Risk assessment and risk treatment made easy! for ISO 27001 implementation in Hindi

  Рет қаралды 7,960

Luv Johar Free IT Training Videos

Luv Johar Free IT Training Videos

2 жыл бұрын

Risk assessment and risk treatment made easy! for ISO 27001 implementation in Hindi cyber security in Hindi, Cybersecurity Hindi, Hindi, Cyber Security Hindi Main, iso 27001, iso 27001 summary, iso 27001 exam questions and answers, iso 27001 controls explained,
iso 27001 lead auditor training videos, iso 27001 interview questions, iso 27001 certification process,
iso 27001 in hindi, iso 27001 tutorial, iso 27001 risk assessment, iso 27001 implementation, iso 27001 certification,
iso 27001 lead auditor certification, iso 27001 audit #CyberSecurity

Пікірлер: 66
@cheers4easy
@cheers4easy 2 жыл бұрын
Mai aapko samjha ke rahunga....loved it.....great job Luv. Superbly informative
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 жыл бұрын
thanks bhai
@me2507b4u
@me2507b4u Жыл бұрын
By far the best Video on Risk Assessment. I am so glad that i landed up on ur channel. Super informative video!!. Exactly what i was looking for. I dont think i need to watch anymore videos on Risk now. This was so crisp and simple to understand. Thank you so much for this video. Im hooked to ur channel now. My gratitude!! Keep doing the superb work.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 ай бұрын
thanks, please keep watching and share if you like this video :)
@ratnesh12100
@ratnesh12100 2 жыл бұрын
One most amazing and most informative video on KZfaq for RART... Thanks Boss.. keep making videos.. thanks once again..
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 ай бұрын
thanks, please keep watching and share if you like this video :)
@hashamkhan8477
@hashamkhan8477 Жыл бұрын
Hello Luv, Amazing video. your explanation and examples made my day. Thank you Sir. God keeps you and your family safe and you keep helping people like me. Love from Canada.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Жыл бұрын
thanks brother
@Theanonymousyou
@Theanonymousyou 11 ай бұрын
Thanks for the efforts you made for all of us... Thanks a ton again Luv Bhaai..
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 ай бұрын
thanks, please keep watching and share if you like this video :)
@deepanshidishi8041
@deepanshidishi8041 6 ай бұрын
Thank you so much sir for giving so much regarding Risk management.. Sir, could you share the bigger vulnerability table for better understanding of Risk levels and impact.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 6 ай бұрын
SQL Injection: Description: Attacker inputs malicious SQL code into a login form. Risk Level: High Potential Impact: Gain unauthorized access to the database, extract sensitive information. Cross-Site Scripting (XSS): Description: Malicious script injected into a web page via user input. Risk Level: High Potential Impact: Steal user session cookies, deface websites, execute unauthorized actions. Unpatched Software: Description: Failure to update a web server with the latest security patches. Risk Level: Medium Potential Impact: Vulnerable to known exploits, leading to unauthorized access or service disruption.
@deepanshidishi8041
@deepanshidishi8041 6 ай бұрын
@@LearnITSecuritywithLuvJohar Thank you so much sir for quick response 🙏
@dhavalchothani7148
@dhavalchothani7148 Жыл бұрын
Liked the way you explained.. 👍
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 ай бұрын
thanks, please keep watching and share if you like this video :)
@ankitaSingh-jc7eg
@ankitaSingh-jc7eg 21 күн бұрын
Thankyou soo much sir🎉
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 20 күн бұрын
Thanks 🤗 please share these videos and help me grow this channel
@successmantra8615
@successmantra8615 2 жыл бұрын
Amazing video on RARTP, great job Lov, keep it up. Plz share more example on RA related to manufacturing functional department. 🙏🙏
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 ай бұрын
thanks, please keep watching and share if you like this video :)
@niteshtomer898
@niteshtomer898 Жыл бұрын
Thank you so much sir for this video 🙏
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Жыл бұрын
thanks for watching!
@kashishhinduja4515
@kashishhinduja4515 Жыл бұрын
Best video
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar Жыл бұрын
thanks for watching!
@kbsfragrance3340
@kbsfragrance3340 Жыл бұрын
Very well explained sir..
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 ай бұрын
thanks, please keep watching and share if you like this video :)
@sunildhamane6454
@sunildhamane6454 3 ай бұрын
Thank you!! This is great video to simply overall risk management. How can i get copy of document referred during this video?
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 3 ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@varshapatwa5559
@varshapatwa5559 Жыл бұрын
ITGC domains- Logical access, change management, backup in hindi please
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 ай бұрын
thanks, please keep watching and share if you like this video :)
@indiayoutuber2628
@indiayoutuber2628 Жыл бұрын
Sir plz I'm Beginner in iso 27001 plz make session of exam and about NCR and investigation reports at writing exam papers
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 ай бұрын
thanks, please keep watching and share if you like this video :)
@himanshugupta8135
@himanshugupta8135 2 жыл бұрын
thanks luv sir
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 жыл бұрын
welcome my brother!
@himanshugupta8135
@himanshugupta8135 2 жыл бұрын
@@LearnITSecuritywithLuvJohar , WHAT IS RISK ASSESSMENT ? QUESTION KA KYA ANS IDEAL HOGA INTERVIEW ME?
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 жыл бұрын
kzfaq.info/get/bejne/ibePfK2qltKZl5c.html
@arpanchakraborty1942
@arpanchakraborty1942 Жыл бұрын
As mentioned in the table of Risk acceptance criteria- from 6 to 12 it is being taken as moderate risk and after 12 it is unacceptable risk. But sir, one confusion: in the cell of (unlikely-2, Severe-5) the multiplication is coming out to be 10. Therefore, how it has become red and considered as unacceptable? It should be considered as yellow ( moderate risk)..right? Thank you.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 ай бұрын
thanks, please keep watching and share if you like this video :)
@rf1193
@rf1193 2 ай бұрын
Hi, if you asked about the risk treatment plan what is the answer ? as interview question
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 ай бұрын
A risk treatment plan is a structured approach to managing risks within an organization or project. It outlines the actions, strategies, and measures that will be implemented to mitigate, avoid, transfer, or accept risks identified during the risk assessment process. Here are the key components typically included in a risk treatment plan: Risk Identification: Clearly identifying and documenting all potential risks that could impact the project or organization. This includes assessing both internal and external factors that may pose a threat. Risk Analysis: Evaluating each identified risk in terms of its probability of occurrence, potential impact, and severity. This step helps prioritize risks based on their significance. Risk Response Strategies: Developing specific strategies for how each identified risk will be addressed. Common strategies include risk avoidance (eliminating the risk entirely), risk mitigation (reducing the likelihood or impact of the risk), risk transfer (shifting the risk to another party, such as through insurance), and risk acceptance (acknowledging the risk without taking active measures). Responsibilities and Accountabilities: Assigning roles and responsibilities to individuals or teams responsible for implementing risk treatment measures. This ensures clear accountability for managing risks effectively. Timeline and Resources: Setting timelines for implementing risk treatment measures and allocating necessary resources, such as budget, manpower, and technology, to support risk management efforts. Monitoring and Review: Establishing a process for ongoing monitoring and review of the risk treatment plan. This includes regular assessments to track the effectiveness of implemented measures, identify new risks, and make adjustments to the plan as needed. By developing a comprehensive risk treatment plan, organizations can proactively address potential threats, minimize negative impacts, and enhance overall resilience and success.
@Ad000121
@Ad000121 Жыл бұрын
Do you have a English version
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 ай бұрын
thanks, please keep watching and share if you like this video :)
@satishr7288
@satishr7288 2 жыл бұрын
Dear Sir, vendor risk management video banaye.
@himanshugupta8135
@himanshugupta8135 2 жыл бұрын
hm is pr video jaror banye aap sir
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 ай бұрын
thanks, please keep watching and share if you like this video :)
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 ай бұрын
thanks, please keep watching and share if you like this video :)
@ratnesh12100
@ratnesh12100 2 жыл бұрын
Q- who will decide the score for likelihood and Impact.. is any guide line for determining the these numerical values? Or management/ higher authorities.. who?
@pikishah1570
@pikishah1570 Жыл бұрын
the score will be decided by the one who is performing risk assessment. or it can be a mutual dicision.
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 ай бұрын
thanks, please keep watching and share if you like this video :)
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 ай бұрын
thanks, please keep watching and share if you like this video :)
@TpPavithra-mh4pi
@TpPavithra-mh4pi 7 ай бұрын
Can you please make the same tutorial in English
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 7 ай бұрын
Sure I will definitely
@automatedesigner8695
@automatedesigner8695 Жыл бұрын
I need to pass iso 27001 for our organization what step need to follow
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 ай бұрын
Achieving ISO 27001 certification for your organization involves a structured process that demonstrates your commitment to information security and your ability to manage and protect sensitive data effectively. Here are the general steps to follow: Management Commitment: Obtain commitment and support from top management to implement ISO 27001. Management's involvement is crucial to the success of the certification process. Gap Analysis: Conduct an initial gap analysis to assess your organization's current state of information security. Identify areas where you need to improve to meet ISO 27001 requirements. Define Scope: Clearly define the scope of your ISMS (Information Security Management System). This defines what information assets are included and what aspects of the organization's activities are covered by ISO 27001. Risk Assessment: Perform a comprehensive risk assessment to identify and evaluate information security risks. This includes understanding potential threats, vulnerabilities, and impact. Risk Treatment: Develop a risk treatment plan to mitigate identified risks through the implementation of appropriate controls. This may include policies, procedures, and technical measures. Documentation: Create and maintain documentation, including an Information Security Policy, risk assessment reports, and operational procedures. These documents should align with ISO 27001 requirements. ISMS Implementation: Implement the controls and measures identified in your risk treatment plan. Ensure that security processes and procedures are followed by employees. Training and Awareness: Provide training and awareness programs for employees to ensure they understand their roles in information security and compliance with ISO 27001. Internal Audits: Conduct regular internal audits to assess the effectiveness of your ISMS and to identify any non-conformities or areas for improvement. Management Review: Hold periodic management reviews to evaluate the performance of your ISMS, identify areas for improvement, and ensure alignment with your organizational objectives. Certification Audit: Engage with a certified ISO 27001 audit and certification body. They will perform a certification audit to evaluate your ISMS's compliance with ISO 27001. Corrective Actions: Address any non-conformities identified during the certification audit and take corrective actions to resolve them. Certification: Once your ISMS meets the requirements of ISO 27001, you will be issued a certificate, signifying that your organization is ISO 27001 certified. Surveillance Audits: After certification, regular surveillance audits are conducted to ensure ongoing compliance with ISO 27001. Continuous Improvement: Continuously improve your ISMS and information security practices based on feedback, audits, and changes in your organization's risk landscape. Remember that ISO 27001 is an ongoing process, and maintaining certification requires continual improvement and vigilance. Regularly update your documentation and processes to address changing threats and security requirements. It's also important to engage employees at all levels to ensure they understand and support information security practices.
@satishr7288
@satishr7288 6 ай бұрын
ITGC 2nd video link
@syedtajwerali7895
@syedtajwerali7895 Жыл бұрын
Bhai bana do app yaar, 25 table wala bh
@syedtajwerali7895
@syedtajwerali7895 Жыл бұрын
you are the gem, Sir 😘
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 ай бұрын
thanks, please keep watching and share if you like this video :)
@olatunjiaka2779
@olatunjiaka2779 Жыл бұрын
Please always present in English
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 ай бұрын
thanks, please keep watching and share if you like this video :)
@jagdishsingh-lt7mm
@jagdishsingh-lt7mm Жыл бұрын
how can i reach you ??
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 ай бұрын
thanks, please keep watching and share if you like this video :)
@hanipathan9589
@hanipathan9589 Жыл бұрын
Provide in english ..we r unable to understand
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 8 ай бұрын
thanks, please keep watching and share if you like this video :)
@arunkumarandhe
@arunkumarandhe 2 ай бұрын
Could you please teach in English
@LearnITSecuritywithLuvJohar
@LearnITSecuritywithLuvJohar 2 ай бұрын
Thanks 🤗 please share these videos and help me grow this channel
@SM-xj3hr
@SM-xj3hr Ай бұрын
First of all Thank you so much for your contain and your effort. i have some doubt. For example: - We have only one external firewall, that firewall also have some critical level vulnerability. How do I determine which number to assign? - The data center is running on a single power backup. - The infrastructure is not implemented with the organization's password policy (non-compliance). in that situation 1st, i have to "Risk level" with - Vulnerability (here we need VAPT report?), Impact, Likelihood, Risk Level based on the Asset criticality. here My Question is : During the evaluation if i found more dependencies; like backend server, network, applications in this case how can i set the Asset priority and risk level with dependencies ! should i mention all dependencies? if yes then which should come first which come 2nd how to decide that ? is it based on the again Risk level or Criticality level for the system or service? 2nd, as you describe, I have to evaluate the Acceptable, Moderate & Unacceptable Risks by some number (Impact x Likelihood = Risk) here My Question is : how can i identify which risk number represent for which asset and which risk!! (for example as mentioned "Severe - 5" and Very "Likely - 5" with the Risk number 25!!). I confused about the 'Risk Evaluation'. 🙏 kindly help me to clear the doubt. Again, Thank you so much 🙏
ISO 27001 Clause 6.1.2 Information security risk assessment process in Hindi
19:33
Luv Johar Free IT Training Videos
Рет қаралды 2,3 М.
11 New Controls in ISO 27001 updated version of 2022 explained
20:11
Luv Johar Free IT Training Videos
Рет қаралды 3,5 М.
small vs big hoop #tiktok
00:12
Анастасия Тарасова
Рет қаралды 30 МЛН
IT general controls (ITGC) ITGC Controls: Getting it Right | Understanding ITGC in Cybersecurity
15:32
Conducting a cybersecurity risk assessment
52:42
IT Governance USA Inc.
Рет қаралды 86 М.
ISO27001 Risk Assessment Explained
51:54
CertiKit
Рет қаралды 6 М.
The 4 Strategies for Risk Treatment (New CQE BoK Content)
12:53
CQE Academy
Рет қаралды 6 М.
Implementing ISO 27001 in an organization with Kavitha
49:32
Prabh Nair
Рет қаралды 29 М.
Sion princess funny Haribo Donuts 🍊🚆😅🤣
0:35
SION /紫音
Рет қаралды 12 МЛН
БОЛЬШОЙ ПЕТУШОК #shorts
0:21
Паша Осадчий
Рет қаралды 8 МЛН
Сначала скажи, а потом не мамкай 🗿 #shorts
0:16
Вика Андриенко
Рет қаралды 2,7 МЛН
Love Challenge With Mellstroy And Mrbeast
0:19
BigSchool
Рет қаралды 7 МЛН
Only Harley Quinn doesn't dislike the Joker's shortcomings#joker #shorts
0:17
Эмоции💫 | Тгк: D1ashenka✨
0:22
D1ashenka
Рет қаралды 3,4 МЛН