logo

Task 1. Based on the case study, identify and analyse a

11 Pages4510 Words1781 Views
   

Added on  2019-09-21

Task 1. Based on the case study, identify and analyse a

   Added on 2019-09-21

ShareRelated Documents
Task 1. Based on the case study, identify and analyse at least four (4) components of information security risk management that the Te Mata Estate company could have applied in response to security breaches of its system.Ans. As mention in above case study of “Te Mata Estate company” that one of the employees shared some sensitive information to a hacker in exchange of money, so there is need to follow these component as I mention below.Identify — In this part our aim to develop an understanding of the cybersecurity risks to systems, people, assets, data and capabilities. Need to aware our staff members about the hacking and how it is so risky to share a little bit of company data to a stranger. Understanding the business context, current business needs and related risks helps organizations determine threats and assign prioritize to their security efforts. Protect — Organizations implement appropriate safeguards and security controls to protect their most critical assets against cyber threats. For Example, here we can apply identity management system (Like ISE 2.0identity service Engine), that is very popular now a days and parallel apply some access control policies on network devices to set privileges, role and rules and keep promoting /awareness and provide training to staff.Detect— Organizations need to quickly detect events that could pose risks todata security with the help of some security device like IDS (intrusionDetection System) helps to quickly detect intrusion on network (As it was an old technique). Usually organizations rely on continuous security monitoring by some monitoring tools and incident detection techniques and remedy tools.Organizations take action against a detected cybersecurity easily if they have some auto prevention system Example IPS (intrusion prevention System),Its not only detect but also prevent from unnecessary attacks/ malware as it is embedded by AMP (Advanced malware protection ) that isalways connected with Cloud to update the latest signature of worms etc.Recover — Organizations develop and implement activities to restore capabilities by having some personal data centre services that were impacted by a security incident. This group of activities aims at supporting timely recovery to normal operations to reduce the impact from attack, it also includes recovery planning, improvements (e.g., introduction of new policies or updates to existing policies). ( Reference – CCNP Security SIAS)
Task 1. Based on the case study, identify and analyse a_1
Task 2. You are working as a security expert, evaluate whether the Te Mata Estate company has followed the recommended assurance and compliance components in enhancing the system security. At least three (3) components to be evaluated. Ans. Three components of enhancing the system security are:1. Confidentiality:When protecting information, we want to be able to restrict access to those who can see it; everyone else should be disallowed from learning anything about its contents. This is the essence of confidentiality. For example, federal law requires that company restrict access to unauthenticated user of sensitive information. The company must be sure that only those who are authorized have access to view data / files.2. Integrity:Integrity is the assurance that the information being accessed has not been altered and truly represents what is intended. Just as a person with integrity means what he or she says and can be trusted to consistently represent the truth, information integrity means information truly represents its intended meaning. Information can lose its integrity through malicious intent, such as when someone who is not authorized makes a change in function to intentionally down something. An example of this would be when a hacker is hired to go into the company’s system and shoot a attack in system to downgrade it.3. Authentication:The most common way to identify someone is through their physical appearance, buthow do we identify someone sitting behind a computer screen or any system.Tools for authentication are used to ensure that the person accessing the information is, indeed, who they present themselves to be. Authentication can be accomplished by identifying someone through one or more of three factors: something they know, something they have, orsomething they are. For example, the most common form of authentication today is the user ID and password. In this case, the authentication is done by confirming something that the user knows (their ID and password). But after successfully authentication next step is to push user an authorization policy with access list.(Reference CCNA – secure)
Task 1. Based on the case study, identify and analyse a_2
Task 3. a. Select three (3) information security risk management controls and three standards. b. Identify and analyse these six controls and standards, which the Te Mata Estate company could have utilised prior to setting up the information system.Ans. Three information security risk management controls are:1.IT Security Policies- This document sets the baseline standards of IT security policy for Government bureaux/departments. It states what aspects are of paramount importance.2. IT Security Guidelines: The document says on the policy requirements and sets the implementation standard on the security requirements specified in theBaseline IT Security Policy.3.Security Risk Assessment - This document provides the practical guidance and reference for security risk assessment & audit in the Government. Three information security risk Standard are:1.ISO 27001- This document provides the ISO standards of the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization.2.COBIT - The Control Objectives for Information and related Technology (COBIT) is published by the Standards Board of Information Systems Audit and Control Association (ISACA) providing a control framework for the governance and management of enterprise IT.3.ITIL - This document introduces a collection of best practices in IT service management (ITSM) and focuses on the service processes of IT and considers the central role of the user.Task 4. Based on the case study, the incident (unethical hacking) which took place in 2008, evaluate how ethical hacking could have helped overcome Te Mata company system breach.Ans. First we must go through it “What is Hacker or what its shades”Hackers may be good or bad depending upon the intentions or motivation behind their work. Black Hat Hacker (unethical Hacker)A black hat hacker is also known as a cracker, as these kinds of hackers possess a piece of good knowledge in computer networking, Network protocols, and system
Task 1. Based on the case study, identify and analyse a_3
administration, but these kinds of hackers are a reason for cybercrime as they hack the systems for unethical reasons.White Hat Hacker (Ethical Hacker)A white hat hacker is the opposite version of the Blackhat hacker, these hackers possess the same amount of knowledge as black hat hackers, but they use the knowledge in an ethical way, and they are network security professional so known asethical hackers.The ethical hacker works according to the ethics of hacking and protect the interest of individuals (like Te Mata company system) on the internet as they are the cybersecurity professional. Ethical hacking is the authorized way of gaining permission for the same. Ethical hackers are involved in an organization to penetratenetworks and systems with the purpose of discovering the vulnerabilities and fixing them. The role of the ethical hacker is like that of a penetration tester, but they break into the systems legally and ethically.As ethical hacking is likely to be done with the permission of the victim or the targeted system, the only way to tackle black hat hacking is tackling it through ethicalhacking.Task 5. Based on the case study, the security breach that took place in 2011 is an example of a Social engineering technique known as phishing. Identify and analyse how phishing takes place and the counter measures that can be applied to protect the company.Ans.Phishing is a method of trying to gather personal information using deceptive e-mails and websites.Phishing is a cyber-attack that uses disguised emailas a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment. Phishing take place with a help of phishing kit bundles phishing website resources and tools that need only be installed on a server. Once installed, all the attacker needs to do is send out emails to potential victims.But we have counter measure that helps to protect over these attacks are:1. Inbound email sandboxingDeploy a solution that checks the safety of an emailed link when a user clicks on it. This protects against a new phishing tactic that I've seen from cybercriminals. Bad guys send a brand-new URL in an email to their targets to get through the organization's email security. The other tactic is when they inject malicious code into the website right after delivery of the email URL. This URL will get past any standard spam solution.2. Real-time analysis and inspection of your web traffic
Task 1. Based on the case study, identify and analyse a_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Assessment | DIPLOMA IN NETWORKING (LEVEL 7)
|13
|4898
|279

Information Security Risk Management for Te Mata Estate Company
|13
|4898
|293

Components of Information Security Risk Management | Report
|13
|4756
|555

Assignment Information Security Hitches in Te Mata Estate
|15
|5013
|179

Signs of a Network Data Breach & How to Prevent One
|6
|1682
|13

Cybersecurity Threat Name of the Student
|11
|2321
|49