Cyber Security Threat Classifications

 Read an interesting book where the usual Cyber Security Threat Classifications were listed as below:

Security Threat Supply

a) Internal Threats: It is usually internal to the organization because the results of worker action or failure of a company method.

b) External Threats: It arises from people or organizations operating outside of an organization. 

Threat Agents

a) Human Threats: This category includes threats caused by human actions like insiders or hackers that cause damage or risk in systems.

b) Environmental Factors: These are threats caused by non human agent. It comes, first, from natural disaster threats like earthquakes, flood, fire, lightning, wind or water and, also, as a result of animals and life that cause severe harm to data systems like floods, lightning and fireplace. 

c) Technological Threats: It can be physical or chemical process for technology. P

Threat Motivation

Attackers ordinarily have a particular goal or motive for an attack on a system. These goals are:

a) Malicious threats include within or outside attacks caused by staff or nonemployees to damage and disrupt a company like viruses, Trojan horses, or worms.

b) Non-malicious attacks occur as a result of poor security policies and controls that enable vulnerabilities and errors to require place. 

Threat Intent

Intentional Threats: It represents threats that are results of a harmful call. For instance laptop crimes, or once somebody by choice damages property or data. Laptop crimes embrace spying, fraud, pornography, and MasterCard crime.

Unintentional Threats: It represents threats that are introduced while not awareness. These threats primarily embrace the unauthorized or accidental modification of computer code. Accidental error includes corruption of knowledge caused by computer error, user or operator error.

Four Types of Security Threats

You need to be aware of the Four Types of Security Threats:


Disclosure: This involves leaking secrect information or data to the wrong guys. This can lead from exposure of personal information to devastating security impacts.


Theft: This is when something of value gets stolen. It can lead to huge harm to the organization.


Integrity: This happens when an asset being intentionally damaged. When a virus enters your computer or your compuater gets hacked, and this causes problems, that is an integrity threat.


Denial of Service: This is when some service is intentionally blocked. Some experts believe this to be the most difficult of all threats to deal with effectively.

Cyber Security

 Cyber Security is extremely important for an Organization of whatever size it might be. Cyber Security breaches can be so awful that it can shutdown a company. 

But one needs to remember that instead of "We" in cybersecurity, "I" is very important. Everybody in a organization should play a role in cyber security, and be cautious about what they do so as to protect their organization from attacks.

Indian Heathcare sector on the High


Interesting read on the healthcare special by Punita Jasrotia in SpiceRoute


Healthcare sector indeed on a high with government's encourage and private sector players making all the right moves.

Not surprising that India has become the Medical Tourism destination of choice!!

Lean IT vs Six Sigma

The confusions between the concept of Lean IT and Six Sigma still exist. Many I times, I get asked the same question, "Can you tell me how Lean IT differs from Six Sigma?"

Simply put, Lean IT is about waste reduction/removal and Six Sigma is about defects.

Cloud Changing the Tech Landscape

Read an interesting article on the wired: http://www.wired.com/2015/10/meet-walking-dead-hp-cisco-dell-emc-ibm-oracle/

It shows how cloud is changing the technology landscape. Smaller companies with focus on cloud are emerging stronger and better than the traditional tech majors.

It definitely makes sense to "Go Cloud".

Lean's aim

If we use Lean as a mean to employee reduction, it is not a right way to go. First focus on removing the waste - on quality and process improvement. Other benefits come in as by product.

But if you go ahead with the "by product" as your goal, you are on the wrong track.