Vanessasml
commited on
Update README.md
Browse files
README.md
CHANGED
@@ -68,7 +68,7 @@ as the internet supersedes the telephone as the favored channel for scammers, ac
|
|
68 |
The insurer polled over 1000 adults over the age of 45 in the latest update to its long-running Real Retirement Report. \
|
69 |
Further, 6% said they had actually fallen victim to such an online attack, amounting to around 1.2 million adults.
|
70 |
"""
|
71 |
-
example_prompt_2 = "What are the main 5
|
72 |
|
73 |
messages = [
|
74 |
{"role": "system", "content": "You are an IT supervisor from a supervisory institution."},
|
@@ -97,6 +97,15 @@ outputs = pipeline(
|
|
97 |
print(outputs[0]["generated_text"][len(prompt):])
|
98 |
|
99 |
## Example output
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
100 |
```
|
101 |
|
102 |
## Limitations and Bias
|
|
|
68 |
The insurer polled over 1000 adults over the age of 45 in the latest update to its long-running Real Retirement Report. \
|
69 |
Further, 6% said they had actually fallen victim to such an online attack, amounting to around 1.2 million adults.
|
70 |
"""
|
71 |
+
example_prompt_2 = "What are the main 5 ITC EBA IT risks?
|
72 |
|
73 |
messages = [
|
74 |
{"role": "system", "content": "You are an IT supervisor from a supervisory institution."},
|
|
|
97 |
print(outputs[0]["generated_text"][len(prompt):])
|
98 |
|
99 |
## Example output
|
100 |
+
As an IT supervisor from a supervisory institution, I can provide you with the main 5 ITC EBA IT risks that we focus on:
|
101 |
+
|
102 |
+
1. **Availability Risk**: The risk that IT systems and services are not available when needed due to hardware or software failures, cyber-attacks, or other disruptions. This includes the risk of data loss or corruption, which can lead to financial losses, reputational damage, or even regulatory non-compliance.
|
103 |
+
2. **Security Risk**: The risk of unauthorized access, use, disclosure, disruption, modification, or destruction of IT systems and data. This includes the risk of data breaches, cyber-attacks, and insider threats that can compromise sensitive information and disrupt business operations.
|
104 |
+
3. **Confidentiality Risk**: The risk of unauthorized access or disclosure of sensitive information, including personal data, financial information, or intellectual property. This includes the risk of data breaches, data leaks, or unauthorized access to critical infrastructure.
|
105 |
+
4. **Integrity Risk**: The risk of data being altered in an unauthorized or undetected manner, including changes to financial transactions or records. This includes the risk of data tampering, fraud, or manipulation that can lead to financial losses or reputational damage.
|
106 |
+
5. **Compliance Risk**: The risk of non-adherence to regulatory requirements, industry standards, and organizational policies related to IT operations and security. This includes the risk of fines, penalties, or reputational damage due to non-compliance with data protection regulations, such as GDPR or PSD2.
|
107 |
+
|
108 |
+
These risks are not mutually exclusive, and IT risks often overlap or intersect. As an IT supervisor, it's essential to consider these risks in our risk assessments and mitigation strategies to ensure the stability and security of the financial sector's IT infrastructure.
|
109 |
```
|
110 |
|
111 |
## Limitations and Bias
|