Security Plan and Training Program

Verified

Added on  2022/11/01

|13
|3113
|315
AI Summary
The objective of the report is to understand cyber security in terms of a case study. The tenacity of cyber security is required for providing help to the users to get prevention from any kind of attack, identity theft or data breaches that could aid in better risk management.

Contribute Materials

Your contribution can guide someone’s learning journey. Share your documents today.
Document Page
Running head: SECURITY PLAN AND TRAINING PROGRAM
Security Plan and Training Program
Name of the Student
Name of the University
Author’s Note:

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
2
SECURITY PLAN AND TRAINING PROGRAM
Executive Summary
The objective of the report is to understand cyber security in terms of a case study. The
tenacity of cyber security is required for providing help to the users to get prevention from
any kind of attack, identity theft or data breaches that could aid in better risk management. It
is required to maintain a proper security plan for ensuring that each and every cyber threat is
well treated and eradicated on time and the confidential information and various assets are
highly protected and secured without much complexity. The major and the most significant
kinds of cyber security risks include ransom ware, malware, attacks of social engineering,
phishing and many more. It is needed to undertake some of the most distinctive and effective
counter measures for treating these cyber threats and also ensuring that high security and
privacy is being maintained without much complexity. This report has provided solutions to
the organization, with cyber risks with a security plan as well as a training program for their
staff.
Document Page
3
SECURITY PLAN AND TRAINING PROGRAM
Table of Contents
1. Introduction............................................................................................................................4
2. Discussion..............................................................................................................................4
2.1 Brief Idea of the Case Study............................................................................................4
2.2 Identification and Description of the Organizational Holdings at Risk...........................4
2.3 Identification and Description of the Potential Security Threats to the Organization.....5
2.4 Design of a Security Plan with subsequent Details of the Required Counter-Measures
for Managing and Addressing the Risks................................................................................7
2.5 Development of a InfoSec Training and Awareness Program for the Employees..........9
3. Conclusion............................................................................................................................10
References................................................................................................................................12
Document Page
4
SECURITY PLAN AND TRAINING PROGRAM
1. Introduction
Cybersecurity is stated as the safety of few Internet-linked systems including
hardware and software or even data from any kind of cyber-attack. Security comprises of
cybersecurity and physical security and that are eventually used by all companies for
protection against the unauthorized or unauthenticated accessibility of data centres or even
any other computer based systems (Buczak . and Guven 2015). This report would be
providing a brief description on a popular case scenario of a company that requires a training
program and security plan for effectively reducing the impacts of cyber risks and cyber-
attacks. Proper counter measures to deal with the identified cyber risks would even be
described in the report with justifications.
2. Discussion
2.1 Brief Idea of the Case Study
An organization has more than 1000 staffs and it is being placed within a different
multi storied building, situated within the centralized business-district of city. The head of
their organizational security team has got the responsibility of protecting the information
holdings as well as controlling informational privacy from all kinds of unintentional and
deliberate threats and activities. According to a recent information, the security team has
found out that few of the key areas of incident responses, business continuity planning and
disaster recovery areas of the business are not very strong. Moreover, there are chances of
social engineering attack, password security and even lack of staff awareness about several
risks to the confidential information. These issues are needed to be eradicated on time and
made them quite effective and efficient in comparison to the present situation.

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
5
SECURITY PLAN AND TRAINING PROGRAM
2.2 Identification and Description of the Organizational Holdings at Risk
The organization, mentioned in the case study, although has extremely effective
technical systems for maintenance of their databases and document management security, it
is being observed that there are various cyber security risks within the organizational
holdings (Elmaghraby and Losavio 2014). Recently, the newly appointed security
management head has found out that the areas of incident responses, business continuity
planning and disaster recovery are not sufficient and are facing few of the most distinctive
and vital issues while considering organizational holdings. The most effective methods for
identifying the organizational holdings at risks are as follows:
i) Conduction of Internal Researches: This is the first and the most effective method
for identifying if the organizational holding is at risk (Cherdantseva et al. 2016). An internal
research is being conducted by the head of the security team for finding out the areas that are
needed to be focused and that has scope for improving in respect to security.
ii) Conduction of External Researches: The second distinctive method for
identifying if the organizational holding is at risk would be conduction of external research.
Each and every industry has its own unique trends and hence industry research could be
helpful in identification of the risks and threats to a better level.
iii) Taking Regular Employee Feedback: Employee feedback is yet another
important and significant method for identifying if the organizational holding is at risk. There
are 1000 staffs, working in the organization and it becomes quite vital for the security team to
know, if any discrepancy is being observed by the employees or not (Wells et al. 2014). The
key stakeholders or the IT team would be able to provide knowledge about these issues
without much complexity.
Document Page
6
SECURITY PLAN AND TRAINING PROGRAM
2.3 Identification and Description of the Potential Security Threats to the Organization
There are some of the most common and popular potential security threats that could
be vulnerable for the organization and these threats are provided below:
i) Computer Virus: The first potential security threat to this particular organization is
computerized virus. These are fragments of software, which are being made for spreading
from any 1 system to the next (Abawajy 2014). These viruses are also sent as distinctive
attachments on the email or even copied from specified web sites with the subsequent
intention of infecting the respective computerized system.
ii) Rogue Security Software: The second popular potential security threat for the
organization is rogue security software. Leveraging the subsequent fear from computerized
virus, the attackers try to implement rogue security software, which is a malware for
misleading the victims in believing that the computerized virus is being implemented within
the system and every security measure is ineffective.
iii) Trojan Horse: This particular security threat is responsible for tricking the use
into inviting the hacker into a more safe area and it eventually holds up a malware, which
could trick the victims into executing it purposely after disguising behind legal programs
(Cavelty 2014).
iv) DDoS Attack: In this type of attack, the hacker makes the computer system
completely unavailable for the user and denies any type of services by overloading the server
with huge network traffic.
v) Social Engineering Attacks: Such kinds of attacks are being accomplished by
human interventions and it tricks the victims into making privacy mistakes or even providing
sensitive information. Since, the organization comprises of 1000 staff, there is a high chance
that any one of them would be making such mistakes and data would be lost.
Document Page
7
SECURITY PLAN AND TRAINING PROGRAM
vi) Ransomware: It is a kind of malicious software that is being designed for blocking
accessibility to the computerized systems only until demanded money is being paid to the
attacker (Ben-Asher and Gonzalez 2015). It has become quite common in present situation
and the organization might face such situation.
vii) Malware: It is a file that is extremely destructive to a computer user. The most
common types of malware involve Trojan horses, spyware, worms and computer viruses.
viii) Phishing: It is a fraud attempt for gaining confidential data such as username or
password by simply disguising as a trustworthy entity and the user gets no idea about such
attempt (Knowles et al. 2015). These are mainly conducted by emails.
ix) Rootkit: It is a program, which provides a threat actor remote accessibility for
controlling over the entire computer system and the organization, since they do not have any
backup planning, might lose all of its data.
x) Spyware: Spyware is the kind of software, which is being made for tracking the
confidential datum of browsing habit and on the basis of those habits, they show up pop ups.
The organization could eventually face this problem, when the legitimate data would be
stolen completely without any information.
2.4 Design of a Security Plan with subsequent Details of the Required Counter-
Measures for Managing and Addressing the Risks
A proper security plan could be extremely effective for dealing with all the above
mentioned threats and risks and problems might be resolved completely without much
complexity (Fielder et al. 2016). If any company comprises of a core sense of network
security as well as an effective incident response plan, it has the major capability of
preventing and mitigating all types of cyber-attacks. This security plan would specify the

Paraphrase This Document

Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Document Page
8
SECURITY PLAN AND TRAINING PROGRAM
approach, resources and responsibilities for managing the identified 10 security risks. A
security plan for the organization is drafted below:
i) Purpose: The main purpose of this plan is to draft the standard procedures related to
physical as well as cyber security for the organization. Every staff of the organization is
aware of this plan.
ii) Physical Security: Every resource or asset of the organization is secured and the
policies of this particular security aspect should be followed by the users (Abomhara 2015).
No unauthorized people are allowed to bring out such distinctive security in their business.
iii) Network Security: This particular security provides security to the organizational
network through firewalls and access control lists. The organizational security team will
develop new updated strategies for any kind of tampering or threats.
iv) Responsibilities: The IT team and security team have the responsibilities of
preserving confidential information by implementing the security plan as well as registering
and analysing security incidents. Time and resources will also be allocated for this purpose.
v) Involvement of Policies and Standards: Various policies and standards are
involved related to cyber security and every employee is adhered to these rules (Bada, Sasse
and Nurse 2019).
vi) Legal Aspects: Any individual, who will be found not to follow the above
mentioned rules, will be charged with legal aspects and even terminated from the
organization.
The counter measures to the identified security threats are as follows:
i) Computer Virus: Successful implementation of antivirus software and firewall is
one of the most effective counter measure for computer virus.
Document Page
9
SECURITY PLAN AND TRAINING PROGRAM
ii) Rogue Security Software: Installation of a firewall and regular up gradation is an
important counter measure for rogue security software (Liu et al. 2015). The operating
system should also be updated regularly.
iii) Trojan Horse: One of the most effective solution is to use Malwarebytes for
removing Trojan horses and terminating suspicious programs.
iv) DDoS Attack: Protection of web applications at all the 7 layers is the most
efficient solution for DDoS attack in the organization. Reduction of TCP anomalies is also
effective in this situation.
v) Social Engineering Attack: Setting subsequent spam filters to high level is the
most suitable solution for social engineering attack (Carr2016). Device security would also
be effective for this purpose and the organization should involve VPN in the business.
vi) Ransomware: Utilization of encryption technique is an effective technique for
ransomware attack.
vii) Malware: Installation of firewall is the most efficient technique for resolving
issues of malware in the organization.
viii) Phishing: Installation of anti-phishing and firewall settings must be utilized for
reduction of such attacks.
ix) Rootkit: Implementation of rootkit malware removal tool is being designed for
removal of the rootkit malware from respective computers or systems (Hong, Liu and
Govindarasu 2014).
x) Spyware: Implementing anti-spyware tool is an effective method for reducing
impact of spyware attacks on the systems and data of the organization.
Document Page
10
SECURITY PLAN AND TRAINING PROGRAM
2.5 Development of a InfoSec Training and Awareness Program for the Employees
Cyber security is extremely vital and significant for the increasing reliance over
computerized system, wireless network standards such as Wi-Fi and Bluetooth and the
Internet connection (DiMase et al. 2015). This InfoSec that is being made for maintaining the
CIA of data, is often considered as the sub section of cyber security. The staff require a basic
level of awareness so that they will be able to deal with the data loss complexities. An
InfoSec training as well as awareness program for the employees of this organization is as
follows:
i) Email Scams: Every employee would have to ensure zero email scam and hence
avoiding phishing attack completely.
ii) Involving Details regarding Data Management: The employees would have idea
regarding data management, so that if data gets lost under any circumstance, they would be
able to recover them.
iii) Physical and Network Security and Controls: The assets and networks of the
organization should be secured with successful implementation of antivirus and firewalls so
that security is maintained on top most priority (Anwar and Mahmood 2014).
iv) BYOD Policy and Removable Media: The final aspect of the training program is
BYOD policy and removable media. The bring-your-own-device policy is a collection of
rules that govern the support level of corporate IT department for all devices. The employees
should be concerned about removable media and they should not use such media on
organizational systems.
3. Conclusion
Hence, conclusion could be drawn that computer security or IT security is the proper
protection of various computerized systems from the damages or theft, caused to software as

Secure Best Marks with AI Grader

Need help grading? Try our AI Grader for instant feedback on your assignments.
Document Page
11
SECURITY PLAN AND TRAINING PROGRAM
well as hardware and even from the disruption and misdirection of the services that are being
provided to them. Moreover, due to the growth and development of smart devices like
televisions and smart phones, cyber security has brought up few of the most distinctive and
noteworthy aspects to ensure that efficiency is kept on top priority. The above mentioned
report has clearly outlined a brief description on the case scenario of the company to protect
their information holdings. Threats are being well identified and relevant counter measures
are provided for these threats to ensure better effectiveness in business. Moreover, a
comprehensive information security training program is also developed for each and every
staff personnel.
Document Page
12
SECURITY PLAN AND TRAINING PROGRAM
References
Abawajy, J., 2014. User preference of cyber security awareness delivery methods. Behaviour
& Information Technology, 33(3), pp.237-248.
Abomhara, M., 2015. Cyber security and the internet of things: vulnerabilities, threats,
intruders and attacks. Journal of Cyber Security and Mobility, 4(1), pp.65-88.
Anwar, A. and Mahmood, A.N., 2014. Cyber security of smart grid infrastructure. arXiv
preprint arXiv:1401.3936.
Bada, M., Sasse, A.M. and Nurse, J.R., 2019. Cyber security awareness campaigns: Why do
they fail to change behaviour?. arXiv preprint arXiv:1901.02672.
Ben-Asher, N. and Gonzalez, C., 2015. Effects of cyber security knowledge on attack
detection. Computers in Human Behavior, 48, pp.51-61.
Buczak, A.L. and Guven, E., 2015. A survey of data mining and machine learning methods
for cyber security intrusion detection. IEEE Communications Surveys & Tutorials, 18(2),
pp.1153-1176.
Carr, M., 2016. Public–private partnerships in national cyber-security
strategies. International Affairs, 92(1), pp.43-62.
Cavelty, M.D., 2014. Breaking the cyber-security dilemma: Aligning security needs and
removing vulnerabilities. Science and engineering ethics, 20(3), pp.701-715.
Cherdantseva, Y., Burnap, P., Blyth, A., Eden, P., Jones, K., Soulsby, H. and Stoddart, K.,
2016. A review of cyber security risk assessment methods for SCADA systems. Computers
& security, 56, pp.1-27.
Document Page
13
SECURITY PLAN AND TRAINING PROGRAM
DiMase, D., Collier, Z.A., Heffner, K. and Linkov, I., 2015. Systems engineering framework
for cyber physical security and resilience. Environment Systems and Decisions, 35(2),
pp.291-300.
Elmaghraby, A.S. and Losavio, M.M., 2014. Cyber security challenges in Smart Cities:
Safety, security and privacy. Journal of advanced research, 5(4), pp.491-497.
Fielder, A., Panaousis, E., Malacaria, P., Hankin, C. and Smeraldi, F., 2016. Decision support
approaches for cyber security investment. Decision Support Systems, 86, pp.13-23.
Hong, J., Liu, C.C. and Govindarasu, M., 2014. Integrated anomaly detection for cyber
security of the substations. IEEE Transactions on Smart Grid, 5(4), pp.1643-1653.
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., 2015. A survey of cyber
security management in industrial control systems. International journal of critical
infrastructure protection, 9, pp.52-80.
Liu, Y., Sarabi, A., Zhang, J., Naghizadeh, P., Karir, M., Bailey, M. and Liu, M., 2015.
Cloudy with a chance of breach: Forecasting cyber security incidents. In 24th {USENIX}
Security Symposium ({USENIX} Security 15) (pp. 1009-1024).
Wells, L.J., Camelio, J.A., Williams, C.B. and White, J., 2014. Cyber-physical security
challenges in manufacturing systems. Manufacturing Letters, 2(2), pp.74-77.
1 out of 13
circle_padding
hide_on_mobile
zoom_out_icon
[object Object]

Your All-in-One AI-Powered Toolkit for Academic Success.

Available 24*7 on WhatsApp / Email

[object Object]