Assignment 2 - Security
Assignment 2 - Security
Assignment 2 - Security
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Grading grid
P5 P6 P7 P8 M3 M4 M5 D2 D3
❒ Summative Feedback: ❒ Resubmission Feedback:
Table of Figure
Figure 1 : Define a security risk....................................................................................................................................6
Figure 2 : Define assets................................................................................................................................................9
Figure 3 : Define threats............................................................................................................................................11
Figure 4 : risk identification.......................................................................................................................................14
Figure 5 : data protection..........................................................................................................................................16
Figure 6 : Security Policy............................................................................................................................................18
Figure 7 : Define stakeholders...................................................................................................................................26
I.Introduction
In the digital age, where every byte of data holds immense value, the importance of robust security
measures cannot be overstated. As an IT Security Specialist at a prominent security consultancy, you find
yourself at the forefront of securing the digital realms of various enterprises. The latest assignment
beckons with a familiar urgency, yet unique in its context - devising a comprehensive Security Policy for
"Wheelie good," a manufacturing powerhouse nestled in the bustling streets of Ho Chi Minh City. Amidst
the ceaseless hum of bicycle parts production for global markets, the specter of potential security looms
large, prompting the company's proactive stance. In the wake of media narratives chronicling the
aftermath of security lapses within organizations, "Wheelie good" seeks not just protection but resilience
against the evolving threatscape. As you embark on this pivotal endeavor, the fusion of technical
expertise and strategic foresight becomes paramount in crafting a shield strong enough to secure
"Wheelie good's" digital assets against any onslaught.
II.Contents
P5.Review risk assessment procedures in an organisation.
5.1.Define a security risk and how to do risk assessment.
a. Define a security risk
A security risk can be defined as any potential event, action, or circumstance that could compromise the
confidentiality, integrity, or availability of an organization's information assets or information systems.
These risks can arise from a variety of sources, including human actions, natural disasters, technical
vulnerabilities, or malicious activities. Security risks can manifest in different forms, such as unauthorized
access to sensitive data, system breaches, data theft, malware infections, or disruptions to critical
services. Identifying and assessing security risks is crucial for organizations to implement effective
security measures and mitigate potential threats to their assets and operations.[1]
Observe: Walk around your workplace and look for activities, tasks, processes or substances used
that could harm your employees (or others)
Look back at past accidents and illness records as they may identify less obvious hazards
Check the manufacturer's data sheets, instructions, information and instructions
Advise employees (and others) on activities, tasks, or processes.
It may be useful to group hazards into five categories, namely physical, chemical, biological, ergonomic
and psychological.
Next, determine who could be harmed by those potential dangers. It is also important to note how they
may be affected, whether through direct or indirect contact. It is not necessary to list people by name
but by identifying groups including:
Workers
Contractors
Some hazards may pose a higher risk to certain groups including children, teenagers, new or expectant
mothers, new employees, home workers, and laborers. single.
Step 3. Assess the severity of the risk and establish preventive measures
After identifying any hazards and who may be affected, it is important to assess the severity of the risk (if
it occurs) and establish control measures. appropriate and effective to reduce the level of this risk to a
level that is 'reasonably practicable'. This means that everything possible is done to ensure health and
safety taking into account all relevant factors, including:
Assessing the severity of a risk requires an assessment of how likely it is to occur and how significant the
consequences it could cause. Some factors that influence this assessment include duration and
frequency of exposure, number of people affected, capacity of those exposed, device type and condition,
and availability of providing first aid and/or emergency assistance.
Step 4. Make changes and record your findings
If the workplace has five or more individuals, the significant findings of the risk assessment must be
maintained electronically or in writing. Recording your findings in a risk assessment form is an easy way
to track risks and the controls put in place to mitigate identified risks. Forms include:
It is sensible to ensure the risk assessment is proportionate to the activity or task being undertaken and
this can often be a simple process for common tasks.
Employers should periodically review and, if necessary, reassess any existing controls.
A useful guide to when you may need to review your processes is:
It's easy to forget to review your risk assessment, especially when you're trying to run a business. Don't
wait until it's too late, set a date to review the risk assessment as you conduct it and don't forget to put
that date in your diary.
What control measures are currently in place and information on any other control measures that may
be required
There is no set period of time for which you must keep a risk assessment, but it is best practice to keep it
for as long as it is considered relevant to a particular task or activity.
5.2. Define assets, threats and threat identification procedures, and give examples
a. Define assets
Assets are valuable resources owned or controlled by individuals, businesses, or nations, with the
anticipation of future usefulness. They are recorded on balance sheets to enhance a company's value or
operational efficiency. These resources, ranging from manufacturing equipment to patents, have the
potential to generate cash flow, reduce expenses, or increase sales in the future.
Understanding assets involves recognizing them as financial resources or access rights not available to
others. Assets must be legally enforceable and possess the potential to increase financial inflows or
decrease cash outflows. They can be categorized into short-term (current) assets, fixed assets, financial
investments, and intangible assets.
Personal assets encompass items of current or potential worth owned by individuals or families,
including financial instruments, real estate, personal property, and investments. Calculating net worth
involves deducting liabilities from assets, where a positive net worth indicates asset value exceeding
liabilities, while a negative net worth signifies the opposite.
For businesses, assets are vital for supporting production and growth, including tangible assets like
machinery and real estate, as well as intangible assets like patents and royalties. The balance sheet
outlines a company's assets and their financing, providing insight into resource management
effectiveness. Current assets can be converted into cash within a year or operating cycle, while fixed
assets, such as vehicles and machinery, have longer useful lives and contribute to production but are less
liquid.
Examples :
Cash and cash equivalents: Cash, certificates of deposit, and Treasury bills.
Marketable securities: debt-related securities or liquid equity.
Fixed Assets:
Non-current assets, or fixed assets, are those that a business utilizes to produce goods and services
and have a longer useful life. Fixed assets are shown as property, plant, and equipment on the
balance sheet (PP&E). Fixed assets are long-term investments that are categorized as tangible (i.e.,
Non-current assets (like fixed assets) cannot be easily converted to cash to cover immediate
operational costs or investments, which is one of the two main contrasts between personal assets
and corporate assets. In contrast, it is anticipated that present assets will be liquidated within one
b. Define threats
Threats refer to potential or actual events, circumstances, or actions that have the capability to cause
harm, disruption, or damage to assets, individuals, organizations, or systems. In the context of security,
threats are often associated with risks to the confidentiality, integrity, or availability of information and
resources. These threats can arise from various sources, including human actions (such as malicious
insiders or external attackers), natural events (such as earthquakes or floods), technical vulnerabilities
(such as software flaws or misconfigurations), or other unforeseen occurrences. Understanding and
mitigating threats is essential for maintaining security and resilience in both physical and digital
environments.
Figure 3 : Define threats
Examples of threats
Keep in mind that a danger is fairly broad. It does not specify how to accomplish it or even whether
it is feasible given the state of the system. Here are a few illustrations.
Each of these examples can easily be mapped to a category in STRIDE. Other examples would be
Asset Identification: Begin by identifying and cataloging the assets within the organization that need
protection. This includes physical assets (such as buildings, equipment), information assets (such as data,
intellectual property), personnel, and other critical resources.
Threat Sources: Identify potential sources of threats that could target the identified assets. These
sources can include individuals (such as employees, contractors, or external attackers), groups (such as
hacker collectives or organized crime syndicates), natural events (such as floods or earthquakes),
technological factors (such as software vulnerabilities or hardware failures), or other external entities.
Threat Categories: Categorize threats into different types or categories based on their nature and
characteristics. Common threat categories include cyber threats (such as malware, phishing, or denial-of-
service attacks), physical threats (such as theft, vandalism, or natural disasters), human threats (such as
insider threats or social engineering), operational threats (such as supply chain disruptions or equipment
failures), and regulatory or compliance-related threats.
Threat Analysis: Analyze each identified threat to understand its potential impact on the organization's
assets and operations. Assess the likelihood of each threat occurring and the severity of its potential
consequences. Consider factors such as the vulnerability of assets, the capabilities of threat actors, and
the effectiveness of existing security controls.
Scenario Development: Develop hypothetical scenarios or use case studies to illustrate how each
identified threat could manifest and impact the organization. This helps stakeholders visualize the
potential risks and understand the need for proactive mitigation measures.
Risk Assessment: Evaluate the risks associated with each identified threat by considering the likelihood
of occurrence, the potential impact, and the organization's tolerance for risk. Prioritize threats based on
their risk levels and focus mitigation efforts on addressing the most critical or high-priority risks.
Continuous Monitoring: Establish mechanisms for ongoing monitoring and review of the threat
landscape to identify new or emerging threats. Stay informed about industry trends, security advisories,
and incident reports to adapt threat identification procedures accordingly and maintain situational
awareness.
Risk Assessment:
The process begins by performing a comprehensive risk assessment, focusing on aspects such as
physical, network, application, and personnel.
A team of security experts and other functions within the organization are involved in identifying
potential risk factors, including consideration of potential attacks, data loss, and threats. legal
mechanism.
Vulnerability Scanning:
Use automated tools to scan systems, applications, and networks to identify potential security
vulnerabilities.
Update the list of vulnerabilities and prioritize them based on severity and potential business
impact.
Perform monitoring of threat intelligence sources such as security bulletins, industry reports, and
information from national security agencies.
Analyze new attack trends, attack patterns, and other potential threats that may impact the
organization's environment.
Determining context is the first important step in the risk management process. The organization must
understand the context in which the rest of the risk management process will take place. Additionally,
the organization should establish the criteria it will use to assess potential risks and define its analytical
structure.
The organization must identify potential risks that could negatively affect a specific organizational
process or project.
Once specific types of potential risks have been identified, the organization must consider the rate at
which that potential risk will occur and what consequences it will bring. The goal of risk analysis is to
better understand each specific risk scenario, and how it affects projects and business goals.
Once the risk analysis is completed, a risk assessment needs to be conducted. The organization further
evaluates each potential risk after determining how likely it is that the potential risk will occur and what
consequences it will bring. This allows the company to decide whether a risk is acceptable and whether
they are willing to accept the risk.
In this step, the company will review its highest ranked risks and develop a plan to mitigate these risks
using specific risk controls. Those plans include risk mitigation processes, risk prevention tactics, and
contingency plans to handle risks should they occur.
Step 6: Monitor risks
It is important to note that risk management is a continuous process and does not end when risks have
been identified and mitigated. The organization's risk management policies and plans need to be
reviewed annually to ensure the policies are always updated and appropriate.
A data protection strategy includes monitoring and protecting data in your environment, while
maintaining ongoing control over data visibility and access.
When developing a data protection policy, your organization can define risk tolerances for every data
category and comply with applicable regulations. This policy also helps you set up authentication and
authorization – defining who needs access to what information and why.[3]
Establish security policies: Based on risk assessment, organizations need to establish detailed security
policies to guide how data is processed, stored, and accessed. This includes rules on passwords, access
rights and data management.
Implement technology security measures: Technology security measures such as Firewall systems, data
encryption, anti-virus software and intrusion detection software need to be deployed to protect data
from threats. Cyberbullying.
Employee training: All employees should be trained on the organization's security policies and measures.
This includes education on how to recognize and respond to security threats, as well as the need for
them to handle critical data securely.
Monitoring and evaluation: Organizations need to continuously monitor their systems and data to detect
any unusual activity early. Systems should also be periodically tested to ensure effectiveness and security
policy compliance.
Respond and recover from incidents: If an attack or security breach occurs, the organization needs a plan
to respond and recover quickly. This may include isolating infected systems, restoring data from backup,
and enhancing security measures to prevent future attacks.
Information security policy: This is a document that describes specific principles and instructions on how
the organization processes, stores and protects data. This policy often includes specific security
measures, data access regulations, password management and risk management.
Data access rights: Data access regulations determine who is allowed to access data, as well as the rights
they have when accessing it. This may include providing tiered access to data, limiting access to groups
of users, or providing access on a "need to know" basis.
Data encryption: Provisions for the use of encryption to protect important data when it is stored or
transmitted. Data encryption helps ensure that data can only be read by those with the appropriate
decryption key.
Risk management: Risk management regulations define processes to assess, investigate and mitigate
risks related to data security. This includes identifying potential risks, estimating the level of risk, and
implementing appropriate security measures.
Legal compliance: Data protection regulations also require compliance with laws related to information
security, including laws on privacy, personal data protection and breach reporting.
Auditing and monitoring: Organizations need to establish regulations to audit and monitor compliance
with data protection policies and regulations. This includes regular audits, tracking security incidents,
and reporting violations to appropriate management departments.
Inspection and Maintenance: Propose a periodic inspection and maintenance plan to ensure the
effectiveness of the DRP plan. These steps may include testing and updating backups, testing
resiliency, and training employees.
Post-Incident Assessment: Specifies steps to evaluate and learn from after recovery from an
incident. Lessons from previous incidents can be used to improve DRP planning and increase
preparedness for the future.
7.6.The steps to design a policy.
Identify Objectives: The first step is to identify the main objectives of the policy. This may include
protecting sensitive information, ensuring legal compliance, or enhancing system security. Objectives
should reflect the specific needs and goals of the organization.
Research and Information Collection: Next is to collect relevant information from various sources,
including legal regulations, industry standards, and similar policies of other organizations. This helps
define the scope and requirements of the policy.
Identify Audience and Stakeholders: Identify those who will be affected by the policy and those who can
influence its implementation and enforcement. This can include employees, management, and the IT
department.
Content Development: Based on information collected and identified goals, develop the content of the
policy including specific principles, regulations, and instructions. Content should be clear, easy to
understand and applicable in practice.
Validation and Approval: Before implementation, the policy needs to be validated and approved by
relevant departments and stakeholders. This ensures that the policy is agreed upon and supported by all
sides.
Deployment and Enforcement: Once the policy is approved, deploy it into the organization's systems.
This may include notification, staff training, and installation of technical measures.
Review and Update: The policy should be periodically evaluated to ensure that it remains effective and
reflects changes in the organization's operating environment. If necessary, the policy can be updated to
reflect new changes.
A stakeholder is a person, like any other member of the project, and some are easier to manage than
others. You’ll have to learn to use stakeholder mapping techniques to identify who your key stakeholders
are and make sure you meet their requirements.
Role: Frontline employees serve as the frontline defense in implementing and upholding security
protocols within their daily operations. Their responsibilities encompass executing security measures
diligently, recognizing and promptly reporting any security incidents, thus playing an indispensable role
in safeguarding organizational assets and sensitive information.
Role: Executives and managers wield substantial influence in shaping the organizational ethos towards
security. They are entrusted with the task of delineating strategic directives, allocating requisite
resources, and fostering a culture where security is not just a priority but ingrained into the very fabric of
the organization's operations.
Board of Directors:
Role: The Board of Directors assumes a pivotal oversight role in governance, exercising authority in
approving security policies, scrutinizing risk management frameworks, and ensuring adherence to
regulatory mandates. Their astute governance practices contribute significantly to maintaining the
organization's integrity and trustworthiness.
Customers:
Role: Customers entrust organizations with their sensitive data and rightfully demand assurance of its
security. Their preferences and expectations exert indirect influence, compelling organizations to uphold
stringent security standards to meet market demands for secure products and services.
Role: External entities providing goods and services are integral cogs in the organizational machinery,
necessitating adherence to stringent security requisites. Their collaboration in maintaining a robust
security posture across the supply chain is indispensable for mitigating potential vulnerabilities and
safeguarding organizational interests.
Role: Regulatory authorities wield authority in delineating requisite standards and frameworks that
organizations must abide by. Their oversight ensures adherence to legal mandates, thereby fostering a
regulatory environment conducive to bolstering security resilience.
Communities:
Role: Local communities serve as stakeholders directly impacted by the organization's security practices,
especially concerning environmental and safety considerations. Their advocacy for responsible and
secure operations underscores the imperative of fostering community-centric security initiatives.
Role: Collaborative endeavors with partners and alliances necessitate the exchange of information and
resources, thereby mutually influencing each other's security postures. Upholding robust security
protocols fosters trust and resilience in these symbiotic relationships.
Media:
Role: The media's portrayal of an organization's security practices can significantly shape public
perception. Negative publicity resulting from security breaches underscores the imperative of
implementing stringent security measures to safeguard reputation and public trust.
8.3. Define Security Audit and State. Why You Need It?
a. Define
A security audit is a systematic evaluation of an organization's security measures, policies, procedures,
and controls to assess their effectiveness in mitigating risks and protecting assets, including physical
assets, data, intellectual property, and reputation. The primary goal of a security audit is to identify
vulnerabilities, weaknesses, and areas of non-compliance with regulatory requirements or industry
standards.
Compliance: Many industries are subject to regulatory requirements and standards regarding security
practices. Security audits ensure that organizations comply with these regulations, avoiding legal
penalties and reputational damage.
Protection of Assets: Assets such as data, intellectual property, and physical infrastructure are vital to an
organization's operations. Security audits help identify weaknesses in security measures and ensure
these assets are adequately protected from theft, misuse, or damage.
Prevention of Breaches: Security audits can uncover weaknesses in security controls that could be
exploited by attackers. By identifying and remedying these vulnerabilities proactively, organizations can
reduce the likelihood of security breaches and their associated costs and damages.
Continuous Improvement: Security is an ongoing process that requires regular review and updates to
adapt to evolving threats and technologies. Security audits provide insights into areas for improvement,
allowing organizations to refine their security posture continuously.
I am writing to propose the implementation of regular security audits within our organization as a
strategic measure to enhance our overall security posture and mitigate potential risks. As stakeholders
invested in the success and sustainability of our organization, it's imperative that we take proactive steps
to safeguard our assets, reputation, and stakeholder trust.
Background: With the ever-evolving landscape of cyber threats and regulatory requirements, ensuring
the effectiveness of our security measures is paramount. Security audits serve as a systematic evaluation
of our security controls, policies, and procedures, providing valuable insights into vulnerabilities and
areas for improvement.
Key Benefits:
Risk Mitigation: By identifying and addressing vulnerabilities proactively, security audits help
mitigate potential risks and minimize the likelihood of security breaches, thereby safeguarding
our organization's assets and reputation.
Compliance Assurance: Regular security audits ensure that we remain compliant with relevant
regulatory requirements and industry standards, reducing the risk of legal penalties and
reputational damage.
Cost Savings: Investing in preventive measures through security audits can ultimately save costs
associated with security breaches, including financial losses, legal fees, and damage to brand
reputation.
Continuous Improvement: Security audits provide valuable insights into areas for improvement,
enabling us to refine our security policies, procedures, and controls continuously.
Recommendation:
I recommend that we establish a formal framework for conducting regular security audits,
encompassing the following key components:
Define objectives and scope of audits based on organizational priorities and risk factors.
Select qualified internal or external auditors with expertise in cybersecurity and regulatory
compliance.
Develop audit methodologies and protocols tailored to our organization's unique needs and
challenges.
Establish clear timelines and schedules for conducting audits on a regular basis, considering the
dynamic nature of security threats.
Allocate necessary resources and support from leadership to ensure the success and
effectiveness of security audit initiatives.
III.Conclusion
In today's dynamic IT landscape, robust security measures are paramount. This exploration covers risk
assessment, data protection, IT security, disaster recovery planning, and stakeholder involvement,
highlighting their interconnected nature.
Risk assessment procedures underscore the importance of identifying and mitigating threats, aligning
organizational strategies with risk management practices. Data protection, crucial in the digital age,
ensures legal adherence and fosters responsibility in handling sensitive information.
Integration of ISO standards enhances resilience against threats, as illustrated by practical examples. IT
security audits play a pivotal role in assessing security postures, aiding in vulnerability identification and
defense fortification.
A comprehensive security policy and disaster recovery plan are essential for business continuity.
Stakeholder involvement fosters a culture of security awareness, making security a collective
responsibility.
In conclusion, embracing a holistic security strategy is imperative for organizational success amidst
advancing technology. This proactive approach fortifies defenses, adapts to emerging threats, and
ensures resilience and responsiveness.
IV.References
1.British Safety Council (2023). Risk Assessment and Management: a Complete Guide | British Safety
Council. [online] British Safety Council. Available at:
https://www.britsafe.org/training-and-learning/informational-resources/risk-assessments-what-they-
are-why-they-re-important-and-how-to-complete-them.
2. isocert.org.vn. (n.d.). Quản trị rủi ro là gì? 6 bước của quy trình quản trị rủi ro. [online] Available at:
https://isocert.org.vn/quan-tri-rui-ro-la-gi-6-buoc-cua-quy-trinh-quan-tri-rui-ro.
3. SNIA (n.d.). What is Data Protection? | SNIA. [online] www.snia.org. Available at:
https://www.snia.org/education/what-is-data-protection.