Security Risks Our initial protection measures were aimed at protection based on reports that identified cyber-attacks on European banks stealing customers’ credit card information. To combat the...

1 answer below »
please read after action reportand than write another AAR with further avidence that is provided.


Security Risks Our initial protection measures were aimed at protection based on reports that identified cyber-attacks on European banks stealing customers’ credit card information. To combat the theft of our citizens’ financial data we must increase the security measures of both data in transit and data stored on databases. Heightened encryption methods reduce the damage of data stolen during transmission. The second area of concern was the economic downturn caused by interest rates being increased and the lowering of small company spending on cyber-security measures. Missteps in providing adequate cyber security may lead to the disclosure of customer data. It is our responsibility as the Federal Government to protect the nation’s best interests. Support of the infrastructure of our economy relies on the protection of commerce and the privacy of our citizens. Economic Downturn Issues associated with the economic downturn can be lessened by applying measures that aid in reduction in downtime, increase support of small business cyber-security measures, and offer training for personnel wishing to enter the cyber-security field. To encourage businesses to keep a minimum level of security either a tax reduction for products that aid in cyber-security can be offered and penalties based on compliance failure. A Business Continuity Plan (BCP) offers guidance for actions a company should take when there are issues with their ability to continue business after some event affects operations. To enact a BCP the company should outline the roles that would identify which personnel are leading specific efforts. This would include the hiring policy that is focused on finding an experienced candidate to fill roles in leadership defined in the BCP. Other tactics to minimize impacts from the economy are increasing the network uptime. It is necessary to create redundancy measures for network loads such as load balancing, DNS failover, and secondary operations sites. Often external collaboration methods can help identify these sites. Cloud computing allows information to be stored off-site and accessible to the customer with the license agreement. The cloud storage option allows for data backups to recover data that may be corrupted, encrypted from an attack, or otherwise unavailable at the normal company site. Criminal Hacking The hacking of computer systems has become a commonplace topic for at least the last decade. Each subsequent attack has experts looking deeper into the value of the efforts that security personnel must include to protect the networks in the future. When dealing with cyber hacking there is not a one size fits all plan, the technology is growing, and new vulnerabilities are being discovered rapidly. There are measures that companies can take to reduce the likelihood of loss when these attacks inevitably find their way onto the network Policy is one key method in identifying the staples of security that a company can follow to allow baseline measures. Things to consider are antivirus, authorized software, and the information that can be shared. As the Federal Government, we are limited in what policies we can enforce on private companies’ systems. We can encourage support, provide training, and metrics that can show the value of utilizing the policies we suggest. The use of outdated antivirus will provide lower amounts of protection compared to updated packages. Remaining current gives hackers less opportunity to find weaknesses in the cyber-security armor they provide. Encouraging an authorized software list for companies requires that approved software from trusted vendors will be identified and used for operations. This may impact some users due to a lack of familiarity. Another good practice is the limitation of information sharing. This is regarding the access employees have to customer data that is not relevant to their jobs. Other things to consider when creating cyber security policy that deters hacking: · Remote Access · Role-Based Access Controls · Data Encryption Methods Public Sentiment If our citizens do not feel confident in our decisions, they will disregard any suggestions that we make for the protection of the American networks. We must be diligent in working with public relations to establish a positive outlook on our decisions. Americans must know that we respect the privacy of their information and are taking each precaution we can in establishing safe internet communication methods by following advisories designed by the National Institute of Standards and Technology (NIST), funding research efforts, and requiring breach notifications so that any loss of their data will be reported. As an act of faith, we can increase financial funding to support private sector cyber security issues. This will allow for greater access to security tools, training efforts for personnel, and encourage information sharing between private sector professionals and government representatives. Stakeholders FBI DISA Department of Treasury NIST Congress Attorney General's Office Department of Homeland Security Critical to every cybersecurity strategy is identification of all stakeholders. In the event of a cyber breach, or often just a cyberattack, certain stakeholders require notification. As you review each round of activity, create a spreadsheet or table with your team that lists stakeholders to be notified. Include this in your AAR. Retain notes on the control decisions from each round, in addition to the CISO Debrief Report, as you move to the next step of stakeholder identification.  Round One of the simulation is complete.  All five teams faced the following scenarios: Criminal Hacking and Economic Downturn. Round   Federal Government Avisitel DTL Power Mistral Bank Hytema Criminal Hacking           Economic Downturn           Here is how the teams performed after Round One: In terms of overall Index Score, Hytema and Mistral were tied for the best performance followed close behind by the Federal Government.  Downtime and Profitability are areas to watch closely for the private sector players.  The Federal Government should focus on ways to improve Popular Sentiment and Surplus (Budget) moving forward. R/ Prof G. Student Name: Mitsuko Brown | Role: Cyber Security Policy Analyst Category Decisions Round 1 Antivirus Policy Quality of antivirus solution used State-of-the-art Frequency of scans Multiple times per day Frequency of patch updates Always once released Authorized Software Policy Type of software permitted for use by employees Approved software Software evaluation frequency in months 6 Violation penalties Focus on termination Breach Notification Policy Degree of openness of breach notification Only critical incidents Investigative agencies to call in for major security breaches CERT Violation penalties Focus on termination Emergency Bypass Policy Spending on emergency bypass policy $ 125,000 Response to violations of typical separation of duties protocol Not allowed Violation penalties Focus on suspensions General Access Policies Degree of freedom given to employees regarding communications over the Internet Restricted Degree of freedom over browsing non-business sites Restricted Degree of logging of Internet access and other system actions and accesses All actions Number of permitted login attempts 3 Password validity in days 45 Password length requirements 8 Non-use of prior passwords 3 Violation penalties Focus on warnings Hiring and Employee Policy IT team size Average Full-time employees as a percentage of the workforce 0.9 Hiring by average experience in years 7 Spending on background check of DSS or other vendors $ 15,000 Forced rotation of employees Enable Forced vacation for employees Enable Information Sharing Policy No. of people in groups to overlook and enforce internal information sharing 4 Internal information sharing by role-based access control Strictly need-to-know Degree of external information sharing Strictly need-to-know Frequency of disclosure for Infragard communication in days 14 days Violation penalties Suspensions Remote Access Policy Degree of remote access by employee grade Middle management Access privileges permitted Medium - read/write Violation penalties Focus on termination Rounds Rationale Round 1 Strong antivirus solution is critical for protecting federal government information assets especially when cyber threat impact probability is high and the impact of a cyber breach is very high. The US Government will enforce strong password requirements with MFA. 45 day password changes are sufficient with strong password requirements. The security demands of the US Government require more monitoring than other entities less targeted by hackers Student Name: Esi FYNN-AIKINS | Role: Chief Information Security Officer Category Decisions Round 1 Business Continuity Planning Degree of IT data storage redundancy Low Degree of IT network redundancy High Levels of power backup redundancy 2 Number of backup sites 1 Number of redundant backup communication links 3 Policy review frequency in months 6 Database Security Frequency of forcing password changes in days 90 Degree of separation of roles for admin and operator roles Complete Control privileges Restricted OS services and associated ports Disable Database honeypots Enable External Collaboration Degree of collaboration with allies and Interpol High Federal Government Information Classification Strictness of cybersecurity information classification Top secret/SCI Information Privacy Policy Privacy program investment spending $ 250,000 Appoint a dedicated privacy officer Yes Privacy training spending for employees $ 400,000 Degree of information and record retention All information Violation penalties Focus on suspensions Role Based Access Control Degree of role-based access control High Training and Auditing Focus on training area: network vulnerabilities 35% Focus on training area: controls 25% Focus on training area: encryption 30% Focus on training area: penetration testing 10% Frequency of physical audits of the equipment Once a year Rounds Rationale Round 1 Increased data redundancy can eat up server storage space. Redundancy will be low and done intentionally. A high network redundancy will minimize the chances of errors, damage, or shutdowns. A medium-power backup akin to a 2N system will still keep things up and running. It is better to have more redundant backup communication links is essential to ensure effective alternative communication. One offsite backup site is enough for storing data needed in the event of a breach. Critical functions should be reviewed and updated every 6 months to help resume operations quickly after an incident. Role separation stops an attacker using access control. 90 days password change policy limits an attacker's stay inside a hacked account. Enabling honeypots will lure and deflect attackers at the same time to learn their techniques. OSes must be hardened in this instance. Privacy program cost includes cost for a response management tool, estimated incidents per year, cost for time spent on the incident intake and assessment, reporting cost and internal and outside counsel costs. Employees who violate privacy policy will be suspended pending investigation. Cost for training 115 employees in 10 regional offices at an average cost of $390. More focus should be on assessing vulnerabilities, encrypting data, and providing controls. Auditing equipment once a year will reduce cost involved in the audit but still meet requirements for certification. Student Name: Mfonobong Noah | Role: General counsel Category Decisions Round 1 Advisories NSA security configuration guide creation spending $ 25,000 NIST library funding $ 500,000 CERT Controls CERT funding $ 1,250,000 Frequency of automated advisories in days 10 Experience of CERT responders in years 2 Training allocation funding $ 1,250,000 Vulnerability database maintenance funding $ 500,000 ISACs Funding for the ISAC $ 1,250,000 Training and certification programs funding $ 1,405,000
Answered 2 days AfterJun 18, 2022

Answer To: Security Risks Our initial protection measures were aimed at protection based on reports that...

Anjali answered on Jun 20 2022
79 Votes
Security Risks
 There are numerous security risks that can threaten the growth of the economy therefore it is necessary to take three different steps to manage the threats and its consequences on the different stakeholders that are involved in the sector. The government of the USA is taking several initiatives to manage the security risks related to the IT infrastructure implemented in the organization. The security risk impacts the different stakeholders involved in the financial sector of the US significantly therefore it is the issue of concern for the US government to combat the risk related to cyber security. The inside threat attacks and the data breaches or we can say that the risk related t
o denial of service attack, SQL injection and phishing attacks are the major threats that are impacting the growth of private or the public sector in this country. Therefore the government is planning to implement the different strategies that are incorporating the use of technologies like cloud-based solutions and imposing the laws or reforms according to which the different team members or the employees of the organization need to follow the protocols to manage the sensitivity of the information. There are other strategies like encryption methods or the two way authentication method or QR system that needs to be implemented in the business operations of the organization that helps to manage the cyber security risk and the business continuity can also get enhanced at the time of risk by the implementation of these strategies in the organization. The government of the USA needs to invest on the infrastructure and training of the different employees who are working in these organizations that help to provide the awareness related to new market trends to preserve the sensitivity of the information related to different sectors like financial institutions, healthcare sectors and educational sector of this country.
Economic Downturn
 The economic downturn is also a threat for the development of the economy and the impact of this threat can be reduced by applying the measures that help to increase the support to the private sector by the federal government of the USA. Training programmes for the different personnel who are responsible for cyber security in the private sector play a crucial role to disseminate the information related to the new security measures that are quite effective to manage the implications involved in the cyber security threat. It also helps to foster the business to continuity during the period of economic downturn and a proactive business continuity plan can be designed on the basis of different guidelines that need to be followed by the employees of the organization. This proactive business continuity plan comprises the use of technology for managing the security and it also offers three different guidelines for the company's employees that impact the business operations also. The business continuity plan includes the strategy that helps to combat the risks related to DNS failure, load balancing and the risk related to ransom ware. The risk related to loss of information due to the availability of the weak nodes in the network can also be managed by the implementation of proactive business continuity plans that include the use of strategies like use of cloud-based services and IDS etc.
Criminal Hacking
 Criminal hacking is very prevalent in the US in which the cyber attackers attack the system of the user and ask for money or we can say that huge amount of money. Like the Ransomware attack originated in the US and it impacted the different economies in different manners, the impact of this attack was very huge in terms of software and hardware that is required for information sharing between the different departments. While dealing with the risk related to the criminal hacking the government needs to plan a proactive approach that helps to preserve the software or hardware or IT infrastructure that is implemented in the organization and it is not very easy for the officials of the US government. The major challenge to manage the risk related to the criminal hacking is that a lot of technical expertise is required to regain the system and to identify the weak node in the network. The likelihood of the losses is very high in this case therefore it is a major challenge for the government of the USA to preserve the sensitive information of the different sectors like financial sector, banking sector, healthcare sector, educational sector and other public or private sectors of USA. For this purpose the government has implemented laws that need to be followed by all the civilians and in case of any violation high penalties will be there for the different residents of the USA. Policy building is an effective strategy that helps to stabilize different sections or the sectors that are prone to security risk therefore it is recommended to invest in the research and development department that helps to build up the new strategies or policies to manage the use of different assets in the organization. Remote access policy is also prone to these kinds of attacks therefore it is necessary to build a specific plan for the remote access policy to manage the use of different assets from the place of the user. It is also recommended to regulate the use of different devices or the infrastructure that are required for information sharing between the different individuals that are available at global places. Regular patchwork is also required to manage the risk related to the ransomware. Another good practice that helps to manage the sensitivity of the information is to regulate the information sharing method between the different departments. The different authorisation or rules must be provided to different employees according to the need that helps to regulate the access to the different systems that carry the sensitive information. There are methods like remote access, role-based access control and data encryption methods that can be implemented by the government of the USA to manage the risk related to information sharing between the different departments and their criminal hacking.
Public Sentiment
The citizens of the country may not accept  the change implemented in the country and they are resistant to change so it is the responsibility of the government to tell them the different benefits of implementing the strategy. It is the responsibility of the public bodies who are working in the public sector to tell them the advantages of implementing the new strategy in the country that can impact the decision of the different citizens who are involved in the usage of IT infrastructure for the different sectors. The government of US take the advantage of different public sectors to train and provide the information related to the new change implemented in the country that helps to manage the change resistivity easily and the absorption of the change in the country can be done easily by implementing these kind of training sessions for the different...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here