confidential internal information to seek out financial gain, trade secrets or proprietary information. The emails sent to internal employees in spear phishing attempt appear to originate from a high ranking authoritative source positioned in the company. It is purposefully done so that very few people will question the intent regarding this request and readily provide the "supposed authority" with the requested details. ]]>

Spear phishing is an e-mail spoofing fraud attempt that targeting an organization to glean out confidential data and gain unauthorized access to organization's confidential data or internal network. Attacker may be motivated to carry confidential internal information to seek out financial gain, trade secrets or proprietary information. The emails sent to internal employees in spear phishing attempt appear to originate from a high ranking authoritative source positioned in the company. It is purposefully done so that very few people will question the intent regarding this request and readily provide the "supposed authority" with the requested details. ]]>
Thu, 14 Mar 2013 02:12:44 GMT /slideshow/spear-phishing-methodology/17189477 NIIConsulting@slideshare.net(NIIConsulting) Spear Phishing Methodology NIIConsulting Spear phishing is an e-mail spoofing fraud attempt that targeting an organization to glean out confidential data and gain unauthorized access to organization's confidential data or internal network. Attacker may be motivated to carry confidential internal information to seek out financial gain, trade secrets or proprietary information. The emails sent to internal employees in spear phishing attempt appear to originate from a high ranking authoritative source positioned in the company. It is purposefully done so that very few people will question the intent regarding this request and readily provide the "supposed authority" with the requested details. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/spearphishingmethodology-130314021244-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Spear phishing is an e-mail spoofing fraud attempt that targeting an organization to glean out confidential data and gain unauthorized access to organization&#39;s confidential data or internal network. Attacker may be motivated to carry confidential internal information to seek out financial gain, trade secrets or proprietary information. The emails sent to internal employees in spear phishing attempt appear to originate from a high ranking authoritative source positioned in the company. It is purposefully done so that very few people will question the intent regarding this request and readily provide the &quot;supposed authority&quot; with the requested details.
Spear Phishing Methodology from Network Intelligence India
]]>
1539 3 https://cdn.slidesharecdn.com/ss_thumbnails/spearphishingmethodology-130314021244-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Mobile Device Management (MDM) /slideshow/mobile-device-management-mdm/17189424 mobiledevicemanagementmdm-130314021036-phpapp01
The explosive growth in the popularity of mobile devices and growth in their powerful features has led to a sharp rise in the usage of smartphones, tablets and mobile POS devices in the corporate world. Apart from the mobility advantage, these devices have become more efficient to offer better business growth and increased networking advantage to bring better employee productivity at the workplace. As the market for these devices continues to develop at an exponential rate, concerns about the safety of the sensitive corporate data present on mobile device, in transit or at rest also grow proportionately as the tracking the data, relying on its integrity becomes increasingly challenging. Further enforcing corporate governance, complying with local laws and trans-border regulations also pose a serious challenge in this case. Hence a technical method to secure, monitor, manage and supports mobile devices deployed across mobile operators, service providers and enterprises is need of the hour which has led to the development of Mobile Device Management(MDM).]]>

The explosive growth in the popularity of mobile devices and growth in their powerful features has led to a sharp rise in the usage of smartphones, tablets and mobile POS devices in the corporate world. Apart from the mobility advantage, these devices have become more efficient to offer better business growth and increased networking advantage to bring better employee productivity at the workplace. As the market for these devices continues to develop at an exponential rate, concerns about the safety of the sensitive corporate data present on mobile device, in transit or at rest also grow proportionately as the tracking the data, relying on its integrity becomes increasingly challenging. Further enforcing corporate governance, complying with local laws and trans-border regulations also pose a serious challenge in this case. Hence a technical method to secure, monitor, manage and supports mobile devices deployed across mobile operators, service providers and enterprises is need of the hour which has led to the development of Mobile Device Management(MDM).]]>
Thu, 14 Mar 2013 02:10:36 GMT /slideshow/mobile-device-management-mdm/17189424 NIIConsulting@slideshare.net(NIIConsulting) Mobile Device Management (MDM) NIIConsulting The explosive growth in the popularity of mobile devices and growth in their powerful features has led to a sharp rise in the usage of smartphones, tablets and mobile POS devices in the corporate world. Apart from the mobility advantage, these devices have become more efficient to offer better business growth and increased networking advantage to bring better employee productivity at the workplace. As the market for these devices continues to develop at an exponential rate, concerns about the safety of the sensitive corporate data present on mobile device, in transit or at rest also grow proportionately as the tracking the data, relying on its integrity becomes increasingly challenging. Further enforcing corporate governance, complying with local laws and trans-border regulations also pose a serious challenge in this case. Hence a technical method to secure, monitor, manage and supports mobile devices deployed across mobile operators, service providers and enterprises is need of the hour which has led to the development of Mobile Device Management(MDM). <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/mobiledevicemanagementmdm-130314021036-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The explosive growth in the popularity of mobile devices and growth in their powerful features has led to a sharp rise in the usage of smartphones, tablets and mobile POS devices in the corporate world. Apart from the mobility advantage, these devices have become more efficient to offer better business growth and increased networking advantage to bring better employee productivity at the workplace. As the market for these devices continues to develop at an exponential rate, concerns about the safety of the sensitive corporate data present on mobile device, in transit or at rest also grow proportionately as the tracking the data, relying on its integrity becomes increasingly challenging. Further enforcing corporate governance, complying with local laws and trans-border regulations also pose a serious challenge in this case. Hence a technical method to secure, monitor, manage and supports mobile devices deployed across mobile operators, service providers and enterprises is need of the hour which has led to the development of Mobile Device Management(MDM).
Mobile Device Management (MDM) from Network Intelligence India
]]>
15929 9 https://cdn.slidesharecdn.com/ss_thumbnails/mobiledevicemanagementmdm-130314021036-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
IT Act 2000 Penalties, Offences with case studies /slideshow/it-act-2000-penalties-offences-with-case-studies/17189313 itact2000-penaltiesoffenceswithcasestudies-130314020750-phpapp02
What does IT Act 2000 legislation deals with? The Act essentially deals with the following issues: Legal Recognition of Electronic Documents, Legal Recognition of Digital Signatures, Offenses and Contraventions, Justice Dispensation Systems for cyber crimes.]]>

What does IT Act 2000 legislation deals with? The Act essentially deals with the following issues: Legal Recognition of Electronic Documents, Legal Recognition of Digital Signatures, Offenses and Contraventions, Justice Dispensation Systems for cyber crimes.]]>
Thu, 14 Mar 2013 02:07:49 GMT /slideshow/it-act-2000-penalties-offences-with-case-studies/17189313 NIIConsulting@slideshare.net(NIIConsulting) IT Act 2000 Penalties, Offences with case studies NIIConsulting What does IT Act 2000 legislation deals with? The Act essentially deals with the following issues: Legal Recognition of Electronic Documents, Legal Recognition of Digital Signatures, Offenses and Contraventions, Justice Dispensation Systems for cyber crimes. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/itact2000-penaltiesoffenceswithcasestudies-130314020750-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> What does IT Act 2000 legislation deals with? The Act essentially deals with the following issues: Legal Recognition of Electronic Documents, Legal Recognition of Digital Signatures, Offenses and Contraventions, Justice Dispensation Systems for cyber crimes.
IT Act 2000 Penalties, Offences with case studies from Network Intelligence India
]]>
67232 18 https://cdn.slidesharecdn.com/ss_thumbnails/itact2000-penaltiesoffenceswithcasestudies-130314020750-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Information Rights Management (IRM) /slideshow/information-rights-management-irm/17189194 informationrightsmanagementirm-130314020254-phpapp02
Information Rights Management is the set of techniques and methods which protect the highly sensitive information of the organization irrespective of the file location whether it resides "in" or "outside" the corporate boundaries. This happens as the permissions embedded inside the file don't allow unauthorized access, modification, copying or printing. This is typically done for protection of financial documents, intellectual property such as patents, design blueprints and executive communications. ]]>

Information Rights Management is the set of techniques and methods which protect the highly sensitive information of the organization irrespective of the file location whether it resides "in" or "outside" the corporate boundaries. This happens as the permissions embedded inside the file don't allow unauthorized access, modification, copying or printing. This is typically done for protection of financial documents, intellectual property such as patents, design blueprints and executive communications. ]]>
Thu, 14 Mar 2013 02:02:54 GMT /slideshow/information-rights-management-irm/17189194 NIIConsulting@slideshare.net(NIIConsulting) Information Rights Management (IRM) NIIConsulting Information Rights Management is the set of techniques and methods which protect the highly sensitive information of the organization irrespective of the file location whether it resides "in" or "outside" the corporate boundaries. This happens as the permissions embedded inside the file don't allow unauthorized access, modification, copying or printing. This is typically done for protection of financial documents, intellectual property such as patents, design blueprints and executive communications. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/informationrightsmanagementirm-130314020254-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Information Rights Management is the set of techniques and methods which protect the highly sensitive information of the organization irrespective of the file location whether it resides &quot;in&quot; or &quot;outside&quot; the corporate boundaries. This happens as the permissions embedded inside the file don&#39;t allow unauthorized access, modification, copying or printing. This is typically done for protection of financial documents, intellectual property such as patents, design blueprints and executive communications.
Information Rights Management (IRM) from Network Intelligence India
]]>
12749 8 https://cdn.slidesharecdn.com/ss_thumbnails/informationrightsmanagementirm-130314020254-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Distributed Denial of Service (DDos) Testing Methodology /slideshow/distributed-denial-of-service-ddos-testing-methodology/17189086 distributeddenialofserviceddostestingmethodology-130314015848-phpapp01
A Distributed Denial-of-Service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users by using multiple hosts attempting to connect simultaneously to the victim machine. It generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. Attackers typically target sites of high-profile web servers such as banks, credit card payment gateways, and even root name servers.]]>

A Distributed Denial-of-Service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users by using multiple hosts attempting to connect simultaneously to the victim machine. It generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. Attackers typically target sites of high-profile web servers such as banks, credit card payment gateways, and even root name servers.]]>
Thu, 14 Mar 2013 01:58:47 GMT /slideshow/distributed-denial-of-service-ddos-testing-methodology/17189086 NIIConsulting@slideshare.net(NIIConsulting) Distributed Denial of Service (DDos) Testing Methodology NIIConsulting A Distributed Denial-of-Service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users by using multiple hosts attempting to connect simultaneously to the victim machine. It generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. Attackers typically target sites of high-profile web servers such as banks, credit card payment gateways, and even root name servers. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/distributeddenialofserviceddostestingmethodology-130314015848-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> A Distributed Denial-of-Service attack (DDoS attack) is an attempt to make a machine or network resource unavailable to its intended users by using multiple hosts attempting to connect simultaneously to the victim machine. It generally consists of the efforts of one or more people to temporarily or indefinitely interrupt or suspend services of a host connected to the Internet. Attackers typically target sites of high-profile web servers such as banks, credit card payment gateways, and even root name servers.
Distributed Denial of Service (DDos) Testing Methodology from Network Intelligence India
]]>
3475 6 https://cdn.slidesharecdn.com/ss_thumbnails/distributeddenialofserviceddostestingmethodology-130314015848-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Data Leakage Prevention (DLP) /slideshow/data-leakage-prevention-dlp/17188953 dataleakageprevention-130314015358-phpapp01
Data Leakage is an important concern for the business organizations in this increasingly networked world these days. Unauthorized disclosure may have serious consequences for an organization in both long term and short term. Risks include losing clients and stakeholder confidence, tarnishing of brand image, landing in unwanted lawsuits, and overall losing goodwill and market share in the industry. ]]>

Data Leakage is an important concern for the business organizations in this increasingly networked world these days. Unauthorized disclosure may have serious consequences for an organization in both long term and short term. Risks include losing clients and stakeholder confidence, tarnishing of brand image, landing in unwanted lawsuits, and overall losing goodwill and market share in the industry. ]]>
Thu, 14 Mar 2013 01:53:58 GMT /slideshow/data-leakage-prevention-dlp/17188953 NIIConsulting@slideshare.net(NIIConsulting) Data Leakage Prevention (DLP) NIIConsulting Data Leakage is an important concern for the business organizations in this increasingly networked world these days. Unauthorized disclosure may have serious consequences for an organization in both long term and short term. Risks include losing clients and stakeholder confidence, tarnishing of brand image, landing in unwanted lawsuits, and overall losing goodwill and market share in the industry. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dataleakageprevention-130314015358-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Data Leakage is an important concern for the business organizations in this increasingly networked world these days. Unauthorized disclosure may have serious consequences for an organization in both long term and short term. Risks include losing clients and stakeholder confidence, tarnishing of brand image, landing in unwanted lawsuits, and overall losing goodwill and market share in the industry.
Data Leakage Prevention (DLP) from Network Intelligence India
]]>
14286 11 https://cdn.slidesharecdn.com/ss_thumbnails/dataleakageprevention-130314015358-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Advanced persistent threats(APT) /slideshow/advanced-persistent-threatsapt/17188805 advancedpersistentthreatsapt-130314014856-phpapp02
Advanced Persistent Threats (APTs) are a serious concern as they represent a threat to an organizations intellectual property, financial assets and reputation. In some cases, these threats target critical infrastructure and government institutions, thereby threatening the countrys national security itself. ]]>

Advanced Persistent Threats (APTs) are a serious concern as they represent a threat to an organizations intellectual property, financial assets and reputation. In some cases, these threats target critical infrastructure and government institutions, thereby threatening the countrys national security itself. ]]>
Thu, 14 Mar 2013 01:48:56 GMT /slideshow/advanced-persistent-threatsapt/17188805 NIIConsulting@slideshare.net(NIIConsulting) Advanced persistent threats(APT) NIIConsulting Advanced Persistent Threats (APTs) are a serious concern as they represent a threat to an organizations intellectual property, financial assets and reputation. In some cases, these threats target critical infrastructure and government institutions, thereby threatening the countrys national security itself. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/advancedpersistentthreatsapt-130314014856-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Advanced Persistent Threats (APTs) are a serious concern as they represent a threat to an organizations intellectual property, financial assets and reputation. In some cases, these threats target critical infrastructure and government institutions, thereby threatening the countrys national security itself.
Advanced persistent threats(APT) from Network Intelligence India
]]>
5384 6 https://cdn.slidesharecdn.com/ss_thumbnails/advancedpersistentthreatsapt-130314014856-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds document White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
XML Interfaces to the popular Nessus Scanner /slideshow/xml-interfaces-to-the-popular-nessus-scanner/12289448 xmlinterfacestothepopularnessusscanner-120405044804-phpapp02
The modern Nessus scanner comes with an XML-RPC interface to control the built-in scanner engine. We review available command-line tools and programming libraries to automate scanning of large networks. We will demonstrate some tools we have developed for this purpose.]]>

The modern Nessus scanner comes with an XML-RPC interface to control the built-in scanner engine. We review available command-line tools and programming libraries to automate scanning of large networks. We will demonstrate some tools we have developed for this purpose.]]>
Thu, 05 Apr 2012 04:48:01 GMT /slideshow/xml-interfaces-to-the-popular-nessus-scanner/12289448 NIIConsulting@slideshare.net(NIIConsulting) XML Interfaces to the popular Nessus Scanner NIIConsulting The modern Nessus scanner comes with an XML-RPC interface to control the built-in scanner engine. We review available command-line tools and programming libraries to automate scanning of large networks. We will demonstrate some tools we have developed for this purpose. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/xmlinterfacestothepopularnessusscanner-120405044804-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> The modern Nessus scanner comes with an XML-RPC interface to control the built-in scanner engine. We review available command-line tools and programming libraries to automate scanning of large networks. We will demonstrate some tools we have developed for this purpose.
XML Interfaces to the popular Nessus Scanner from Network Intelligence India
]]>
4053 4 https://cdn.slidesharecdn.com/ss_thumbnails/xmlinterfacestothepopularnessusscanner-120405044804-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Cyber fraud in banks /slideshow/cyber-fraud-in-banks-for-upload/9974128 cyberfraudinbanksforupload-111101050558-phpapp02
]]>

]]>
Tue, 01 Nov 2011 05:05:54 GMT /slideshow/cyber-fraud-in-banks-for-upload/9974128 NIIConsulting@slideshare.net(NIIConsulting) Cyber fraud in banks NIIConsulting <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/cyberfraudinbanksforupload-111101050558-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Cyber fraud in banks from Network Intelligence India
]]>
6971 4 https://cdn.slidesharecdn.com/ss_thumbnails/cyberfraudinbanksforupload-111101050558-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Advanced persistent threats /slideshow/advanced-persistent-threats/9972966 advancedpersistentthreats-111101034626-phpapp02
]]>

]]>
Tue, 01 Nov 2011 03:46:25 GMT /slideshow/advanced-persistent-threats/9972966 NIIConsulting@slideshare.net(NIIConsulting) Advanced persistent threats NIIConsulting <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/advancedpersistentthreats-111101034626-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Advanced persistent threats from Network Intelligence India
]]>
988 2 https://cdn.slidesharecdn.com/ss_thumbnails/advancedpersistentthreats-111101034626-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Who will guard the guards /slideshow/who-will-guard-the-guards/9972551 whowillguardtheguards-111101032758-phpapp02
]]>

]]>
Tue, 01 Nov 2011 03:27:54 GMT /slideshow/who-will-guard-the-guards/9972551 NIIConsulting@slideshare.net(NIIConsulting) Who will guard the guards NIIConsulting <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/whowillguardtheguards-111101032758-phpapp02-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Who will guard the guards from Network Intelligence India
]]>
980 5 https://cdn.slidesharecdn.com/ss_thumbnails/whowillguardtheguards-111101032758-phpapp02-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://cdn.slidesharecdn.com/profile-photo-NIIConsulting-48x48.jpg?cb=1522935024 Network Intelligence, incorporated in 2001, is a committed and well-recognized provider of services, solutions and products in the IT Governance, Risk Management, and Compliance space. Our professionals have made a mark for themselves with highly satisfied clients all across the globe supported by our offices in India and the Middle East. As an ISO 27001-certified company ourselves, we are strongly positioned to understand your needs and deliver the right answers to your security and compliance requirements. We have won accolades at numerous national and international forums and conferences. Our work truly speaks for itself and our clients are the strongest testimony to the quality of our s http://www.niiconsulting.com/ https://cdn.slidesharecdn.com/ss_thumbnails/vaptpcidssmethodologypptv10-160218100039-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/vapt-pci-dss-methodology-ppt-v10/58413590 Vapt pci dss methodolo... https://cdn.slidesharecdn.com/ss_thumbnails/theeconomicsofsecurity-150902044534-lva1-app6891-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/the-economics-of-security-52322802/52322802 The Economics of Security https://cdn.slidesharecdn.com/ss_thumbnails/webapplicationsecuritystrategy-k-130903014238-phpapp02-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/web-application-security-strategy-k-k-mookhey-rohit-salecha/25836986 Web Application Securi...