Network Security
Network Security
Network Security
The submission is in the form of a single word document. You are required to make use of headings, paragraphs,
subsections and illustrations as appropriate, and all work must be supported with research and referenced using
the Harvard referencing system. Make use the font Times New Roman, size 12, all borders 1 inch, 1.5 line
spacing and justified alignment. No specific word limit given.
Unit: 05
Plagiarism
Formative feedback : Assessor to student
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and students who
break the rules, however innocently, may be penalised. It is your responsibility to ensure that you
understand correct referencing practices. As a university level student, you are expected to use
appropriate references throughout and keep carefully detailed notes of all your sources of materials for
material you have used in your work, including any material downloaded from the Internet. Please
consult the relevant unit lecturer or your course tutor if you need any further advice.
Action plan
Student Declaration
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.
Assignment Feedback
Assessor name
Criteria To achieve the criteria the evidence must show that the student Achieved? (tick)
Reference is able to:
Task 01 (LO1)
Task 02 (LO2)
1. Define the terms Internet security, Network security, Endpoint Security, and
Vulnerability assessment.(P3)
2. State few techniques to test network security and give examples for network security
testing tools. (P3)
3. Explain how following technologies would benefit facilitating a ‘trusted network’.
(Support your answer with suitable illustrations). (P4, M2, D1)
I. DMZ
II. Firewalls
III. NAT
IV. VPN
4. Explain what is Raid. Describe different levels of Raids (0,1,5,6,10) and describe
comparatively how they can improve security. (Support your answer with suitable
illustrations). (P4, M2, D1)
5. Encrypt following message using Caesar cipher using shift values 3 and 5. Show your
work. And briefly state the need of encryption to enhance security. (P3, M2)
1. What is a risk assessment and explain the need of a risk assessment to an organization.
(P5)
2. Briefly describe the steps to conduct a risk assessment based on ISO 27001 standards.
(P5, M3)
3. Describe the process of risk management based on ISO 31000 standards. (P5,M3)
4. Briefly differentiate Integrated Risk Management (IRM) and Enterprise Risk
Management (ERM). (P6)
Suppose you are the Chief Information Security Officer (CISO) at a well reputed
organization. Answer the questions below. (State assumptions you made if there are any.)
5. Write a brief description explaining, methods and strategies you will use in order to
conduct a risk analysis and security audit for your organization. (P6, M4, D2)
6. State 5 importance of disaster recovery for an organization. (P6)
7. Explain the how misalignment of organizational policies and physical IT security will
affect your organization. (P6, M4, D2)
Task 04 (LO4)
List of Figures
Figure 1 Acknowledgement.................................................................15
Figure 2 Data Backup.........................................................................25
Figure 3 8 Principles of IT Audit...........................................................26
Figure 4 Risk Assessment...................................................................29
Figure 5 Vulnerability Assessment........................................................31
Figure 6 Network Security Techniques..................................................33
Figure 7 Intruder Tool........................................................................34
Figure 8 OWASP................................................................................34
Figure 9 ACUNETIX............................................................................35
Figure 10 Wireshark...........................................................................35
Figure 11 W3AF.................................................................................35
Figure 12 DMZ..................................................................................36
Figure 13 Firewall..............................................................................37
Figure 14 Static NAT..........................................................................38
Figure 15 Dynamic NAT......................................................................39
Figure 16 NAT Overloading.................................................................40
Figure 17 VPN...................................................................................41
Figure 18 RAID 0...............................................................................43
Figure 19 RAID 1...............................................................................43
Figure 20 RAID 5...............................................................................43
Figure 21 RAID 6...............................................................................44
Figure 22 Caesar Ciper Source Code.....................................................47
Figure 23 Virtualization......................................................................50
Figure 24 Risk...................................................................................54
Figure 25 ISO 27001..........................................................................57
Figure 26 ISO 30001..........................................................................59
Figure 27 Network Standards Organizations..........................................76
Acknowledgement
Foremost, I would like to express my sincere gratitude to my Subject Lecturer and my
Assignment Adviser Ms. Dharani Abeysinghe at the CINEC Campus for giving good guidance
and motivation to me.
Also, in preparing for this project, I could not complete it without the support of my batch mates.
They always direct me to create this project successfully.
My sincere thanks also go to my dearest parents for giving me valuable advice and for giving me
their maximum support to complete this project.
Finally, I would like to say Thank you to the unmentioned people who have guided me, directly
and indirectly, to write this project successfully.
Figure 1 Acknowledgement
Task 01
Task 1.1 Security Risk
The likelihood of exposure, loss of key assets and sensitive information, or reputational harm as
a result of a cyber assault or breach within an organization's network is known as security risk.
Security must remain a key priority across industries, and businesses should work to create a
cybersecurity risk management strategy to guard against ever-evolving cyber threats. We can
divide security risks into three main parts.
Threats
o Social engineering attacks, DDoS attacks, and advanced persistent threats are just
a few examples of threats. Threat actors are often linked to nation-states, insiders,
and criminal businesses, and are driven by monetary gain or political ambitions.
Vulnerability
o A vulnerability is a weakness, fault, or error in cybersecurity that can be exploited
by attackers to gain unauthorized access. Vulnerabilities can be exploited in a
variety of ways, which is why vulnerability management is so important for
staying one step ahead of thieves.
Consequence
o The real injury or damages that occur as a result of a network disruption are
referred to as the consequence. In most cases, when a company works to solve the
problem, it will suffer both direct and indirect consequences. The effects of an
attack may have an influence on an organization's finances, operations, reputation,
and regulatory compliance status, depending on the nature of the attack.
[ CITATION Neg21 \l 1033 ]
Threat Attack
Can be initiated by system itself as
Is always initiated by outsider
well as outsider.
Can be intentional or
Can be intentional
unintentional
Comparatively hard to detect Comparatively easy to detect
Circumstance that has ability to
Objective is to cause damage
cause damage
May or may not be malicious May be malicious
Information may or may not Chance for information alteration and
be altered or damaged damage is very high
Can be blocked by control of Cannot be blocked by just controlling
vulnerabilities the vulnerabilities
Eavesdrop Attack
Eavesdropping is a type of attack that involves intercepting network communication. The hacker
uses your network behaviour to monitor things like credit card numbers and other potentially
valuable, sensitive information in eavesdropping assaults. Active and passive eavesdropping
attacks are the two forms of eavesdropping assaults. The hacker will pose as a trustworthy server
and send requests to the transmitters in an active attack. A passive attack, on the other hand,
listens to data transmitted across the network.[ CITATION Nab20 \l 1033 ]
1. Ineffective passwords
a. Password theft is a popular target for attackers since it is a low-cost, easy
approach with high returns.
2. Faulty networks
a. The possibility for data theft is rising as gadgets and technologies become more
sophisticated. The growth of the Internet of Things, in particular, is giving
hackers new ways to attack an increasing number of internet-connected devices
and endpoints. Industrial equipment with network and software sensors, as well as
healthcare systems with sensitive data, have become profitable targets for
corporate theft.
3. Unpatched servers
a. Security processes may constantly be improved, and developers are often
providing solutions to existing problems in server programs. However, it is the
responsibility of administrators to apply these patches: firms who neglect to check
for and deploy server upgrades leave their systems vulnerable to attack.
4. Insider threats
a. Companies face a significant risk from departing users. When employees leave
their company, 69 percent of companies lose data. Customer and prospect
information, as well as proprietary code, are frequently extremely sensitive data.
Disgruntled workers, on the other hand, might be tempted to steal business data
for personal or financial benefit.
5. Publicly available information
a. Hackers don't simply utilize technology to steal from businesses. Cybercriminals
are increasingly using social media and publicly available information to not only
target people, but also to gather the information they need to gain access to
business systems and steal employee data.[ CITATION Swa20 \l 1033 ]
Preventing Tricks
Financial Impact
Cyber assaults frequently result in significant financial damage as a result of,
Businesses that have had a cyber breach will almost always have to pay to restore the damaged
systems, networks, and devices.
Reputational Impact
Customer relationships require a high level of trust. Cyber assaults may harm your company's
brand and destroy your consumers' faith in you. As a result, following can happen. They are,
Reputational harm may have an influence on your suppliers, as well as your relationships with
partners, investors, and other stakeholders in your company.
Legal Impact
Data protection and privacy regulations require you to keep track of the security of any personal
information you have about your employees or clients. You might face penalties and regulatory
consequences if sensitive data is unintentionally or intentionally compromised, and you failed to
implement sufficient security measures.
Data Backup
The act of putting up a security system to back up data in the case of a loss and recover the data
as backup data is known as data backup and recovery. You must copy and back up your
computer data while backing up your data so that you may retrieve it in the event of data damage
or destruction. You can only get data back if you back it up from time to time. Data backup is
one type of disaster recovery and is an essential component of a well-thought-out disaster
recovery strategy. When you back up your data, it's not always possible to restore all of your
system's data and settings. Computer clusters, database servers, and active directory servers, for
example, require extra catastrophe recovery since backup and recovery have not entirely
reorganized them. Large quantities of data may now be backed up using cloud storage. As a
result, no data backup to the local system hard drive or external storage is required. Cloud
computing may also be used to process mobile devices and enable automatic data recovery.
Planning
Studying and Evaluating Controls
Testing and Evaluating Controls
Reporting
Follow-up
Types of IT Audit
Technology Innovation Audit
Technology innovation audit, as a new field in management audit, broadens the scope of
traditional financial auditing and applies it to oversee, guide, and assess a company's
technological innovation operations. The use of a technological innovation audit can improve not
only the success rate of technological innovation operations, but also the capacity of businesses
to recognize and fix errors in this area. The structure of technological innovation audit may be
split into three components based on the features of information asymmetry in technological
innovation management.
The audit of the professional and technical innovation capacity of staff, as well as the
incentive mechanism, may be used to address information imbalance between employees
and management.
The audit of an enterprise's credit database, as well as technical and technological
innovation initiatives, can help to resolve information imbalance between shareholders
and creditors.
The audit of market adaption of technical innovation initiatives helps address information
imbalance between businesses and external stakeholders.[ CITATION Yiy12 \l 1033 ]
Task 02
Task 2.1 Internet Security, Network Security,
Endpoint Security & Vulnerability Assessment
Internet Security
The protection of data transferred over the Internet is based on particular resources and
standards. Various types of encryption, such as Pretty Good Privacy, are included in this
category (PGP). Firewalls, which block undesirable traffic, and anti-malware, anti-spyware, and
anti-virus applications, which monitor Internet traffic for harmful attachments and work from
particular networks or devices, are also part of a safe Web setup. Both companies and
governments are increasingly placing a premium on internet security. Financial information and
much more is protected by good Internet security on the servers and network infrastructure of a
business or agency. Inadequate Internet security can put an e-commerce firm or any other
organization that sends data over the Internet at risk of going bankrupt.
Network Security
Your network and data are protected by network security against breaches, invasions, and other
dangers. This is a broad word that encompasses hardware and software, as well as procedures,
regulations, and settings pertaining to network use, accessibility, and overall threat prevention.
Access control, virus and antivirus software, application security, network analytics, several
forms of network-related security (endpoint, online, wireless), firewalls, VPN encryption, and
more are all part of network security. Client data and information must be protected, shared data
must be kept safe, and access and network performance must be dependable, as well as security
from cyber-attacks. A well-designed network security solution lowers operating costs and
protects businesses from costly data breaches and other security incidents. Having lawful access
to systems, apps, and data allows companies to run their businesses and provide services and
goods to their consumers.
Endpoint Security
Endpoint security is the act of preventing cyberattacks on devices such as PCs, laptops, mobile
phones, and tablets. Endpoint security software allows organizations to secure devices that
workers use for work reasons against cyber threats, whether they are on a network or in the
cloud. Cybersecurity risks from more sophisticated cyber thieves are becoming more prevalent in
today's corporate scene. Every 39 seconds, hackers conduct a cyberattack, totaling 2,244 assaults
each day. Given the vast number of endpoints used to connect to networks, they are one of the
most popular targets. According to Strategy Analytics, there were 22 billion connected devices in
2018, with that number expected to increase to 38.6 billion by 2025 and 50 billion by 2030. As a
result, according to Verizon's threat assessment, malware was installed on endpoints in up to
30% of data breaches.
Vulnerability Assessment
The process of defining, detecting, categorizing, and prioritizing vulnerabilities in computer
systems, applications, and network infrastructures is known as vulnerability assessment.
Vulnerability assessments also offer the information, awareness, and risk backgrounds that a
business needs to comprehend and respond to dangers in its environment. A vulnerability
assessment informs an organization about the security flaws that exist in its environment. It also
instructs on how to evaluate the dangers connected with certain flaws. This approach gives the
company a greater knowledge of its assets, security vulnerabilities, and overall risk, lowering the
chances of a cybercriminal breaking into its systems and catching the company off guard.
Ethical Hacking
Ethical hacking is when a corporation or a person uses hacking to assist detect possible dangers
on a computer or network. An ethical hacker tries to go beyond the system's security and look for
any flaws that criminal hackers, often known as black hats, may exploit. White hats may
recommend system modifications that make them less vulnerable to black hat attacks.
Password Cracking
When it comes to system testing, password cracking is the most important aspect. Hackers can
use a password cracking tool or guess a common username or password to get access to an
application's secret parts. Common usernames and passwords, as well as open source password
cracking software, are readily available online. It is easy to break the login and password until a
web application requires a complicated password for example a lengthy password with a
combination of digits, letters, and special characters. If the username or password is saved
without encryption, another method of breaking the password is to target cookies.
Penetration Test
A penetration test is an attack on a computer system with the goal of uncovering security flaws
and gaining access to the system's functionality and data.
Risk Assessment
This is the process of evaluating and deciding on the risk associated with the type of loss and the
likelihood of vulnerability. Various interviews, conversations, and analyses are used to ascertain
this inside the company.
Security Auditing
A security audit is a systematic assessment of a company's information system's security by
determining how well it complies with a set of predetermined criteria.
OWASP
The Open Web Application Security
Project is a non-profit organization
dedicated to enhancing software
security throughout the world. As
part of the project, many tools are
Figure 8 OWASP
provided for pen testing various
software environments and protocols.
Acunetix
Acunetix by Invicta is a simple and easy-to-use tool that helps small and medium-
sized businesses protect their online applications against costly data breaches.
It accomplishes this by identifying a wide range of online security
vulnerabilities and assisting security and development experts in resolving
them quickly.
Figure 9 ACUNETIX
Wireshark
Wireshark, formerly known as Ethereal, is a
network analysis tool. It collects packets in
real time and displays them in a way that is
understandable to humans. It's essentially
a network packet analyzer that gives you
minute data about your network protocols,
decryption, packet information, and so on.
Figure 10 Wireshark
It's free and open source, and it works with Linux, Windows, OS X, Solaris, NetBSD, FreeBSD,
and a variety of other operating systems. The information collected by this utility may be
examined using a GUI or the TShark Utility in TTY mode.
W3AF
W3af is a framework for web application attack and
auditing. It contains three sorts of plugins: discovery,
audit, and attack, all of which communicate with one
another to detect any site vulnerabilities.. For
example, a discovery plugin in w3af looks for
different urls to test for vulnerabilities and forwards
Figure 11 W3AF them to the audit plugin, which then searches for
vulnerabilities using these URLs.[ CITATION gur15
\l 1033 ]
Figure 12 DMZ
Firewalls
A firewall is a network
security device that
monitors and regulates
incoming and outgoing
traffic and chooses whether
to allow or prohibit certain
types of traffic based on a
set of security rules. These
security rules are based on
Figure 13 Firewall the policies of an
organization or a company.
So, it acts as a filter between the trusted local area network and the untrusted public network
(internet). The Firewall accepts the permitted traffic. It rejects the deny traffic with an error
message “unreachable error”. In some cases, it drops some traffics without any error message. A
Firewall can be software, hardware, or a cloud-based system. Firewalls can divide into 6 main
categories by considering the firewall generation.
NAT
Network Address Translation is a translation procedure or a technology where a router or a
similar network device translates one IP address to another IP address. A router translates the
private IP addresses of an internal host into its public IP address for outgoing traffic. Also, the
router translates its public IP address to an internal private address for incoming traffic. NAT is
normally used to restrict the number of public IP addresses which use in an organization or a
company for both security and financial purposes. So, NAT gives access for the unregistered
private network address to connect the internet by translating the private network addresses into
a legalized addresses. Also, NAT translates the port address of each host by generating a port
mask for each port. Generally, NAT operates in a firewall or a router. We can divide NAT into
three main types.
Static NAT
In Static Network Address Translation, a single private IP address is converted and mapped with
a single public IP address. So, this is one to one network address translation process. Static NAT
is normally used for web hosting. Static NAT deals more with incoming traffic.
Ex-:
Web Server
192.168.100.2
Internet
192.168.100.2 1.2.3.4
Mail Server
192.168.100.4
192.168.100.3 1.2.3.5
192.168.100.4 1.2.3.6
Dynamic NAT
In Dynamic Network Address Translation, a single private IP address is converted and mapped
with a single public IP address which is in a public address pool. If the IP addresses of the pool
are over, the translation process will be finished. So, we should take the same number of public
addresses as the number of private addresses. Dynamic NAT also defines as “IP masquerading”
because it masks the internal hosts and makes it difficult for external hackers to monitor a
specific host.
Ex-:
Assume there is a public address pool with the following IP addresses only.
Web Server
192.168.100.2
Internet
192.168.100.2 1.2.3.4
192.168.100.3 1.2.3.5
Mail Server
192.168.100.4
192.168.100.4 1.2.3.6
Computer 192.168.100.6
192.168.100.6
NAT Overloading
In NAT Overloading or Port Address Translation, a single private IP address is converted and
mapped with a single public IP address by using different source ports.
Ex-:
Computer
192.168.100.2
Computer Internet
192.168.100.3
Router
Private Network Public Network
192.168.100.2:80 1.2.3.4:8000
Computer
192.168.100.4
192.168.100.3:80 1.2.3.5:8001
192.168.100.4:80 1.2.3.6:8002
Computer
192.168.100.6
192.168.100.6:80 1.2.3.7:8003
Advantages Disadvantages
Increase flexibility when connecting End-to-end IP traceability is lost.
to the internet.
Provide security by hiding internal IP Certain applications such as VoIP will
address not function well with NAT
Conserves the registered addresses Translation introduces the switching
path delays
Table 1 NAT Overloading Pros & Cons
VPN
A virtual private network links two private networks over a public network such as the Internet.
A VPN is formed by using dedicated connections, virtual tunneling technologies, or traffic
encryption to create a virtual point-to-point connection. Users can transmit and receive data via
shared or public networks as if they were directly linked to the private network, taking advantage
of the private network's functionality, security, and management policies. Traditional VPNs have
a point-to-point architecture, and they don't usually support or link broadcast domains. As a
result, communication, software, and networking dependent on OSI layer 2 and broadcast
packets, such as NetBIOS used in Windows networking, may not be completely supported or
function as expected over a wide-area network. This restriction is addressed by VPN variations
such as Virtual Private LAN Service (VPLS) and layer 2 tunneling technologies. Employees may
safely access the business intranet when away from the office using VPNs. Similarly, VPNs may
securely link an organization's remote offices in different areas of the world, establishing a single
interconnected network via which they can interact safely. In addition, individual internet users
utilize VPN technology to protect their IP addresses and financial activities, as well as to bypass
national and censorship-imposed international internet limitations. [ CITATION Ess15 \l 1033 ]
Figure 17 VPN
o Information is split and written over many physical disk devices. RAID 0 makes
use of this method.
Mirroring
Duplexing
Deferred
o When the disk drive becomes accessible, data is stored in cache memory and
written to the hard drive.
Hot Swapping
o While the rest of the system is operational, failed disk drives can be replaced and
data transferred back to the disk drive.
Hot Sparing
o When one of the disk drives breaks, the array is automatically initialized.
Versions of RAID
RAID 0
Block interleave and software stripping (minimum 2 drives).
For a quicker operation and less possibility of overloading,
data is written to each drive in order, with each block moving
to the next available drive (striping). Of fact, the total volume
might be considerably bigger than any one drive. Because
Figure 18 RAID 0
there is no redundancy, a single drive failure brings the
system to a halt. RAID 0 is the most economical and quickest array type, however it has no fault
tolerance.
RAID 1
Mirroring and duplexing of disks (minimum 2 drives). Drives are used
in pairs, and all data is written to both drives in the same way. By
connecting each drive to its own interface controller, each drive may
be duplexed. The failure of a single drive does not put the system to a
halt. The other drive, on the other hand, continues to work. Of course,
two drives are now used to provide the same amount of storage as one
Figure 19 RAID 1 drive. This level provides no benefit in terms of performance. A wide
range of options for high-performance, fault-tolerant settings.
Furthermore, if just two disks are required for fault tolerance, RAID 1 is the sole option.
RAID 5
Data striping, block interleave, and distributed check
data on all drives For NetWare, this is the one to use.
Data concerning parity may be found on each of the
disks of a hard drive. As the number of drives in a
RAID 5 array grows, so does its efficiency. Hot
spares can be used to repair a failing drive on the fly.
Figure 20 RAID 5
The best option in multi-user settings when write speed
RAID 6
Additional file system that links the physical sectors of a disk
drive to their logical representation in RAID 5 log structured.
Sequentially, information is stored on physical disk sectors.
Figure 21 RAID 6
RAID 10
RAID Description Operation Advantages Disadvantages Recovery
mode
RAID 0 Disks with There are two Large size and No redundancy. In the event that
stripes or more disks the fastest speed. one or more
where the data disks fail, the
is equally array will fail.
distributed.
RAID 1 Disks that are Identical data Even if a single The slowest and In order to
mirrored is stored on disk fails, no smallest disk is recover, only
two or more data will be lost. the one that limits one drive is
hard disks. speed and size. required.
RAID 3 With As well as two Intuitive For numerous In the event of a
committed or more disks, sequential read simultaneous single drive
parity, stripes there is a parity and write commands, there failure, the
drive. operations at is a lack of entire system
high speeds performance. will be re-built
RAID 5 The use of On three or Infinite size and Parity reduces the In the event of a
distributed more drives, power with size of the array as single drive
parity on data is equally redundancy. a whole failure, the
striped disks distributed. entire system
There is a will be re-built
break in parity
between disks.
RAID mirroring It is possible to Larger and faster No parity. In a mirror set,
10 subset striped combine up to than RAID-1, only one drive
four drives into and with more may fail.
a pair of redundancy than
mirrors that are RAID-0,
striped. respectively.
Stripped array with the same fault tolerance as RAID 1 and ssegments that are RAID 1 arrays.
Striping RAID 1 segments allows for high I/O speeds. Excellent option for people contemplating
Caesar Cipher
Ciphers such as the Caesar Cipher are among the earliest and simplest encryption techniques
available. What we have here is an algorithm that replaces each letter of the text with one from
the alphabet at a specific number of positions along the alphabet. With a shift of one, for
example, A would be replaced by B, B by C, and so on. Julius Caesar is said to have called the
technique after himself, as he used it to communicate with his officials. To encrypt a given text,
we require an integer value called shift, which specifies how far down each letter of the text has
been shifted. The encryption may be expressed using modular arithmetic by converting the
letters to integers using the A = 0, B = 1,.. Z = 25 method. A letter can be encrypted using the
following mathematical formula:
k = Shift Value
A B C D E F G H I J K L M N O P Q R S T U V W X
Table 3 Key Table 0 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23
Shift 3 Value
C = (P + k) mod 26
C = (0 + 3) mod 26
C = 3 mod 26
C=3
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
D E F G H I J K L M N O P Q R S T U V W X Y Z A B C
Convert Text – L K D Y H D G R J Q D P H G O D L O D
Shift 5 Value
C = (P + k) mod 26
C = (0 + 5) mod 26
C = 5 mod 26
C=5
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
F G H I J K L M N O P Q R S T U V W X Y Z A B C D E
Convert Text – N M F A J F I T L S F R J I Q F N Q F
Data Replication
Data replication is also defined in a straightforward manner. It's the process of storing data in
several locations or nodes, which is most likely a server, cloud, or hybrid storage solution.
Backups should be replicated to at least one distant server or cloud, as insurance against losing
data due to a successful ransomware or malware attack, or other data calamity. Hybrid backup
solutions take your security to the next level by duplicating your backups to a distant server as
well as the cloud.
Backup Replication
Compared to replication, it's a lot Inexpensive in comparison to Backup
Cost cheaper. Doesn't require a lot of Commercially available platforms and
personnel or infrastructure. solutions can minimize expenses.
An on-site disk, a virtual tape Investing in new business processes,
library, or an internet backup hiring more people as well as upgrading
Requirement
service are all options. the infrastructure.
s
The ability to save archived
material at will.
Compliant criteria and long-term Constant access to apps that are
Ideal for
data storage. mission-critical and customer-facing.
Simplicity of use Concentrate on catastrophe recovery.
Insularity in the face of possible Availability is high.
Benefits
dangers Resuming company activities as
Inexpensive. quickly as possible following a failure
It takes a long time to restore a Costly to keep up with (especially for
backup. long-term storage).
Shortcomings
The data recovery process is Data can be replicated by malicious
lengthy. software.
A data center is a location where many servers with a big service capacity are housed for the
purpose of hosting third-party people or corporate clients for the goal of making money. Server
redundancy, power redundancy, network redundancy, cooling system, disaster recovery, cooling
system availability for server performance, Internet redundancy, and 24/365 connectivity to
servers are all available in data centers. The virtualization of services by data centers has pushed
cloud computing architecture to the next level, meeting contemporary IT needs for client
redundancy, data redundancy, removing clients from client hardware maintenance, and balancing
server loads.
Virtualization
The construction of a non-virtual virtual component that provides the necessary services as a
virtual component is referred to as virtualization. Virtualization creates virtual components on
physical resources using monitoring software. Supervisors split and use physical resources to
build a multi-virtual environment. Virtual machines are used for all activities and processes, and
data is saved to a single file. This allows you to backup and restore your data at any moment. It
even works when the virtual machine's data file is backed up or relocated from one location to
another. As a result, this approach is utilized to host customers in the head office and provide
backup as needed. Virtualization allows us to get the most out of our physical equipment while
lowering our capital and operational expenditures. Rather than having one advanced server for
each service, it is feasible to operate numerous virtual servers with various services.
Figure 23 Virtualization
Importance of Virtualization
Virtualization has been in use in datacenters for more than a decade. Virtualization is a method
of provisioning and sharing resources in datacenters that makes management easier.
Virtualization is used because it allows for the efficient use of resources. Consolidated resources
make it easier to satisfy corporate expectations. IT firms can better adapt to business demands
thanks to virtualization. For example, virtualization leverages a single asset to make it run as if it
were several assets in the case of servers or networks. Virtualization improves asset use and
efficiency, resulting in fewer physical assets. It is not a product, but rather a method for
managing servers, storage, and networks in IT businesses. Virtualization is an abstracted view of
underlying physical components in the case of storage or networks. Several physical disks are
merged in storage and displayed to servers and applications as a single big asset. The server and
application architectures are much simplified as a result. In the case of desktops, virtualization is
utilized to centralize data and application administration while lowering technical labor costs.
Because of its capacity to consolidate resources and manage diverse applications and systems,
virtualization is a popular topic in datacenters. Enterprise systems such as ERP, CRM, and sales
force automation may reap the most benefits from virtualization. Datacenters are designed to
improve service delivery, increase revenues, and lower the risk of new business ventures.
Separating data and workloads from physical infrastructure is done from a functional standpoint
in order to gain efficiency from a variety of perspectives. Companies strive to achieve long-term
company goals at a lower cost and without sacrificing business productivity. Virtualization
allows you to save a lot of money by allowing you to do more with the computer resources you
already have.
Task 03
Task 3.1 Risk Assessment
A security risk assessment finds, evaluates, and applies essential application security measures. It
also emphasizes the prevention of application security faults and vulnerabilities. An enterprise
may evaluate its application portfolio holistically from the standpoint of an attacker by
conducting a risk assessment. It assists managers in making well-informed decisions on resource
allocation, tools, and the implementation of security controls. As a result, completing an
evaluation is an important element of a company's risk management strategy. The depth of risk
assessment models is influenced by factors like as size, growth rate, resources, and asset
portfolio. When faced with financial or time restrictions, organizations might conduct generic
evaluations. Generalized evaluations, on the other hand, may not always include thorough
mappings of assets, related threats, recognized risks, effects, and mitigation mechanisms.
Figure 24 Risk
Evaluate Risks
Some dangers are more serious than others, so you'll need to figure out which ones are the most
pressing at this point. Your risk criteria will come in helpful at this point. It serves as a tool for
comparing risks by providing a score to the chance of occurrence and the potential damage. You
receive a consistent and comparative evaluation of the hazards your organizations face by
analyzing the risks this manner. ISO 27001 does not specify how risks should be rated, whether
from high to low, 1 to 5, 1 to 100, or any other method. It doesn't matter as long as everyone in
charge of risk assessment takes the same approach.
Reduce the chance of the risk occurring and the harm it will cause by implementing
security controls.
Accept that the risk falls within previously defined risk acceptance criteria or make
special actions to keep the risk.
Share the risk with a partner who is better prepared to manage the risk, such as an
insurance company or a third party.
All risks must have an owner who approves any risk treatment plans and accepts the degree of
residual risk, according to ISO 27001. Risk treatment activities may be owned by someone other
than the asset owner.
Risk Identification
Identifying the obstacles that may hinder us from accomplishing our goals.
Risk Analysis
Understanding the sources and causes of the identified risks; analyzing probability and
implications in light of current controls to determine the residual risk level.
Risk Evaluation
Evaluate if the residual risk is manageable, risk analysis findings are compared to risk criteria.
Risk Treatment
Changing the size and likelihood of both good and negative outcomes in order to produce a net
gain in benefit.
ERM examines strategic business choices and the risks that your technology poses to those
decisions. A retail store, for example, may maintain a website that gives product information but
concentrates sales in their physical location. If they wish to broaden their reach and size, they
should start selling their items online as well. ERM entails examining the additional risks to the
company that occur as a result of the change, such as selecting a vendor, managing the vendor,
and new IT compliance needs.
IRM focuses on identifying and assessing the risks associated with your company's technology.
Immediate Risk Management refers to a study and assessment of the retailer's unique
technologies, such as ecommerce or tag management systems, that are connected to their website
for customers' tracking and payment, as well as how these new technologies influence their old
technologies. In this case, the online payment application might connect to an inventory app on a
warehouse employee's smartphone, posing Internet of Things security concerns. IRM is
responsible for integrating the technologies. [ CITATION Kar19 \l 1033 ]
a. Reviewing past audit work papers and public documentation, establishing the
work program, sending the request list, gaining view access to document
repositories, and testing are all part of auditor preparation and research.
2. On site Fieldwork
a. The auditor interviews customers, does testing, receives follow-up requests, has
"End of Day" status meetings, and presents draft results to customers in a "soft"
exit meeting while on-site fieldwork.
a. The completion of testing, the finalization of work documents and the report, and
the documentation of agreed-upon activities, owners, and target dates in the report
are all covered by final testing and report writing.
Project Assurance
The auditor examines the project team's governance, risk management, and control skills to
identify and manage project-related hazards in real time during a Project Assurance. They also
serve as a facilitator, encouraging risk and control discussions throughout the project.
Facilitated Self-Assessment
Working in workshops, a department can examine a process or function's management of risk as
well as internal controls and commit to improving them. Whoever actively recognizes an issue
will be more driven to fix it.
Maturity Models
A Maturity Models approach allows auditors and audit customers to assess the current
effectiveness of a process while also identifying the capabilities required to improve the process
to meet objectives, using standard maturity models such as the Capability Maturity Model
Integration or creating customized models.[ CITATION aud18 \l 1033 ]
Cause-Consequence Analysis
Fault tree analysis and event tree analysis are combined in cause and consequence analysis. It
employs cause and effect analysis, with the goal of identifying the chain of events that leads to
unexpected outcomes. Based on the probability of different events occurring from the CCA
diagram, the probability of different outcomes can be calculated, and the system's risk level can
be determined.
UKEssays. November 2018. Methods of Risk Analysis and Management. [online]. Available
from: https://www.ukessays.com/essays/statistics/risk-analysis-methods.php?vref=1 [Accessed 3
September 2021].
o Clients nowadays want nothing less than excellence and dependability. There is
no tolerance for faults or downtime. Clients will simply walk on to another
service provider if a company fails to satisfy their expectations. Businesses can
maintain a high level of service quality regardless of the conditions thanks to
disaster recovery planning. In the aftermath of an IT disaster, regaining an old
client may be virtually impossible a catastrophic impact that many organizations
have witnessed personally.
o With a Disaster Recovery solution, you can be certain that your systems, services,
and applications will be restored in a timely manner, with considerably lower
RTO and RPO. You may dramatically decrease restoration timeframes based on
your demands utilizing the parameters established in the DR plan, which would
be impossible without the use of a Disaster Recovery solution.
Begin by examining your organization's present IT risks and network vulnerabilities as a first
step toward developing an IT security policy. Do they entail squandering of resources? Is there a
risk of private information being leaked? Regulatory compliance, for example. Having an outside
expert do a vulnerability assessment for your business is an excellent approach to identify your
threats. Internally, this may be accomplished through a combination of monitoring and reporting
technologies as well as talks with important members of each department.
Why recreate the wheel when you can benefit from the experiences of others in your field?
There's a good chance that other companies have previously gone down this road and created IT
security rules. If you work for a nonprofit or an association, the ASAE and NTEN networks are
excellent places to connect with others in your field. There are many resources accessible online
for commercial companies that give information, recommendations, and even templates. For
industry resources, NIST provides excellent materials such as their Cyber Security Framework.
More technical tools and best practices, such as the CIS Controls, are available from the Center
for Internet Security. These controls provide you a prioritized list of steps to take to safeguard
your company and data against known cyber-attacks. Finally, SANS is an excellent resource for
security research, training, and other services.
Provide a series of in-person employee training sessions, either in an all-hands style or by each
department, prior to implementing new security rules. This will provide employees the chance to
understand what the rules are, why they are being adopted, and what the cyber security program's
consequences are for the company. This will also give them ample time before the policies go
into effect to absorb everything and ask any questions or address any issues they may have.
Ensure that all workers have reviewed and signed the new network security policies prior to the
effective date when it comes time to implement them. In addition, make sure that these rules are
signed as part of the new recruit onboarding process. Finally, devise a mechanism for providing
yearly policy refreshers to all employees. This would assist guarantee compliance while also
providing a chance to brief personnel on policy changes.
Your capacity to monitor compliance with security regulations is only as good as your ability to
enforce them. Make sure your IT department or vendor has the tools they need to correctly
monitor the network environment. Consider using monitoring software to keep an eye on
Internet/email content, installed apps, and illegal devices. An effective IT security program has
the necessary technologies in place to correctly monitor security setups.[ CITATION Pay21 \l
1033 ]
Task 04
Task 4.1 Organizational Policies
System Access Policies
Policies
1. Users should have a unique identifier (user ID) for their personal use only, and a suitable
authentication technique should be chosen to substantiate the claimed identify of a user.
Email addresses should not be used as user IDs.
2. Users should be authenticated, either by using user IDs and passwords or by a stronger
authentication mechanism such as proof of possession of private key, knowledge based
authentication solutions or by some other form of secret key solution.
3. Initial temporary passwords shall not be easily associated with the user’s personal
information and it should consists with minimum of 8 characters in length comprised of
letters, numbers, and special characters.
Role of Staff
All login credentials, tokes and rights are confidential and not transferable. Users must
immediately inform the service desk or IT security team on the information system and security
breach or of foul play with regard to IT systems. Users must not circumvent or attempt to
circumvent system protection features. Users shall not knowingly use any system to produce
system failure or degraded performance. Users shall not use computer resources for private
purposes, including but not limited to the use or computer resources for profit making or illegal
purposes.
Staff Role
Staff grades below Assistant Vice President should submit the request to It department through
the respective head of department with the approval from head or HR prior to granting the
facility. The management has the authority to determine what constitutes appropriate use and
may deny, revoke, suspend or terminate any employee’s internet access bases upon its
determination of inappropriate use. Users should exercise caution in using email to communicate
confidential or sensitive matters and are expected to conduct themselves professionally when
using company email system. Users shall refrain from copying emails containing sensitive
information to group of people other than intended recipients.
Policies
1. Abusive, unethical or inappropriate use of internet is considered grounds for disciplinary,
legal and punitive action including termination or employment.
2. Users shall refrain from using public cloud storage services, file sharing and web mail
facilities through company IT infrastructure. The only internet based storage service can
be used by company employees to store official data is the G-suite service provided by
the company.
3. Employees shall not deviate from using web browsers other than company provided
browsers.
Staff Role
Employees should not use the internet to gambling, playing games, audio video streaming,
download and install any form of software without approval from IT department. Staff shall not
attempt to bypass the monitoring system by installing or using software that bypasses the internet
filtering system or through any other method. Users shall not install any personal devices such as
but not limited to wireless broadband modems to directly access the internet. Staff shall not use
the internet to make offers to sell or buy products from fraudulent websites or to advance any
type of financial scams and unregistered sales or securities.
Policies
1. Only software authorized by the company may be purchased, installed, or used on
company issued computers.
2. Personal software, or software that an employee has acquired for non-business purposes,
may not be installed on company issued computers. The only software that can be
installed on corporate computers is licensed software.
3. To purchase, install, and/or use only software that has been authorized for use on
company computers.
Staff Role
Users should obtain a proper documentation for all work-related software purchases. Users are
prohibited from reproducing or duplicating software in any form, except as permitted under the
licensing agreement between the firm and the software provider. A copy of the software license
must be provided to the department for completion of registration and inventory requirements.
Licenses must be registered in the name of company and not in the name of an individual end-
user.
Staff Role
A facility's emergency protocols must be taught to anybody who is allowed access privileges,
and they must sign the necessary access and non-disclosure agreements. Sharing or lending
access cards and/or keys is strictly prohibited. Anyone who no longer need access cards and/or
keys to the information resources and technology facility must return them to them. To avoid the
return procedure, cards may not be transferred to another individual.
Staff Role
The company and designated staff are responsible for implementing this policy. The executive
steering committee and human resources fully endorse this policy. This policy is a dynamic
document that the IT manager, human resources, or the executive steering committee may
change at any moment. This policy is overseen by the Chief Information Officer, who has overall
accountability and authority. This policy's execution is the responsibility of the Business
Manager ICT. This policy, as well as the accompanying agreements, standards, and guidelines,
will be familiarized and followed by all third-party users of Council information assets.
1. De Facto = De Facto standards are the standards that are followed without any approval
by any standards organization.
2. De Jure = De Jure standards are the standards that are build up by any officially
recognized standards organization. Currently, the majority of communication standards in
use are de jure standards.
References
aimconsulting, 2018. 6 Steps for Building Your Enterprise Disaster Recovery
Plan. [Online]
Available at: https://aimconsulting.com/insights/6-steps-for-building-your-
enterprise-disaster-recovery-plan/
[Accessed 04 September 2021].
D'mello, A., 2019. Five benefits of cyber security risk assessment. [Online]
Available at: https://www.iot-now.com/2019/07/08/97141-five-benefits-
cyber-security-risk-assessment/
[Accessed 27 August 2021].
getanp, 2021. What is a technology audit and why does your business need
one?. [Online]
Available at: https://www.getanp.com/blog/45/what-is-a-technology-audit-
and-why-does-your-business-need-one.php
[Accessed 27 August 2021].