Microsoft Word - CMP73001_Cybersecurity_Management_Assignment2-S1 2020-GS-Revsied 8th April CMP73001-Ass2 XXXXXXXXXXSchool of Business and Tourism Unit Cybersecurity Management Unit code CMP73001...

1 answer below »
Cybersecurity Management




Microsoft Word - CMP73001_Cybersecurity_Management_Assignment2-S1 2020-GS-Revsied 8th April CMP73001-Ass2 School of Business and Tourism Unit Cybersecurity Management Unit code CMP73001 Assignment 2: Plans/programs/policy development exercise Due Date: Week 9 Monday 27 Apr 2020 Learning outcomes: 2 & 3 Graduate Attributes: 3 & 4 Weight 30% of overall unit assessment Task Description You are hired by Advanced Medicos Limited (AML), a healthcare product sell company, as a cybersecurity consultant to help in security management and to address the contemporary and emerging risks from the cyber threats the company is facing. AML is providing a platform for Australian customers to sell their product online. The vision of the company is to be among the top 5 nation-wide. The board from the advice by Chief Information Officer (CIO) and Chief Information Security Officer (CISO) has concluded that they should get to point that the key services such as web portal should be able to recover from major incidents in less than 20 minutes while other services can be up and running in less than 1 hour. In case of a disaster, they should be able to have the Web portal and payroll system fully functional in less than 2 days. The company is a new company which is growing rapidly. While the company uses its database server to store the information of its customers’ private data, credit card info, etc. it has a poor- designed network with a low level of security. As the company is responsible for the privacy and the security of customer personal info, credit card details, the security of payment transactions, etc. they have decided to improve their information security. Therefore, they have hired you to do the following task: Your task is to perform a risk analysis and develop a security plan for the Company and document the outcomes. CMP73001-Ass2 Existing IT infrastructure of AML: - Office 365 Emails Hosting - 2 Web server providing web services and payment options - A physical database server storing customer information - DHCP and DNS servers - Servers located in a server room accessible by all staff - There is no virtual/cloud storage - The backup files are stored on a single computer connected to the internal network - Two 24-port Cisco Catalyst switches (1Gbps ports) - Switches are access layer switches - ADSL router - 40 PCs with outdated antivirus - The operating systems used in the company are Windows 2012 server and Windows 10 - Windows Firewalls are on - No security configuration on routers and switches - Telnet connection is used by IT people to remotely check the configuration of the network devices. Therefore, there is no encryption in remote access. - Two wireless access points - Wireless security is WPA - 10 Voice over IP phones - Servers located in a server room accessible by all staff - There is no virtual/cloud storage - The backup files are stored on a single computer connected to the internal network - There are 40 staff including three IT people (IT staff are responsible to look after internet connection, network devices, Wi-Fi, Voice over IP service, LAN, computers, servers, hardware and software, and video conference facilities). - All staff and equipment are on a single floor. - The roles and responsibilities of people who are responsible for information security management are not clear and they are not documented. All IT staff help in information security management. For this assignment, you need to write a report to the CEO of the company and answer a number of questions. You should also identify assets, perform risk assessment, and propose solutions to mitigate risks. Your answer should be submitted in PDF/DOC files. CMP73001-Ass2 Assignment guideline Plans/programs/policy development exercise: develop program direction and policy and propose controls and changes to secure the organization information system based on the risk assessment results. Task 1: Security policy development and risk management 1.1 Based on the information given for AML and based on the risk assessment results in Assignment 1, develop an appropriate access control policy for this company. 1.2 What types of access controls do you recommend protecting the assets of the company? Justify your choices. You should have physical and logical access controls which do not let unauthorized access to the assets (assets include information, software, and hardware). At least three access controls should be provided. Justify your choices with cost benefit analysis and effectiveness. 1.3 Propose at least five controls, which can be used to control threats identified in Assignment 1. Justify your choices with cost benefit analysis and effectiveness. 1.4 Determine and recommend data security solutions for three different data states in the company: data in use, data in motion, and data at rest. 1.5 What authentication method do you recommend for AML Company for effective and efficient management of user identify verification, especially for remote users. 1.6 Explain how a single sign-on service (SSO) can help AML company to manage authentication. Which protocol will be used to implement this SSO service and why? Explain the protocol. 1.7 Explain the difference between incident response and disaster recovery. What are the responsibilities of the incident response team and the disaster recovery team? 1.8 Describe six phases of developing an incident response plan. For this question, you should explain each phase and propose at least two activities for each phase in AML Company. You may need to do some research to answer this question. 1.9 Provide five examples of natural or human-made disasters in relevant to AML. Explain three phases of disaster recovery. You can use the link below to find some information about disaster recovery phases. https://www.cisco.com/en/US/technologies/collateral/tk869/tk769/white_paper_c11-453495.pdf 1.10 Explain the definition of MTD, RTO, and RPO in disaster recovery. What is the difference between disaster recovery and business continuity? CMP73001-Ass2 Task 2: Review and improve security policies (optional - students who answer this question will receive a 10% extra mark) For this task, you should read the following version of policies created by an IT staff. You as the cybersecurity consultant are asked to review and revise the policies and propose a more comprehensive version of the policies for the company. For each group, you should write at least six new policy requirements. Security policies Backup policies:  A weekly full backup should be performed in the company.  Backup files should be stored in a server in the company. Computer use policies:  The programs from untrusted and external sources should not be run on the company computers.  Computer logs should be only stored on the computer. Assessment Criteria Criteria Max Mark Task 1: Security policy development and risk management 27 Task 1.1: access control policies 3 Task 1.2: Access controls for the asset identified in Assignment 1 4 Task 1.3: Controls for the threats identified in Assignment 1 5 Task 1.4: Data security controls for three data states 1.5 Task 1.5 & 1.6: Recommendation of a multi-factor authentication method, and a single sign-on definition 4.5 Task 1.7: the difference between incident response and disaster recovery 1.5 Task 1.8: Six phases of incident response and their activities 3 Task 1.9: Disasters and recovery phases 3 Task 1.10: Disaster recovery and business continuity definition 1.5 Task 2: Review and improve security policies (optional question) (10% extra mark) Documentation 3 Professional presentation. 1.5 Referencing 1.5 Total 30 CMP73001-Ass2 Assignment-2 Marking Rubric A spreadsheet that will be used for the marking of your site is provided (attached with the final submission link) on MySCU to itemize exactly what tutors will be looking at in relation to marking your assignment. It contains a detailed breakdown of the marking criteria for this assignment. I strongly suggest you peruse this spreadsheet. Format, Presentation Submission Format and Length There is no report template to be used in this assignment, so you can design your own template or refer to online resources. However, the report should be well presented in a standard report format. The first page of the report should have a simple company logo, your name, and student ID, CMP73001 Assignment 2, and the date you submit your assignment. When you have completed the assignment, you are required to submit your assignment in the PDF/DOC format. The file will be named using the following convention: filename = FirstInitialYourLastName_CMP730021_A2.pdf (i.e. FJones_CMP73001_A2.pdf) Due to the system setting constraint, the report 2 length/duration was set with 15hours in the unit UIG. You are advised that there is no formal word limit for the report. However, a good report is expected to be somewhere in the vicinity of 2,000 - 3,500 words from Introduction to Conclusion. Note that this is a very rough estimate and there will be no penalties imposed based on the number of words (no real ceiling if the content is precise and relevant!) Original Work Note that you are not allowed to cut and paste from online resources. Use your own words and figures. Acknowledge all reference sources. It is a University requirement that a student’s work complies with the Academic Integrity Policy. It is a student’s responsibility to be familiar with the Policy. Failure to comply with the Policy can have severe consequences in the form of University sanctions. For information on this Policy please refer to Student Academic Integrity policy at the following website: http://policies.scu.edu.au/view.current.php?id=00141 As part of a University initiative to support the development of academic integrity, assessments may be checked for plagiarism, including through an electronic system, either internally or by a plagiarism checking service, and be held for future checking and matching purposes. CMP73001-Ass2 A Turnitin link has been set up to provide you with an opportunity to check the originality of your work until your due date. Please make sure you review the report
Answered Same DayApr 20, 2021CMP73001Southern Cross University

Answer To: Microsoft Word - CMP73001_Cybersecurity_Management_Assignment2-S1 2020-GS-Revsied 8th April...

Deepti answered on Apr 23 2021
143 Votes
Security Policy Development& Risk Management
Contents
1.    Task 1: Security Policy Development and Risk Management    3
1.1.    Access Control (AC) Policy    3
1.2. Types of Access Controls for AML    4
1.2.1. Role-based Access Control (RBAC)    4
1.2.2. Mandatory Access Control (MAC)    4
1.2.3. Discretionary Access Control (DAC)    4
1.3 Threat Control    5
1.3.1. SQL Injections attacks    5
1.3.2. Ransomware attacks    5
1.3.3. Trojan Virus Attacks    5
1.3.4. Phishing    5
1.3.5. Information Theft    5
1.4. Data Security Solution    5
1.4.1. Data in Use    5
1.4.2. Data in Motion    6
1.4.3. Data at Rest    6
1.5. Authentication    6
1.6. Single Sign-On Service    7
1.6.1. Security Assertions Ma
rkup Language (SAML) 2.0 protocol    7
1.7. Incident Response Vs. Disaster Recovery    7
1.7.1. Responsibilities- IRT / DRT    8
1.8. AML Incident Response Plan    8
1.8.1. Preparation    9
1.8.2. Identification    9
1.8.3. Containment    9
1.8.4. Eradication    9
1.8.5. Recovery    10
1.8.6. Lessons learned    10
1.9. Disasters & Recovery Phases    10
1.9.1. Five Disasters    10
1.9.1.1. Network Collapse    10
1.9.1.2. Incompatible Software Issue    10
1.9.1.3. Inadequate Staff Training    10
1.9.1.4. Equipment Malfunction    11
1.9.1.5. VoIP Resource Issue    11
1.9.2. Disaster Recovery Phases    11
1.9.2.1. Activation Phase    11
1.9.2.2. Execution Phase    11
1.9.2.3. Reconstitution Phase    11
1.10. MTD |RTO | RPO | Disaster Recovery |Business Continuity    11
2.    Task 2: Security Policies    13
2.1.    Backup Policy    13
2.2.    Computer Use Policy    13
References    14
1. Task 1: Security Policy Development and Risk Management
1.1. Access Control (AC) Policy
The access control policy established the AML Enterprise Access Control for risk management of account management, access monitoring and enforcement, segregation of duties. This policy outlines best practices that the organization should implement for hardware and software security. The standards that will constitute AML policy are mentioned below. The organization is bound to this policy and shall be compliant to the standards documented.
AC-1: Access Control Procedures- AML business system shall adhere to formal documentation that explains the responsibilities, roles, commitment from management, compliance and entities coordination
AC-2: Account Management: AML business Systems should identify authorized users within the organization and specify the privileges. Access should be granted on the basis of valid authorization and associated business functions in coordination with the intention of system use. Accounts should be reviewed periodically.
AC-3: Separation of Duties: Separate duties should be assigned to individuals to avoid malicious activities and collusion. Duties should be documented.
AC-4: System Use Notification: AML business systems should consistently follow the standards, regulations and policies. A notification message for system approval should be displayed prior to granting access to the system.
AC-5: Concurrent Session Control: AML systems should enforce a limit on the number of concurrent sessions to 10.
AC-6: Session Lock: A session lock of 120Minutes should be initiated by AML systems over information asset. Lock should be retained until user is identified and authenticated before reestablishing the access.
AC-7: Wireless Access: Usage restrictions and guidelines on implementation of wireless access should be established, unauthorized wireless access to the AML Database should be monitored and wireless access should be authorized before establishing database connection.
AC-8: Publicly accessible Content: AML system should designate individuals to post publicly accessible content on AML’s system. The individuals should be trained to review and avoid posting non-public information.
1.2. Types of Access Controls for AML
AML Company should consider the access control as the paramount feature to ensure system security.
1.2.1. Role-based Access Control (RBAC)
This AC authorizes control over objects and is further established by grouping users according to their roles and responsibilities. They could be reassigned to other roles if required later without affecting the infrastructure of the AC. Being a healthcare company, the main functions of RBAC would include storing and exchanging healthcare product records, management of data using smart devices. This AC shall control overall costs and tremendous incentives n efficiency based on roles ensuring that the right person gets access to right information at the right time. It will enable disclosure of minimum necessary information needed to achieve an intended purpose.
1.2.2. Mandatory Access Control (MAC)
This AC allows personnel to access the system resources only if they possess clearance of substantially high level. The product or customer information which falls under highly sensitive category are placed under MAC. The sensitivity labels over the type of information and resources helps the designated and authorized personnel to access relevant information according to their scope and profile in order to accomplish their tasks. Mandatory along with role based AC would work the best for AML company under given scenario.
1.2.3. Discretionary Access Control (DAC)
DAC allows an individual to access any object or program within the system, granting the individual complete control over the resources. It can be helpful for internal working of the employees on the resources where least restriction is required for daily operations at AML. But this should also follow the AC policy as it comes with great responsibility expected from the authorized personnel to ensure that the system is not left vulnerable and the system security level settings and permissions are used responsibly.
1.3 Threat Control
1.3.1. SQL Injections attacks
This attack can be controlled by using stored procedures and prepared statements within AML database. Principle of least privilege (PoLP) should be implemented on each account to ensure that each individual has access to minimum relevant information and resources while accomplishing the task specific to his role.
1.3.2. Ransomware attacks
This attack can be controlled by securing the computers along with servers, routers and switches with restricted access to the network room of AML. Instead of allowing all employees, certain employees should be granted access to with specific privileges. Furthermore, the system should be equipped with updated anti-virus and anti-malware software.
1.3.3. Trojan Virus Attacks
This attack can be controlled by running diagnostic scans over the resources, the applications of AML company should be updated at all times and vulnerabilities should be patched. Furthermore,...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here