ASM2 Security
ASM2 Security
ASM2 Security
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Grading grid
P5 P6 P7 P8 M3 M4 M5 D2 D3
Summative Feedback: Resubmission Feedback:
Risk can also be defined as follows: Risk = Threat x Vulnerability x Consequence. Reduce your potential
for risk by creating and implementing a Risk management plan. Here are the key aspects to consider when
developing your risk management strategy:
• Determine risk and requirements. Prioritizing the most significant breaches that must be handled is vital
when establishing and executing a risk assessment strategy. Although the frequency varies each
organization, this level of evaluation must be performed on a regular, repeating basis.
• Include a comprehensive stakeholder perspective. Stakeholders include business owners, staff, consumers,
and even vendors. All of these players have the ability to harm the organization (possible risks), but they
may also be useful in mitigating risk.
• Determine the proper financing amount for this activity and assign responsibility for risk management to
a core group of staff.
• Implement relevant policies and procedures, and ensure that any changes are communicated to the
appropriate end-users.
• Policy and control efficacy should be monitored and evaluated. Because the sources of risk are always
changing, your team must be ready to make any required changes to the framework. This may also entail
implementing new monitoring tools and methodologies.
2. Define assets, threats and threat identification procedures, and
give examples
2.1. Asset
An asset is any data, device, or other component of the environment that supports informationrelated
activities in information security, computer security, and network security. Hardware (e.g., servers and
switches), software (e.g., mission important applications and support systems), and private information are
examples of assets. Assets should be safeguarded against unauthorized access, use, disclosure, alteration,
destruction, and/or theft, which might result in loss to the organization.
Types of asset:
• Information assets:
This category includes all information regarding your organization. This data has been collected,
categorised, arranged, and stored in a variety of formats. Databases include data on your customers,
employees, production, sales, marketing, and finances. This information is important to your company's
success. Its secrecy, integrity, and availability are critical.
Data files: Transactional data that provides current information on each occurrence. Procedures for
operational and support: These have evolved over time and include thorough instructions on how to carry
out various operations.
Information from the past: Old information that may be required by law to be kept. Continuation plans and
fallback preparations would be devised to overcome any calamity and ensure company continuity. In the
absence of these, ad hoc decisions will be made during a crisis.
• Software assets:
Application software: Application software executes the organization's business rules. The development of
application software takes time. The integrity of application software is critical. Any defect in the application
software might have a negative influence on the business.
System software: An enterprise would invest in a variety of packaged software applications such as
operating systems, database management systems (DBMS), development tools and utilities, software
packages, office productivity suites, and so on.
• Physical assets: These are the visible and tactile items that may include:
Computer hardware: mainframe computers, servers, desktop computers, and laptop computers.
Modems, routers, EPABXs, and fax machines are examples of communication equipment. Magnetic tapes,
disks, CDs, and DATs are examples of storage medium. Power supply and air conditioners are examples of
technical equipment. Fixtures and furniture.
2.2. Threat
There are several risks out there, ranging from criminals sponsored by states, businesses, hackers, and even
those inside your own organization, to lone attackers. Motives for these threats include financial or political
gain, business or government espionage, and military benefit.
A threat that is repeated in response to a fresh or newly found occurrence that has the potential to harm a
system or your organization as a whole. Threats are classified into three types:
• Spyware, malware, adware corporations, or the activities of a dissatisfied employee are examples of
intentional dangers.
• Analyzing and comprehending the threat portfolio unique to your firm and its operations.
• Prioritizing the assessment of your system's vulnerabilities.
• determining how certain threat actors or behaviors may exploit those vulnerabilities
• Providing a full report of results that helps your firm to execute risk management activities in advance.
The depth of risk assessment models is affected by factors like as size, growth rate, resources, and asset
portfolio. When faced with money or time restrictions, organizations might conduct generic evaluations.
Generalized assessments, on the other hand, may not always give thorough mappings between assets, related
threats, recognized risks, effects, and mitigation mechanisms.
3.1. Identification
Determine all of the technological infrastructure's important assets. Next, examine the sensitive data
generated, held, or sent by these assets. Make a risk profile for each one.
3.2. Assessment
Implement a strategy for assessing the identified security threats for important assets. Determine ways to
effectively and efficiently deploy time and resources to risk reduction after comprehensive review and
assessment. The assessment technique or strategy must examine the relationship between assets, threats,
vulnerabilities, and mitigating controls.
3.3. Mitigation
Define a risk mitigation strategy and implement security measures for each risk.
3.4. Prevention
Implement tools and practices to reduce the likelihood of threats and vulnerabilities occurring in your firm's
resources.
• Risk Identification: It is the process of determining what, where, when, why, and how something may
impair a company's capacity to function. For example, a company in central California would list "the
likelihood of wildfire" as an event that could disrupt operations.
• Risk Analysis: This phase entails determining the likelihood that a risk event will occur as well as the
probable outcomes of each occurrence. Using the California wildfire as an example, safety managers may
examine how much rain fell in the previous 12 months and the level of damage the organization could suffer
if a fire broke out.
• Risk Evaluation: Risk evaluation assesses the amount of each risk and ranks them based on prominence
and consequence. For example, the consequences of a potential wildfire may be balanced against the
consequences of a potential mudslide. Whichever event is assessed to have a larger likelihood of occurring
and causing harm ranks higher.
• Risk Management: Risk management is also known as risk response planning. Based on the estimated
value of each risk, risk mitigation techniques, preventative treatment, and contingency plans are developed
in this stage. In the case of a wildfire, risk managers may decide to keep extra network servers offsite so that
corporate activities may continue even if an onsite server is damaged. Employee evacuation plans may also
be developed by the risk management.
• Risk Monitoring: It is a continuous process that adjusts and develops over time. Repeating and
continuously monitoring the procedures can assist ensure that all known and unknown hazards are covered.
1. Data protection
Data protection is the process of preventing critical information from being corrupted, compromised, or lost.
As the quantity of data generated and saved continues to expand at unprecedented rates, the need for data
protection grows. There is also minimal tolerance for downtime, which might make access to critical
information impossible. As a result, ensuring that data can be recovered rapidly after corruption or loss is
an important aspect of a data protection strategy. Data protection also includes safeguarding data against
compromise and preserving data privacy. (Crocetti, n.d.)
• Data protection may be accomplished through the use of storage technologies such as a disk or tape backup,
which replicates specified information to a disk-based storage array or a tape cartridge device so that it can
be safely kept. Mirroring may be used to generate an exact clone of a website or files so that they are
accessible from many locations. Storage snapshots can produce a collection of pointers to information saved
on tape or disk automatically, allowing for speedier data recovery, whereas continuous data protection
(CDP) backs up all data in a business anytime a change is made.
The term data loss prevention (DLP) refers to safeguarding companies against both data loss and data
leakage prevention. Data loss refers to an occurrence in which critical corporate data is lost, such as in a
ransomware attack. Data loss prevention focuses on preventing data from being transferred outside the
corporate bounds.
• Protect Personally Identifiable Information (PII) and comply with relevant regulations
• Secure mobile workforce and enforce security in Bring Your Own Device (BYOD) environments
The GDPR "advises" but does not mandate pseudonymization. However, if a security event happens,
investigators will look at whether the firm responsible for the breach has adopted these sorts of technological
controls and technology.
Third, data protection rules are required to ensure fair and consumer-friendly commerce and service
offering. Personal data protection legislation create a system in which, for example, personal data cannot be
freely traded, giving consumers more control over who makes them offers and what type of offers they
make.
Security policies are crucial because they safeguard an organization's physical and digital assets.
They identify all of the company's assets as well as any risks to those assets.
• Physical security rules are designed to safeguard a company's physical assets, such as buildings and
equipment, such as computers and other IT equipment. Data security rules safeguard intellectual property
from expensive incidents such as data breaches and data leaks.
Physical security rules safeguard an organization's physical assets, which include buildings, cars,
inventories, and machinery. IT equipment such as servers, computers, and hard drives are examples of these
assets.
IT physical asset protection is very critical since physical equipment carry firm data. If a physical IT asset
is compromised, the data it stores and manages is jeopardized. To keep firm data safe, information security
policies rely on physical security standards.
Why Should Security Policies Be Implemented?
Breach of security is unavoidable. Critical judgments and defensive actions must be made quickly and
precisely. A security policy specifies what must be done to safeguard data kept on computers. A well-written
policy defines the "what" to accomplish so that the "how" may be recognized, assessed, or evaluated.
Without a security policy, any company is vulnerable to the outside world. It is vital to note that in order to
define your policy requirements, you must first do a risk assessment. This may need an organization defining
levels of sensitivity for information, processes, procedures, and systems.
• In the case of dedicated server access, an application proxy firewall must be installed between the remote
user and the dedicated server to conceal the server's identity.
• Second, if traffic filtering is required based on source and destination IP/Port addresses, packet-filtering
firewall placement is highly beneficial and improves transmission speed.
• When speed is not an issue, state table (stately inspection firewall) filters configuration at the network is a
good choice since it dynamically checks the connection and passes the packet.
• Furthermore, NAT should be used because it supplements the usage of firewalls in providing an additional
level of security for an organization's internal network, particularly in avoiding DDOS or multiple SYN
flooding assaults.
• IP packet filtering can be used if you want a higher level of control than that provided by prohibiting an
IP address from talking with your server.
3. Give the must and should that must exist while creating a policy
• Make certain that there is a policy on policies.
A basic policy on policies that specifies the organization's procedure for developing new policies is an
important initial step in policy maturation. This "meta policy" should include instructions on what conditions
necessitate the creation of a new policy, the structure for new policies, and the approval procedure for new
policies. Without a policy development process and structure, you risk severe variation in results and
inconsistency in creation, which can lead to poor or difficult enforcement.
• Determine whether there is any overlap with existing policies.
This one is straightforward. Check to determine whether the policy you intend to write already exists or if
pieces of it exist in other policies before creating a new one. If this is the case, consider tweaking current
policies rather than developing whole new ones.
Policies, in my opinion, should be designed with input from people who will be affected by them. While the
final policy may not represent all perspectives, it is critical that all stakeholders be heard in order to reduce
the possibility of unexpected consequences. Furthermore, policies must be thorough, and various
perspectives can assist fill any holes that may emerge.
Is it your intention to create a policy because one is required, or because someone did something you didn't
like? There is a significant difference, and I have seen policies implemented out of spite and retaliation.
Obviously, such behavior would not occur in a rational company. However, it will not happen in a company
that has a tight policy on policies, since the policy will normally go through numerous layers of approval,
and somewhere along the road, someone will stand back and ask, "Why do we need this?"
Because policies are designed to produce egalitarian circumstances, this is the argument that may face the
most criticism. However, I feel that certain policies should leave some ambiguity in order for individuals to
make judgments. That is not to suggest that the policy should just let individuals to do anything they want,
but there appear to be far too many occasions when people are allowed to use "that's policy" or "zero
tolerance" excuses to avoid doing the right thing.
When feasible, I stressed the necessity to define an exceptions mechanism for policies. That was the CEO's
responsibility in one organization I worked for. That was, frankly, a waste of his time. The exceptions
procedure should enable someone inside the business to handle exceptions. Except as required by rule or
law, the designated individual does not need to be a VP or the CEO. Also, don't expect top executives to
create every policy. However, the leadership team should be in charge of examining new policies before
they go into effect.
4. Explain and write down elements of a security policy, including the main components of an organisational
disaster recovery plan
A security policy may be as comprehensive as you want it to be, but it must be enforced in its whole,
including everything from IT security to the protection of connected physical assets. The following list
contains some critical factors to consider while building an information security policy. Purpose:
• Detect and avoid information security breaches such as network usage, data, applications, and computer
systems.
• Maintain the organization's reputation while adhering to ethical and legal obligations.
• Customer rights must be respected, including how to respond to noncompliance inquiries and complaints.
Audience: Define the security group to which the Security Policy applies. You can also define which
audiences are not covered by the policy (for example, personnel in another business unit that controls
security independently may not be covered by the policy).
• Individuals with access to data and information assets must maintain confidentiality.
• Data should be intact, correct, and complete, and IT systems should be kept operational.
• A senior manager may have the authority to decide with whom and what data can be shared
in a hierarchical manner. A senior manager's vocabulary for security rules may differ from that of a junior
employee. The policy should define the amount of power over data and IT systems for each organizational
role.
• Users can access corporate networks and servers only through specialized logins that require
authentication, such as passwords, biometrics, ID cards, or tokens. You should monitor all systems and log
all attempts to log in.
Data classification: The policy should categorize data into categories such as "top secret," "secret,"
"confidential," and "public." Your goal in categorizing data is to:
• guarantee that sensitive material is not accessible to those with lesser clearance levels;
• secure very important data while avoiding unnecessary security procedures for inconsequential data.
• Data security legislation – systems that hold personal or sensitive data must be safeguarded in accordance
with operational guidelines, best practices, industry enforcement requirements, and relevant regulations.
Encryption, a firewall, and virus protection are among the security needs.
• Data backup-encrypt data backup in accordance with industry best standards. Securely store media, or
migrate backup to safe cloud storage.
• Only data communication over secure protocols is allowed for file movement. Encrypt all information
copied to portable devices or delivered over a public network.
• Social engineering—emphasize the hazards of social engineering assaults (such as phishing emails).
Employees should be held accountable for detecting, preventing, and reporting such assaults.17
• Clean desk policy—use a cable lock to protect computers. Documents that are no longer needed should be
shredded. Keep printer locations tidy to avoid papers falling into the wrong hands.
• Internet usage policy that is acceptable—define how the Internet should be regulated. Do you allow
YouTube and other social media websites? Using a proxy, you may block undesirable websites.
Responsibilities, rights, and duties of personnel: Appoint personnel to do user access checks, education,
change management, incident management, security policy execution, and periodic updates. As part of the
security policy, responsibilities should be clearly specified.
The first stage in policy design is to formulate the problem to be addressed in order to legitimize it as a
community-wide concern. Typically, the public raises a problem in response to a need or a gap in service
delivery. The investigation of current policies to identify how they have dealt with the problem/issue to date
is therefore a useful starting point. Furthermore, identifying the stakeholders and actors affected by the issue
aids in understanding the magnitude of the problem and who to involve in collaborative problem-solving.
Once the problem has been recognized, the hypotheses have been proven, and the goals and objectives have
been determined and discussed with the greater community, policy formulation may begin. Policy
formulation seeks to identify and mobilize a set of solution alternatives in connection to the issue, with the
goal of determining which option is best suited to handle the problem in light of available resources and
current restrictions. The creation of scenarios (both written and visual) can aid in the comprehension and
development of alternate methods and actions.
Once scenarios are created to reflect several policy alternatives for dealing with the identified problem, the
optimal option in terms of strategies and actions may be selected. Scenarios analysis also includes the
(re)tuning of current policy acts, which is done through short experiments (pilot tests) and public debate.
On-the-ground experiments often aim to test various solutions on a small scale in order to determine
potential implications, which may be a time-consuming and costly operation. In many circumstances, it may
be able to simulate visualisations for various policy alternatives in order to investigate the implications
digitally.
Figure 9: Scenario Evaluation
To make a decision, a clear description of the problem, the policy and its scenario, and public acceptance of
the policy must be prepared for presentation and discussion within the public unit accountable for the
decision. The process narrative is relevant to the decision: how the problem was explored, how data was
collected and used, how goals and objectives were identified and translated into strategies and actions, how
impacts were simulated and computed, why some options were preferred over others, and what the public's
contribution to the entire process was. When a decision has been made and the policy is ready for
implementation.
Figure 10: Make a decision
1. Define stakeholders
Business continuity refers to an organization's capacity to keep vital functions running during and after a
crisis. Business continuity planning sets risk management methods and procedures with the goal of
preventing disruptions to mission-critical services and re-establishing full organization operation as fast and
easily as feasible. The most fundamental requirement for business continuity is to maintain critical functions
operational during a crisis and to recover with as little downtime as possible. Natural catastrophes, fires,
disease outbreaks, cyberattacks, and other external hazards are all included in a business continuity strategy.
(Sullivan, n.d.)
Figure 11: Business continuity
Business continuity is critical for firms of all sizes, but it may not be feasible for any but the largest
enterprises to sustain all services during a crisis. Many experts believe that the first stage in business
continuity planning is determining which operations are critical and allocating the available funds
appropriately. Administrators can implement failover solutions after critical components have been
identified.
Digital business interruptions are caused by a range of situations. Just because you are not at danger of a
certain apocalyptic calamity does not mean that countless other incidents will not knock you offline:
• Network Disruptions
• Cybersecurity
• Human error
2. What are their roles in an organization?
Plan of communication and role allocations
• When dealing with a disaster, communication is essential. A strategy is vital because it guarantees that all
employees are on the same page and that all correspondence is clearly defined.
• Employee contact information should be updated in documentation, and staff should understand their
responsibilities in the days after the incident. If you don't have any type of technological equipment to assist
you sort everything out, duties like setting up workstations, analyzing damage, diverting phones, and other
activities would be required.
• When a large storm is approaching, it is critical that you have a strategy in place to safeguard your
equipment. All equipment must be taken off the floor, relocated to a room with no windows, and securely
wrapped in plastic so that no water may get to it. Clearly, completely sealing equipment is the best way to
protect it from flooding, but in many circumstances of severe flooding, this is not a problem.
Backup verification
• As part of your disaster preparation approach, ensure that your backup works and that you conduct an extra
full local backup on all servers and data. Run them as far in advance as feasible, and make sure they are
backed up to a place that will not be affected by the disaster. It's also a good idea to have your backup on an
external hard drive that you can carry with you if something goes wrong, just in case.
• After a storm, you'll want to keep running as quickly as possible. As part of your plan, make sure you
provide contact information for vendors. Check with your local power provider to determine the risk of
power spikes or outages while the region is being fixed. You should also check with your phone and internet
providers for repair and access.
The first stage is to choose the members of your contingency planning team.
You'll need a solid mix here, so look for people who can bring a range of viewpoints on the company's
weaknesses to the table. Include representatives from all of your company's major departments, including
HR, facilities, and top-level executives.
Next, make a list of all workers' names, as well as all ways of communication for each one, and keep it up
to date. You may need to retrieve this information fast, so it must be correct. Personal and professional
contact information should be included in communication.
A system disaster is an extremely stressful situation. This implies that a clear chain of command and
authority must be established ahead of time to ascertain who is in control if and when important employees
go missing.
During a crucial crisis, this will assist your whole team realize who is in command in the pandemonium that
may erupt following a calamity.
Your 'Strategy B' planning is when you consider what will happen if your primary disaster recovery plan is
rendered ineffective.
Data loss may have a significant impact on your company. Data protection and recovery are critical
components of any disaster recovery plans, thus keeping them up to date will result in strong business
continuity.
We recommend that you conduct frequent testing drills to ensure that your new disaster recovery strategy is
functional. And scheduling frequent recovery simulations assures that your systems are operational before
the CEO – and your customers – notice!
Critical functions are those that are necessary to life, health, safety and security of the campus community.
These functions must continue at a normal or increased level during an incident. The life, health, safety and
security functions will never close and will always require people on campus.
For the purpose of this policy, the term EOP also refers to the university's Comprehensive Emergency
Management Plan (CEMP)
BCP is a document that offers instructions and recovery steps for a given feature or process over a defined
period of time. It is written in sufficient detail so that the plan can be implemented with minimal delay by
those needed. This is a set of tools, activities, procedures and information created, tested and kept ready for
use in the event of a major operational disruption
Business continuity planning is the process of developing prior arrangements and procedures that enable
VCU to respond to an interrupting event in such a manner that critical business functions can continue within
planned levels of disruption. The end result of this activity is an effective business continuity plan (BCP).
• Business Impact Analysis: Here, the company will identify time-sensitive tasks and resources. (More on
this later.)24
• Recovery: The firm must identify and undertake procedures to regain important business
• Organization: It is necessary to form a continuity team. This group will design a strategy to
• Education: The continuity staff must be educated and tested. Team members should also
do activities that review the plan and strategy
References
adserosecurity, n.d. SECURITY RISK ASSESSMENT. [Online]
Crocetti, P., n.d. What is data protection and why is it important?. [Online]
Sullivan, E., n.d. What is business continuity and why is it important?. [Online]