User:Vishalshah

I work as a member of Application Security & Advisory team to protect our organization from reputational and/or financial loss resulting from a compromise of the Confidentiality, Integrity, Availability, and/or Proof of Audit of our underlying data assets. Information is protected by focusing on four categories of risk and categorizing data based on these risks. We follow on four categories of risk. 1.Confidentiality - Assurance that information is shared only among authorized persons. 2.Integrity          - Assurance that the information is authentic and complete and not modified without authorization. 3.Availability     - Assurance that the systems responsible for delivering, storing and processing information are accessible when needed, by those who need them. 4.Traceability   - Establishing audit trails of sensitive activities in our systems and providing a way of determining who performed these activities.

Thanks Vishal