This report is describing various types of Control programs which should be used in an organisation for effective operation. It discusses the types of controls and their classification. The report also emphasizes the importance of regular review and re-evaluation of information security controlling programs.
Contribute Materials
Your contribution can guide someone’s learning journey. Share your
documents today.
Need help grading? Try our AI Grader for instant feedback on your assignments.
Secure Computer Networks1 Contents Introduction................................................................................................................................2 Controlling threats to computer system security of an organization..........................................2 Type of controls.....................................................................................................................2 Conclusion................................................................................................................................10
Secure Computer Networks2 Introduction This report is describing various types of Control programs which should be used in an organisation for effective operation. The main challenge for any organization is to define the correct set of information and personnel security controls, that if get implemented and defined to be effective in their application, mitigate the impact of each found threat. Additionally, for each specified security class, a range of controls are essential for a complete and strong security frame(Legg et al., 2015). Moreover, the chief factor that will affect the selection of threat controls is a risk-based cost or profit analysis(The Economic Times, 2018). Anotherfactor includes ease of use, compatibility with present controls, and transparency to operators. Thus, controls finding action is an organizational wide exercise, which explains the protection necessities for the diverse classes of info. However data as well as info owners are eventually accountable persons for the accurate working of information security controls(Wall, 2018). Controlling threats to computer system security of an organization Type of controls Three main types express the key goals of operative security implementation: â– Physical Controls Security (PCS): control procedures, devices, and ways to control physical entree to a definite system structure â– Technical Controls Technology (TCT): control measures to control analytical access to sensitive data â– Administrative Controls: control policies, methods, and business processes to describe and guide operator actions as well as restrictions while dealing with sensitive data Moreover, above control actions can be further categorized into following: â– Preventive controls limit the possibility of a threat by preventing intended or unintended and unauthorized exposure of sensitive info. â– Detective controls identify and report tried unauthorized attempts by anyone
Secure Computer Networks3 â– Corrective controls counter security violation incidents and end harmful happenings or minimize their destruction. Threat Category ControlDescriptionClassificationType Accidental corruption of information Online backup through Cloud A strategic method of data protection, as data can be stored as well as backed up online administrativeprevent Repair and Recovering lost files tool A data repair tool that can repaircorruptdatafiles andhencerecoverlost dataormetadatalike tables, indexes, and keys. For an example:Stellar PhoenixSQLDatabase Repair productcorrect Offline backupSystem files canbe backed up offline through a local equipment like an external hard-drive (Smith, 2014) administrativeprevent Software Assurance Ensuring the reliability of developed or externally purchased software help in protecting data from corruption. administrativeprevent Backup and restoreAn administrative data backup as well as restore procedure is executed to copy manufacture data pre-emptively for repair purposes in the case of emergency(Taylor, 2018) administrativecorrect
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Secure Computer Networks4 Disaster Recovery/ Business Continuity Planning To recover business processes when processes disrupt unexpectedly. Useful for minimizing financial loss, mitigating legal effects of the disruption and maintaining on-going operations. administrativeprevent Data security using machine learning All data requests be it incoming or outgoing are scanned for ensuring their trusted sources productprevent Threat Category ControlDescriptionClassificationType Loss of intellectual property (IP) Tracking outgoing data tool A data loss prevention tool to present and track data leaving the system as well as record its destination for an example Google analytics, and Chartbeat. (Behr & Slater, 2017) productdetect User profiling toolHelp in detecting actions that can show an internal threat or an external spell, foranexampleGlobal web index, and Tropical. productdetect Train employees about IP employee awareness as well as training administrativeprevent Securing IP physically as well Lock the places where sensitive info is stored administrativeprevent
Secure Computer Networks5 as digitallythrough highly secured passwords(Behr & Slater, 2017) Protect patents, design rights, trademarks, trade secrets , and trade dress Digital protection to protect design rights, trade secrets and patents as well as copyrights (Ismail, 2017) administrativeprevent Employing an efficient security consultancy to provide support before and after Team includes management, legal, IT, business, marketing or PR and other important departments’ professionals(Data resolve, 2018) physicalCorrect and prevent Threat Category ControlDescriptionClassificationType Software piracy Technical measures like tamper- proofing, and obfuscation It is software based ways to prevent software piracy productPrevent Technical measures like CD-ROM, expansion card and dongle It is hardware based ways to prevent software piracy physicalprevent Awareness of allowable software licenses Compare the software license inventory to company license agreements and remove all illegal software administrativeprevent MetaSPDTool to analyse automatic software piracy detection productdetect
Secure Computer Networks6 watermarkingThrough this tool, the copyright document can be mined from the program to find the owner of the copyright of the software Productcorrect Threat Category ControlDescriptionClassificationType Theft of information (hacker) Authorized downloading Download software only from certified, legal and authorized sources administrativeprevent Adopt confidentiality Keep passwordsand login info confidential as well as hard to predict administrativeprevent Hacking detection Tools and Software detect violations,record doubtful activities as well as potential attack tactics and report them to company administrator, example: Suricata and Snort Productdetect Crisis communication a special wing that deals with the reputation of the organization as well as the individuals administrativecorrect Preparing prevention and control guide Formation of a catalogue of actions to avoid a recurrence of a hacking attack administrativecorrect Threat Category ControlDescriptionClassificationType Theft of information (employee) Keep smart eye on Employees By supervising employees, conducting informal audits, managing inventory administrativeprevent Restrict entree toItcontrolsgenerationofadministrativeprevent
Paraphrase This Document
Need a fresh take? Get an instant paraphrase of this document with our AI Paraphraser
Secure Computer Networks7 computer terminals as well as records cash receipts, and installing computer security measures is done Strong post theft action taken by the company Identify the theft responsible employee, dismiss their employment and take further legal action(Webroot Smarter Cybersecurity, 2016) administrativecorrect forensic accountants and investigators To legally counsel the employees as well as company management physicalcorrect i-Sight Investigation Software Establishing an Anonymous reporting system or hotline to detect employee fraud Productdetect Threat Category ControlDescriptionClassificationType Web site defacement web site defacement detection tools To monitor websites incoming and outgoing data for its better security, Example: SUCURI tool Productdetect Regular security audits and penetration testing evaluating the security of an IT infrastructure, and better protecting the system technical incident response team Team include the security manager, web masters or web developers as well as web server team physicalcorrect Defender programsProtection against Cross- Site Scripting (XSS) attacks, and SQL injection attacks Productprevent Threat Category ControlDescriptionClassificationType
Secure Computer Networks8 Theft of equipment Identification markings Stamping, engraving, etching, use of acid pens and sandblasting on company’s equipment can stop theft. physicalprevent Physical restraintsTo lock important machines orsystems,andlaptops through mechanical locking systems Physicalprevent immobilisersTo prevent unauthorized use and moving of any equipment Physicalprevent Alarm and tracking systems To alert the management regarding theft and determine the position of the theft equipment physicalcorrect Testing as well as certification To certify anti-theft systems by independent organizations Physicaldetect Threat Category ControlDescriptionClassificationType Viruses, worms, Trojan horses Antivirus packagesrunning an updated antivirus or antispyware scan ProductDetect and correct disconnecting network Disconnectthenetwork from the infected machine administrativecorrect surf smartSafely surf and cope with links, random files, ads, and other free services on world wide web administrativeprevent Technical safeguards to manage and control data flow amid different trusted networks levels through permitting, denying data, productPrevent and detect
Secure Computer Networks9 example: firewalls(Scitech Connect Elsevier, 2013) Backup and restoreTo restore infected system so that harmful virus, worms can be fully eliminated administrativePrevent and correct Threat Category ControlDescriptionClassificationType Elevation of privilege thorough family, education and professional screening over all administrators In order to confirm that they are greatly trustworthy administrativePrevent and detect SID filteringSessionidentifiersfiltering to determine the present risk level of the system administrativeprevent Elevation of Privilege (EoP) Card Game to create easy threat modelling and accessible for company developers and architects productPrevent and correct Threat Category ControlDescriptionClassificationType Fire/FloodFire detection alarms They get automatically activated during the fire event physicalDetect Fire suppression equipment To extinguish fire including example:automatic sprinklers. physicalcorrect Fire exitsCreation of escape exits; with clear of obstructions physicalcorrect Using fire resistant materials Improving impassive fire precautions example: fire resistant doors(Scitech physicalprevent
Secure Best Marks with AI Grader
Need help grading? Try our AI Grader for instant feedback on your assignments.
Secure Computer Networks10 Connect Elsevier, 2013) Designated personnel to control emigration and to co-ordinate with the emergency actions Physicalcorrect Designation of a safe place To evacuate company’s people safely(Yeh & Chang, 2007) physicalprevent Conclusion In conclusion, without having threats protection and control system no company can survive in the marketplace. Additionally, the execution of effective controls as well as safeguards is an on-going process, while the efficacy of controls at a particular point of time is the meter of theoverallsecureinformationsystem.Inordertoreacteffectuallyonchanging vulnerabilities, business processes and conditions and new technologies, threats controlling schemes are mandatory. Hence, above prevention, detection and compensation programs help to audit, review, and update safeguards and controls on a routine basis for an organization. Information system security controls are the product, technical, administrative, and physical and policy defence tools designed to guard sensitiveinformation. Thus, all organizations should review and re-evaluate its information security controlling programs on a regular basis to define any essential adjustments to any of its modules.
Secure Computer Networks11 References Behr, & Slater, , 2017.How to protect intellectual property? 10 tips to keep IP safe. [Online] Available at:https://www.csoonline.com/article/2138380/loss-prevention/how-to-protect- intellectual-property-10-tips-to-keep-ip-safe.html[Accessed 12 October 2018]. Data resolve, 2018.Intellectual Property Theft Solutions. [Online] Available at: https://www.dataresolve.com/intellectual-property-theft.php[Accessed 13 October 2018]. Ismail, N., 2017.7 nightmare cyber security threats to SMEs and how to secure against them. [Online] Available at:https://www.information-age.com/7-nightmare-cyber-security-threats- smes-secure-123466495/[Accessed 12 October 2018]. Legg, S.J., Olsen, K.B., Laird, I.S. & Hasle, P., 2015. Managing safety in small and medium enterprises.Safety Science, 71(Part C), pp.189-96. Scitech Connect Elsevier, 2013.Controls and Safeguards. [Online] Available at: http://scitechconnect.elsevier.com/wp-content/uploads/2013/09/Controls-and-Safeguards.pdf [Accessed 12 October 2018]. Smith, , 2014.What is Data corruption and how to prevent it. [Online] Available at: https://www.makeuseof.com/tag/data-corruption-prevent/[Accessed 12 October 2018]. Taylor, T., 2018.ALL IS NOT LOST: DEALING WITH DATA CORRUPTION AT YOUR ORGANIZATION. [Online] Available at:http://techgenix.com/dealing-with-data-corruption/ [Accessed 12 October 2018]. The Economic Times, 2018.5 simple tips to keep your business secure from cyberattacks. [Online] Available at: https://economictimes.indiatimes.com/small-biz/security-tech/security/5-simple-tips-to-keep- your-business-secure-from-cyberattacks/articleshow/64568063.cms[Accessed 12 October 2018]. Wall, E., 2018.Cyber security threats and provisions for SMEs. [Online] Available at: https://www.itproportal.com/features/cyber-security-threats-and-provisions-for-smes/ [Accessed 12 October 2018].
Secure Computer Networks12 Webroot Smarter Cybersecurity, 2016.File Loss and Data Corruption. [Online] Available at: https://www.webroot.com/ca/en/resources/tips-articles/malware-data-corruption[Accessed 12 October 2018]. Yeh, Q.J. & Chang, A.J.T., 2007. Threats and countermeasures for information system security: A cross-industry study.Information & Management, 44(5), pp.480-91.