Types of Sensitive information -PII, SPI and PI | Relationship explained with examples.

  Рет қаралды 692

Security For You

Жыл бұрын

Hello friends, and welcome back! Today's topic for discussion is types of sensitive information. In this digital era, safeguarding our personal and business data is of utmost importance. To protect against potential threats, we must first understand the different categories of sensitive information.
In this video, we delve into three key types of sensitive data: Personally Identifiable Information (PII), Personal Information (PI), and Sensitive Personal Information (SPI). We explore what each category entails and how they relate to each other.
If you know what is sensitive and what is critical, then only you would be able to put appropriate controls. For if any information is highly confidential, you'll put in more controls. And if any information is public, then you won't put any controls. Right? So that's why it is very important for us to know which data is critical, which data is sensitive, which data is more important to us in order to secure that right?
We will be back soon with another video, another module, another dose of learning. Thank you. Have a great day. Bye.
Topmost videos to watch right now -
• Change Management: Ultimate step by step Guide for Auditors | Emergency vs Normal Change explained - kzbin.info/www/bejne/fmGZgGxoas9jbtk
• Access Control Models: Why cannot Discretionary Access Control override Mandatory Access Control? - kzbin.info/www/bejne/oX2qg4Kwh6aAoqc
• Risk Management explained with real life examples. Risk Assessment and Risk Evaluation on 5X5 matrix - kzbin.info/www/bejne/p6nEmaGbi6-Vmbs
• Understanding Identification, Authentication, and Authorization in Security | - kzbin.info/www/bejne/rIexZoygipWYeNk
• Risk Appetite vs Risk Tolerance vs Risk Capacity | Differences explained with examples. Watch now - kzbin.info/www/bejne/bpzUc5-Ofq2WgrM
• Demilitarized zone DMZ in Network Security | Role of Firewall in routing traffic | DMZ vs Extranet - kzbin.info/www/bejne/hZjJdn5th56orc0
• How I cleared my CRISC? ISACA CRISC Exam Success Tips: Domains, Strategy and Resources - kzbin.info/www/bejne/jGObaKCcn7F1hpI
• Three lines of Defense model | Risk Governance and Risk Management within three lines of defense 🎉 - kzbin.info/www/bejne/poOUqWN6q7utoc0
• Types of Sensitive information -PII, SPI and PI | Relationship explained with examples. - kzbin.info/www/bejne/qam9pYd_hNl6obc
• What is Encryption & Decryption? How does it work? Symmetric & Asymmetric explained with examples ☀️ - kzbin.info/www/bejne/jJ2rc396d9pph6M
• Security Assessment vs Security Monitoring vs Security Audit | How all three terms are different? - kzbin.info/www/bejne/sJWaZo2AeNGNf7c
• Security Incident vs Security Event vs Security Breach | How these terms are different? 💥 - kzbin.info/www/bejne/mIOZZmN5eLBrgMU
• Brute Force Attacks: How Hackers Gain Access? How to prevent from it? - kzbin.info/www/bejne/a2ivkIuXlJl6ma8
• Different types of hackers - White, Grey, Blue, Black hat & Elite APT hackers 💥Discussed with example - kzbin.info/www/bejne/ioOsnqaDi7h_epY
• HIPAA - Compliance & Rules | How to recognize & protect PHI. 💥 - kzbin.info/www/bejne/d4HFe3p5d8hsbZY
• OWASP Top 10 Vulnerabilities. All discussed in details 💥 - kzbin.info/www/bejne/oX-8eIhsa9qtiZY
• Vulnerability assessment vs Penetration testing? When to do VA & PT tests? - kzbin.info/www/bejne/mGmmp5qrrMx1iLc
• Test of Design & Test of Effectiveness 💥 Examples of Failed Internal Controls 🔏 - kzbin.info/www/bejne/iICmimqheKmSqM0
• Types of Audits in Information Security | Mentioned in Agreement or Contract 💥 SOC1, SOC2, HITRUST - kzbin.info/www/bejne/a5Wlc5aojbCDfbs
• Privacy by Design & Privacy by Default 🔏 Explained ! How to implement in your organization? 💥 - kzbin.info/www/bejne/enimlHmffdxogNU
• Data Security vs Data Privacy 🔏 How both are different? - kzbin.info/www/bejne/hHW4mmV6jbuIkMk
• BYOD Policy - Mobile Device Management vs Mobile Application Management - kzbin.info/www/bejne/epi7mZKwp9aZrrc
• What is Jailbreaking, Rooting & Cracking? What are the Security Risks involved?- kzbin.info/www/bejne/h4m2l3l8fbuJb8k
• Information Security vs Cyber Security 💥 - kzbin.info/www/bejne/hmK3oYCOgNOXjA
#SensitiveInformation #DataSecurity #DataPrivacy #DigitalEra #Cybersecurity101 #PersonalData #DataProtection #PII #SPI #PI #IdentityTheft #InformationSecurity #PrivacyMatters #CyberAwareness #SecureData #DigitalSafety #DataBreach #OnlinePrivacy #InformationProtection #DataAwareness #CyberThreats #DataSafeguard #InformationManagement #SecureYourData #OnlineSafety #DataCompliance #ProtectYourIdentity #DataRisk #CyberEducation #DataConfidentiality #PrivacyBestPractices #DataSafetyTips #DigitalPrivacy #ProtectYourPrivacy #DataSecurityTips #CyberAware #DataPrivacyDay #InfoSec #DataSensitivity #DataManagement #CyberSafety #OnlineSecurity

Пікірлер: 4
@best_supporting_actor
@best_supporting_actor Жыл бұрын
Great insight!
@security_for_you
@security_for_you Жыл бұрын
Thank you 😊
@vinodvaidwal1766
@vinodvaidwal1766 Жыл бұрын
great sir
@security_for_you
@security_for_you Жыл бұрын
Thank you 👍
Officer Rabbit is so bad. He made Luffy deaf. #funny #supersiblings #comedy
00:18
Funny superhero siblings
Рет қаралды 19 МЛН
How it feels when u walk through first class
00:52
Adam W
Рет қаралды 20 МЛН
Officer Rabbit is so bad. He made Luffy deaf. #funny #supersiblings #comedy
00:18
Funny superhero siblings
Рет қаралды 19 МЛН