SlideShare una empresa de Scribd logo
1 de 3
HDFC Bank
Business Risk Management


            Submitted by
            • Ashish Anand
            • Amey Mhasalkar
            • Avisheke Barua
            • Kunal Singh
Suitability of steps in Risk Management
Privacy in Banking Industry
    Authentication                                      RBI
                                                                            HDFC Bank
                                                     Guidelines
    Authorization
                                                           Access
                                                                               Adaptive Risk
                                                         controls for
                                                                                Modeling
    Privacy                                                 data

                                                                                  Level of
    Integrity                                            Application
                                                                               intervention
                                                          Software
                                                                                α risk score

    Non-repudiation
                                                        Smart Card &           Back up data
                                                         Biometrics              systems

•   Money lost in phishing attacks
•   More no of mobile users increasing so a higher secure system necessary to be in place
•   Signing up with security provider RSA to provide a secure transaction to the customers
•   Worries of making the customer’s job tedious by transactions
RSA Security customer interface and
                       Security

     Combination                                                   Benefit of pay   Just the issue
                     Cooling period   Using cloud     Issue of
     of validation                                                  for use so a     of building a
                      of 24 hrs for   computing     securing the
          and                                                       saving upon       Broadband
                      verification     services         data
    authentication                                                 the revenues      connection




• More convenience on the part of bank
• A grater revenue build up in a long term perspective because of pay for use policy
• The online customers had reached a critical mass so the security systems were necessary
• The onsite model may also be a higher fixed investment for the firm and 100% utilization
  is also not assured of
• The issue before hand was to provide secure access to all or active users as they had the
  inconvenience of travelling to the bank for activation
• Fear of loosing the customer base

Más contenido relacionado

La actualidad más candente

SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.Sierraware
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.securitySreeni Pamidala
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)Peter Tutty
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixLuigi Delgrosso
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM Sverige
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Securityebuc
 
A Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti PorfolioA Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti PorfolioIvanti
 
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...solarisyougood
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentationtsteh
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalArrow ECS UK
 
Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Private Cloud
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesCamilo Fandiño Gómez
 

La actualidad más candente (18)

SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
SierraVMI Virtual Mobile Infrastructure (VMI). Android-based VDI.
 
Pulse 2014.mobile first.security
Pulse 2014.mobile first.securityPulse 2014.mobile first.security
Pulse 2014.mobile first.security
 
IBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References GuideIBM Security - 2015 - Client References Guide
IBM Security - 2015 - Client References Guide
 
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
IBM Security Guardium Data Activity Monitor (Data Sheet-USEN)
 
Information Rights Management (IRM)
Information Rights Management (IRM)Information Rights Management (IRM)
Information Rights Management (IRM)
 
Extending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFixExtending QRadar’s reach and simplifying incident response with BigFix
Extending QRadar’s reach and simplifying incident response with BigFix
 
IBM - IAM Security and Trends
IBM - IAM Security and TrendsIBM - IAM Security and Trends
IBM - IAM Security and Trends
 
IBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database SecurityIBM Infosphere Guardium - Database Security
IBM Infosphere Guardium - Database Security
 
A Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti PorfolioA Non-Salesy Intro to the Ivanti Porfolio
A Non-Salesy Intro to the Ivanti Porfolio
 
U nit 4
U nit 4U nit 4
U nit 4
 
Presentation ibm info sphere guardium enterprise-wide database protection a...
Presentation   ibm info sphere guardium enterprise-wide database protection a...Presentation   ibm info sphere guardium enterprise-wide database protection a...
Presentation ibm info sphere guardium enterprise-wide database protection a...
 
Iraje brochure v17 master
Iraje brochure v17 masterIraje brochure v17 master
Iraje brochure v17 master
 
Guardium Presentation
Guardium PresentationGuardium Presentation
Guardium Presentation
 
Qradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_finalQradar ibm partner_enablement_220212_final
Qradar ibm partner_enablement_220212_final
 
CyberArk
CyberArkCyberArk
CyberArk
 
Microsoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution PresentationMicrosoft Forefront - Secure Endpoint Solution Presentation
Microsoft Forefront - Secure Endpoint Solution Presentation
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Guardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level ExecutivesGuardium Data Activiy Monitor For C- Level Executives
Guardium Data Activiy Monitor For C- Level Executives
 

Similar a HDFC_Grp4_iiimc

Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15finalMahmoud Moustafa
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formulaOracleIDM
 
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processesIntegrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processesVladimir Jirasek
 
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) PresentationMicrosoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) PresentationMicrosoft Private Cloud
 
Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT SecuritySeccuris Inc.
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Crew
 
International approaches to critical information infrastructure protection ...
International approaches to critical information infrastructure protection   ...International approaches to critical information infrastructure protection   ...
International approaches to critical information infrastructure protection ...owaspindia
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloudAjay Rathi
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1OracleIDM
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...Khazret Sapenov
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By DesignNalneesh Gaur
 
BayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes EverythingBayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes EverythingCloudPassage
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementOracleIDM
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracleIDM
 
Accelerate Automate and Assure Cloud Environments
Accelerate Automate and Assure Cloud EnvironmentsAccelerate Automate and Assure Cloud Environments
Accelerate Automate and Assure Cloud EnvironmentsCarl Terrantroy
 

Similar a HDFC_Grp4_iiimc (20)

Isc2conferancepremay15final
Isc2conferancepremay15finalIsc2conferancepremay15final
Isc2conferancepremay15final
 
Oracle security-formula
Oracle security-formulaOracle security-formula
Oracle security-formula
 
Integrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processesIntegrating Qualys into the patch and vulnerability management processes
Integrating Qualys into the patch and vulnerability management processes
 
null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Webinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility StrategyWebinar on Enterprise Mobility Strategy
Webinar on Enterprise Mobility Strategy
 
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) PresentationMicrosoft Forefront - Unified Access Gateway (UAG) Presentation
Microsoft Forefront - Unified Access Gateway (UAG) Presentation
 
Making Executives Accountable for IT Security
Making Executives Accountable for IT SecurityMaking Executives Accountable for IT Security
Making Executives Accountable for IT Security
 
Risk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the CloudRisk Factory: PCI Compliance in the Cloud
Risk Factory: PCI Compliance in the Cloud
 
International approaches to critical information infrastructure protection ...
International approaches to critical information infrastructure protection   ...International approaches to critical information infrastructure protection   ...
International approaches to critical information infrastructure protection ...
 
security and compliance in the cloud
security and compliance in the cloudsecurity and compliance in the cloud
security and compliance in the cloud
 
A better waytosecureapps-finalv1
A better waytosecureapps-finalv1A better waytosecureapps-finalv1
A better waytosecureapps-finalv1
 
SYMCAnnual
SYMCAnnualSYMCAnnual
SYMCAnnual
 
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 20...
 
Sw keynote
Sw keynoteSw keynote
Sw keynote
 
Information Security By Design
Information Security By DesignInformation Security By Design
Information Security By Design
 
AWS Cloud Security
AWS Cloud SecurityAWS Cloud Security
AWS Cloud Security
 
BayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes EverythingBayThreat Why The Cloud Changes Everything
BayThreat Why The Cloud Changes Everything
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
Oracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcastOracle_Cisco identity platform approach_webcast
Oracle_Cisco identity platform approach_webcast
 
Accelerate Automate and Assure Cloud Environments
Accelerate Automate and Assure Cloud EnvironmentsAccelerate Automate and Assure Cloud Environments
Accelerate Automate and Assure Cloud Environments
 

Más de Ashish Anand

Más de Ashish Anand (14)

Constraint Management
Constraint ManagementConstraint Management
Constraint Management
 
Market intelligence report on mobile wallets
Market intelligence report on mobile walletsMarket intelligence report on mobile wallets
Market intelligence report on mobile wallets
 
Big data analytics in payments
Big data analytics in payments Big data analytics in payments
Big data analytics in payments
 
Cfr project tata motors iimc
Cfr project tata motors iimcCfr project tata motors iimc
Cfr project tata motors iimc
 
Brm
BrmBrm
Brm
 
Vg
VgVg
Vg
 
Ceat ma d_iim calcutta
Ceat ma d_iim calcuttaCeat ma d_iim calcutta
Ceat ma d_iim calcutta
 
Shell presentation
Shell presentationShell presentation
Shell presentation
 
Consumer behaviour
Consumer behaviourConsumer behaviour
Consumer behaviour
 
Constaint apoorv ashish
Constaint apoorv ashishConstaint apoorv ashish
Constaint apoorv ashish
 
Lisa baxter
Lisa baxterLisa baxter
Lisa baxter
 
Sktelecom
SktelecomSktelecom
Sktelecom
 
Report
ReportReport
Report
 
Final ppt
Final pptFinal ppt
Final ppt
 

HDFC_Grp4_iiimc

  • 1. HDFC Bank Business Risk Management Submitted by • Ashish Anand • Amey Mhasalkar • Avisheke Barua • Kunal Singh
  • 2. Suitability of steps in Risk Management Privacy in Banking Industry Authentication RBI HDFC Bank Guidelines Authorization Access Adaptive Risk controls for Modeling Privacy data Level of Integrity Application intervention Software α risk score Non-repudiation Smart Card & Back up data Biometrics systems • Money lost in phishing attacks • More no of mobile users increasing so a higher secure system necessary to be in place • Signing up with security provider RSA to provide a secure transaction to the customers • Worries of making the customer’s job tedious by transactions
  • 3. RSA Security customer interface and Security Combination Benefit of pay Just the issue Cooling period Using cloud Issue of of validation for use so a of building a of 24 hrs for computing securing the and saving upon Broadband verification services data authentication the revenues connection • More convenience on the part of bank • A grater revenue build up in a long term perspective because of pay for use policy • The online customers had reached a critical mass so the security systems were necessary • The onsite model may also be a higher fixed investment for the firm and 100% utilization is also not assured of • The issue before hand was to provide secure access to all or active users as they had the inconvenience of travelling to the bank for activation • Fear of loosing the customer base