Asm2 1623
Asm2 1623
Asm2 1623
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P5 P6 P7 P8 M3 M4 M5 D2 D3
Summative Feedback: Resubmission Feedback:
Figure 1: Assets
Definition of threats:
In cybersecurity, the most common understanding of a threat is anything that
could exploit a vulnerability, which could affect the confidentiality, integrity or
availability of your systems, data, people and more. (Confidentiality, integrity
and availability, sometimes known as the CIA triad, is another fundamental
concept of cybersecurity.)
➢ Identify assets.
➢ Assess risks.
• Step 3: Evaluate the risks and develop control measures. A risk analysis
can help identify how hazards will impact business assets and the
measures that can be put into place to minimize or eliminate the effect
of these hazards on business assets. Potential hazards include property
damage, business interruption, financial loss and legal penalties.
Data protection is the process of protecting data and involves the relationship
between the collection and dissemination of data and technology, the public
perception and expectation of privacy and the political and legal underpinnings
surrounding that data. It aims to strike a balance between individual privacy
rights while still allowing data to be used for business purposes. (Rouse, 2022)
• Confidentiality
Confidentiality means that only authorized individuals/systems can view
sensitive or classified information. The data being sent over the network
should not be accessed by unauthorized individuals. The attacker may
try to capture the data using different tools available on the Internet
and gain access to your information. A primary way to avoid this is to
use encryption techniques to safeguard your data so that even if the
attacker gains access to your data, he/she will not be able to decrypt it.
Encryption standards include AES(Advanced Encryption Standard) and
DES (Data Encryption Standard). Another way to protect your data is
through a VPN tunnel. VPN stands for Virtual Private Network and helps
the data to move securely over the network.
• Integrity
The next thing to talk about is integrity. Well, the idea here is to make
sure that data has not been modified. Corruption of data is a failure to
maintain data integrity. To check if our data has been modified or not,
we make use of a hash function.
We have two common types: SHA (Secure Hash Algorithm) and
MD5(Message Direct 5). Now MD5 is a 128-bit hash and SHA is a 160-
bit hash if we’re using SHA-1. There are also other SHA methods that
we could use like SHA-0, SHA-2, and SHA-3.
• Availability
This means that the network should be readily available to its users.
This applies to systems and to data. To ensure availability, the network
administrator should maintain hardware, make regular upgrades, have a
plan for fail-over, and prevent bottlenecks in a network. Attacks such as
DoS or DDoS may render a network unavailable as the resources of the
network get exhausted. The impact may be significant to the companies
and users who rely on the network as a business tool. Thus, proper
measures should be taken to prevent such attacks. (geeksforgeeks,
2023)
Figure 3: CIA Triad
AAA
• Authentication
The process by which it can be identified that the user, which wants to
access the network resources, valid or not by asking some credentials
such as username and password. Common methods are to put
authentication on console port, AUX port, or vty lines.
As network administrators, we can control how a user is authenticated if
someone wants to access the network. Some of these methods include
using the local database of that device (router) or sending
authentication requests to an external server like the ACS server. To
specify the method to be used for authentication, a default or
customized authentication method list is used.
• Authorization
It provides capabilities to enforce policies on network resources after the
user has gained access to the network resources through authentication.
After the authentication is successful, authorization can be used to
determine what resources is the user allowed to access and the
operations that can be performed.
• Accounting
It provides means of monitoring and capturing the events done by the
user while accessing the network resources. It even monitors how long
the user has access to the network. The administrator can create an
accounting method list to specify what should be accounted for and to
whom the accounting records should be sent. (saurabhsharma56, 2021)
Figure 4: AAA
GDPR
The General Data Protection Regulation (GDPR) is legislation that updated and
unified data privacy laws across the European Union (EU). GDPR was approved
by the European Parliament on April 14, 2016 and went into effect on May 25,
2018.
The purpose of the GDPR is to protect individuals and the data that describes
them and to ensure the organizations that collect that data do so in responsible
manner. The GDPR also mandates that personal data is maintained safely; in
part, the regulation says personal data must be protected against "unauthorized
or unlawful processing, and against accidental loss, destruction or damage."
(Castagna, 2021)
Figure 5: GDPR
• Define sensitive data: Sensitive data is any data that, if lost, stolen, or
exposed, could financially hurt your organization, cause reputational
damage, or harm the data owner. The first step in creating a data
protection program is to determine which information your organization
collects meets the definition of sensitive. This will clarify exactly which
data needs to be protected and the legal regulations that cover it.
• Know which sensitive data regulations you are subject to: Compliance is
the other major factor influencing the policies and tools you implement
to protect your organization’s data. For example, storage practices must
include encryption and firewalls to comply with data privacy regulations.
They also call for access controls and audit logs to trace data use and
sharing back to an individual. Lastly, regulations often require data to
be disposed of in a timely and secure manner, so policies need to be
implemented to ensure compliance.
• Decide who can access the information: Access to sensitive data should
only be given to employees needing it to fulfil their job responsibilities.
To ensure this, require authentication and authorization permissions to
access certain data. All authenticated individuals should have permission
roles assigned to them. Not everyone needs modification abilities, and
only those requiring this access should be allowed. Assigning roles such
as viewer, editor, and administrator can help limit opportunities for
sensitive data misuse.
• Plan to organize the data you want to protect: To protect data and meet
compliance requirements, you must classify data according to its level of
sensitivity. Classification systems help you set those use and
modification access controls we mentioned earlier, acting as a natural
next step to protect data once discovery is complete. Classification
schemes you can use include role-based, dataoriented, access- or
location-based, and hybrid. Most organizations categorize or bucket data
as variations of a four-level data classification schema — public, private,
confidential, and restricted. (SPIRION, 2021)
Discussion on policies:
1) Human resource policy (HR):
HR policies are a written source of guidance on how a wide range of issues
should be handled within an organization. They include a description of
principles, rights and responsibilities for managers and employees. They play
a key role in supporting fairness and consistency across an organization, as
well as potentially helping to protect the organization against legal claims.
However, no matter how well any policy is written, it’s their effective
communication and implementation, particularly by line managers, that’s
crucial in ensuring their effectiveness.
HR policies provide general and practical advice and guidance for managers
and staff on a range of employment issues. (FACTSHEET, 2022)
Policy Example
Human Resource Policy • Employees must comply with all
applicable laws, regulations, and
company policies relevant to their
job responsibilities.
• Any illegal activities or actions that
violate laws or regulations may
lead to disciplinary action,
including termination of
employment.
• company information, customer
data, and any proprietary or
classified information.
• Unauthorized disclosure, misuse,
or access to confidential
information is strictly prohibited
Incidence Response Policy • All employees must promptly
report any suspected or observed
security incidents to the designated
incident response team or the IT
department.
• Incidents should be reported
through the official incident
reporting channels, ensuring that
necessary details, such as the
date, time, location, and
description of the incident, are
provided.
• Incidents will be classified based
on severity and potential impact to
prioritize response efforts.
• Incident classification levels, such
as low, medium, and high, will be
defined, with corresponding
response actions for each level.
Disaster Recovery Policy • Regular backups of critical data will
be performed and stored in secure
off-site locations.
• Backup procedures will be
documented, including the
frequency of backups, storage
locations, and verification
processes.
• Procedures for data restoration will
be established and regularly tested
to ensure data integrity and
accessibility during recovery.
Security Policy • Access to information systems,
networks, and data will be granted
based on the principle of least
privilege, ensuring that users have
only the necessary access rights
for their job functions.
• User accounts and access
privileges will be regularly
reviewed and revoked promptly
upon termination of employment or
contract.
• Confidential and sensitive data will
be protected using appropriate
encryption methods during
storage, transmission, and
processing.
Acceptable use policy • Do not use someone else's
account or share personal
accounts with others.
• Do not install or use unauthorized
software or software without proper
licensing.
• Do not perform any actions that
may cause harm to the system,
such as network attacks or virus
infections.
The most and should that must exist while creating a
policy.
When your policy contains the following characteristics, you know it's good:
• Establish the policy's scope: Clearly define the boundaries of the policy and
ensure that it covers all relevant areas.
• Develop the policy: Create a clear, concise, and easily understandable policy
document that meets the requirements.
• Conduct policy review: Review the policy to ensure compatibility with existing
policies and alignment with corporate goals.
• Seek feedback: Share the proposed policy with stakeholders and incorporate
their input and suggestions as appropriate.
• Obtain approval: Seek approval from top management after reviewing the
policy and making any necessary revisions.
• Monitor compliance: Regularly monitor compliance with the policy and take
corrective action if needed.
• Review and update: Periodically review and update the policy to maintain its
relevance and effectiveness.
The most basic business continuity requirement is to keep essential functions up and
running during a disaster and to recover with as little downtime as possible. A
business continuity plan considers various unpredictable events, such as natural
disasters, fires, disease outbreaks, cyberattacks and other external threats.
Business continuity is important for organizations of any size, but it might not be
practical for any but the largest enterprises to maintain all functions for the duration
of a disaster. According to many experts, the first step in business continuity planning
is deciding what functions are essential and allocating the available budget
accordingly. Once crucial components have been identified, administrators can put
failover mechanisms in place. (Sullivan, 2020)
• Take Inventory of IT Assets: You’ll first need to map out all your assets to
identify which will need protection. Assets might include Network equipment,
Hardware, Software, Cloud services, Critical data Building a list of assets,
though tedious, will allow for a comprehensive understanding of your
business’s systems. Update your list regularly as assets are added, removed,
or modified, and use it as an opportunity to clean out unnecessary data.
• Sort Assets According to Criticality and Context: Now that you’ve taken
inventory of your assets, you need to look at them contextually. How does
your business use these assets? In the case of a disaster, which assets would
have the most significant impact if compromised or lost? Go through all your
mapped assets and classify them according to impact, from high to low.
• Assess Potential Risks: Not all threats are created equal. What are the biggest
threats to your business as a whole? Which assets are these threats likely to
target? Critical systems staff are knowledgeable about the most likely
potential causes of service disruption, so getting their input at this stage is
invaluable. You can’t anticipate all potential threats, but you can build an
effective plan by weighing the probability and scale of each.
• Define Your RTO and RPO: Recovery objectives should be categorized into
recovery time objectives (RTO) and recovery point objectives (RPO). RTO
refers to the amount of time your assets can be down before recovery, and
RPO refers to how much data you are willing to lose. These objectives should
be defined in the early stages of your disaster recovery plan so that a proper
setup can be chosen accordingly.
• Select A Disaster Recovery Setup: Having a remote data storage solution is
essential to protect your assets from cyber-attacks and natural disasters that
may physically damage your assets. With your required setup mapped out,
select the cloud services, software, hardware, and partners that you’ll need to
achieve this setup.
• Test and Review: In the final stage, the disaster recovery plan will need to be
tested and reviewed to ensure it’s ready. All staff members must understand
what their role is in the case of an actual disaster. Conduct a disaster drill to
test the plan itself and analyse how staff act and respond to the threat. If it
doesn’t go as smoothly as you’d like, modify the plan accordingly. (GUERRA,
2020)
Here are seven essential steps to creating a successful disaster recovery plan.
You’ll need a good mix here, so consider choosing people who can bring a
variety of perspectives on the company’s vulnerabilities to the table. Make
sure you include representatives from all the main departments within your
business, including HR, facilities and high-level managers.
During a critical incident, this will help your whole team understand who’s in
charge in the chaos that may ensue after a disaster has taken place.
For example, if your usual premises are unavailable, you’ll need to consider if
employees can work from home or if you can share the facilities of another
company temporarily. Your top priority may well be keeping your revenue
flowing, in which case you’ll need to consider what people, equipment, space,
supplies, or services are needed to avoid any downtime?
• Alternate Site and Facility Procedures: These procedures guide the shift
to other sites or facilities when the principal site or facility is unavailable. They
describe how to relocate activities, put up interim infrastructure, and ensure
the availability of critical resources.
• Training and Awareness Procedures: During a disruptive incident, these
processes guarantee that personnel are fully briefed on business continuity
policies, procedures, and their roles and responsibilities. They establish the
training needs, timing, and delivery methods. They also handle awareness
initiatives to foster an organizational culture of company continuity.
Conclusion.
In summary, in this exercise, I discussed key topics such as the risk assessment
process, explained data protection procedures and regulations as they apply to an
organization, and the design and implementation of data protection regulations.
declares the organization's security policy, lists the key components of the
organization's disaster recovery plan, and demonstrates their inclusion.
References
adserosecurity, 2023. SECURITY RISK ASSESSMENT. [Online]
Available at: https://www.adserosecurity.com/security-learning-center/what-is-a-security-
risk-assessment/
[Accessed 18 06 2023].
bluevoyant, 2023. What is an Incident Response Policy and How to Create One. [Online]
Available at: https://www.bluevoyant.com/knowledge-center/what-is-an-incident-response-
policy-and-how-to-create-one
[Accessed 18 06 2023].
cloudian, 2023. Disaster Recovery Policy: Essential Elements and Best Practices. [Online]
Available at: https://cloudian.com/guides/disaster-recovery/disaster-recovery-policy-
essential-elements-and-best-practices/
[Accessed 18 06 2023].
Cole, B., 2023. What is risk management and why is it important?. [Online]
Available at: https://www.techtarget.com/searchsecurity/definition/risk-assessment
[Accessed 18 06 2023].
GUERRA, B., 2020. 7 Components That Make A Great Disaster Recovery Plan. [Online]
Available at: https://www.axiom.tech/7-components-that-make-a-great-disaster-recovery-
plan/
[Accessed 18 06 2023].
Kidd, C., 2022. Security 101: Vulnerabilities, Threats & Risk Explained. [Online]
Available at: https://www.splunk.com/en_us/blog/learn/vulnerability-vs-threat-vs-risk.html
[Accessed 18 06 2023].
Sullivan, E., 2020. What is business continuity and why is it important?. [Online]
Available at: https://www.techtarget.com/searchdisasterrecovery/definition/business-
continuity
[Accessed 18 06 2023].