Enterprise Security Asignment 1
Enterprise Security Asignment 1
Enterprise Security Asignment 1
Enterprise Security
Assignment 1
Asmita Koirala,
TAFE NSW | MEADOWBANK
Table of Contents
1. Introduction to Stuxnet.................................................................................................................2
2. What Stuxnet does?......................................................................................................................2
2.1 What Stuxnet does on access control?......................................................................................2
2.2. What Stuxnet does on Crypto?.....................................................................................................3
2.3. What Stuxnet does on Network security?......................................................................................3
2.4. What Stuxnet does on Identity?.....................................................................................................3
3. What is qualitative risk analysis?...................................................................................................3
3.1. Purpose of Qualitative rise analysis................................................................................................4
3.2. Qualitative risk analysis on Iranian nuclear assessment.................................................................4
4. What is formal enterprise security architect?...............................................................................4
4.1. TOGAF.............................................................................................................................................5
4.1.1. TOGAF business benefits.............................................................................................................5
4.2. SABSA........................................................................................................................................6
4.2.1. Business benefits of SABSA....................................................................................................7
4.3. C4ISTAR......................................................................................................................................8
4.3.1. Benefits of C4ISTAR...............................................................................................................8
5. Comparing different frameworks and choosing the best one.......................................................9
6. Charter Article 2(4) and UN Charter Article 51............................................................................10
6.1. Iranian`s response........................................................................................................................11
7. Conclusion...................................................................................................................................12
1|Page
1. Introduction to Stuxnet
2|Page
passed cyber-security rules requiring increased protection
for management systems operational important infrastructure.
3|Page
In addition to assessing risk against a pre-defined scale, the qualitative risk
analysis may cluster them supported their supply, like market risks
or restrictive risks, or effect, like inflicting delay or increasing prices.
The main purpose of the qualitative risk analysis is prioritizing risks in step
with their likelihood and impact. A project may be exposed to an
outsized variety of various risks. It might be impractical for a project manager
to pay time handling each single one amongst them, since in several cases, the
resources spent on mitigation can outweigh the risk impact. Evaluating
the likelihood and the impact of potential project risks permits a project
manager to rate risks and to specialise in making risk response ways for the
foremost vital risks.
3.2.1. Radiation
As we all are known about the fact that working on nuclear assessment is very
risky. Employees can easily be the victim of cancer because of radiation on
their workplace.
4|Page
3.2.4. Air attack
It is quite possible for a camp working under nuclear power can attacked by
air.
4.1. TOGAF
TOGAF is proposed to help make an efficient way to deal with streamline the
advancement procedure so it tends to be reproduced, with a’;,mln couple of
blunders or issues as conceivable as each period of improvement changes
hands. By making a typical dialect that extensions holes among IT and the
business side, it brings clearness to everybody included. It's a broad archive —
yet we don't need to receive all aspects of TOGAF. Organizations are in an ideal
situation assessing their requirements to figure out which parts of the system
to centre around.
4.2. SABSA
SABSA is both a system and procedure for guaranteeing that the privilege
physical and data security controls required to execute an association's
methodology are connected in the correct spots at the ideal time with proper
levels of expense. It was at first created by John Sherwood in 1995 to exhibit it
was conceivable to make a physical and innovation engineering that could
6|Page
meet the SWIFT interbank exchange framework's objective of giving $1 billion
ensures each exchange would be safely executed.
SABSA is a technique for creating endeavour wide security designs over the full
scope of business exercises, including data security, business coherence and
physical and natural security.
The Open Group states that SABSA is intended to:
SABSA IPR is possessed, represented and secured by The SABSA
Institute.
The SABSA structure is adaptable, that is, it very well may be presented
in a little investigate and afterward moved to consequent zones and
frameworks, and subsequently executed incrementally.
The SABSA structure might be utilized in any industry division and in any
association whether secretly or freely claimed, including business,
modern, government, military or beneficent associations.
The SABSA system can be utilized for the advancement of designs and
arrangements at any level of granularity of degree, from a venture of
constrained extension to a whole undertaking structural system.
The SABSA system is constantly kept up and created and cutting-edge forms
are distributed every once in a while.
In its broadest application, SABSA security models address every one of the
necessities of operational hazard administration. Nonetheless, the majority of
the current SABSA writing and materials – including the 2009 white paper – are
adapted principally towards the security, hazard administration and
confirmation of business data frameworks as huge piece of the general venture
wide security and hazard administration scope.
7|Page
4.2.1. Business benefits of SABSA
The SABSA system and approach is utilized effectively around the world to
meet a wide assortment of Enterprise needs including Risk Management,
Information Assurance, Governance, and Continuity Management. SABSA has
developed since 1995 to be the 'approach of decision' for associations in 50
nations and in divisions as various as Banking, Homeless Management, Nuclear
Power, Information Services, Communications Technology, Manufacturing and
Government.
SABSA guarantees that the necessities of war Enterprise are met totally and
that security administrations are outlined, conveyed and bolstered as a basic
piece of war business and IT administration foundation. In spite of the fact that
copyright ensured, SABSA is an open-utilize technique, not a business item.
4.3. C4ISTAR
There is a buffet of acronyms and language that venture supervisors in the
protection area must acclimate themselves with. Today, a standout amongst
the most essential and far reaching terms relating to military data frameworks
is C4ISR.
8|Page
fighters and leaders with noteworthy data to enable them to carry out their
occupations.
C4ISR is at last about expanding Situational Awareness, giving leaders the data
they require as quick as could be expected under the circumstances, and
utilizing the correct materials, gear, and frameworks to get that going. Every
one of the segments of C4ISR MUST cooperate easily to make mission
progress. It is the bedrock of any mission, and a blame in any connection in the
chain can have genuine, even savage outcomes.
Most importantly, any C4ISTAR framework will have mission arranging, control
and observing frameworks. This is basic for the fight to come administration
tasks. It is intriguing to see that, with the development of the idea of "shared
duty", world Governments are decreasing spending on military equipment, and
are expanding their interest in IT framework and related military activities. A
pattern has been watched, where equipment speculations are coordinated
towards preparing singular warriors, and military units with incorporated
Soldier Systems. On the order side of the activity, then again, higher
accentuation is put on interchanges frameworks, radio programming, barrier
coordination’s and data foundation.
9|Page
Intelligence—frameworks. These frameworks show the safe information
transmitted to administrators utilizing best in class systems, including chart
movement, and succinct graphs.
10 | P a g e
Which would it be a good idea for us to utilize? All things considered, SABSA
has a more extensive degree yet it is extremely heavyweight. Despite the fact
that I appreciate the culmination of vision of SABSA, I can't see some true
associations making full utilization of it, particularly in the present financial
atmosphere. TOGAF, then again, is nearer to the manner in which true models
work yet needs particular security direction.
In our case charter article 2(4) and UN charter article 51 will help us to some
extent. I have mentioned them below.
UN charter article 2(4)
1. Membership in the United Nations is open to all other peace-loving
states which accept the obligations contained in the present Charter
and, in the judgment of the Organization, are able and willing to carry
out these obligations.
2. The admission of any such state to membership in the United Nations
will be effected by a decision of the General Assembly upon the
recommendation of the Security Council.
UN charter article 51
Nothing in the present Charter shall impair the inherent right of individual or
collective self-defence if an armed attack occurs against a Member of the
United Nations, until the Security Council has taken measures necessary to
maintain international peace and security. Measures taken by Members in the
exercise of this right of self-defence shall be immediately reported to the
Security Council and shall not in any way affect the authority and responsibility
of the Security Council under the present Charter to take at any time such
11 | P a g e
action as it deems necessary in order to maintain or restore international
peace and security.
Acts that execute or harm people or crush or harm objects are unambiguously
employments of power" and likely abuse universal law, as indicated by the
Tallinn Manual on the International Law Applicable to Cyber Warfare, an
examination delivered by a gathering of free lawful specialists in line with
NATO's Cooperative Cyber Defence Centre of Excellence in Estonia.
Demonstrations of power are denied under the United Nations contract, with
the exception of when done in self-protection, Michael Schmitt, educator of
worldwide law at the U.S. Maritime War College in Rhode Island and lead
creator of the investigation, told the Washington Times.
The Associated Press detailed that the semi-official Iranian Students News
Agency discharged an announcement on 24 September 2010 expressing that
specialists from the Atomic Energy Organization of Iran met in the earlier week
to talk about how Stuxnet could be expelled from their systems. According to
experts, for example, David Albright, Western insight offices had been
endeavouring to attack the Iranian atomic program for some time.
The leader of the Bushehr Nuclear Power Plant revealed to Reuters that just
the PCs of staff at the plant had been tainted by Stuxnet and the state-run daily
paper Iran Daily cited Reza Taghipour, Iran's broadcast communications serve,
as saying that it had not caused "genuine harm to government systems”. The
Director of Information Technology Council at the Iranian Ministry of Industries
and Mines, Mahmud Liaii, has said that: "An electronic war has been propelled
against Iran... This PC worm is intended to exchange information about
creation lines from our mechanical plants to areas outside Iran."[100]
Because of the contamination, Iran amassed a group to battle it. Within excess
of 30,000 IP tends to influenced in Iran, an authority said that the
12 | P a g e
contamination was quick spreading in Iran and the issue had been aggravated
by the capacity of Stuxnet to change. Iran had set up its own frameworks to
tidy up diseases and had prompted against utilizing the Siemens SCADA
antivirus since it is suspected that the antivirus was really installed with codes
which refresh Stuxnet as opposed to annihilating it.
7. Conclusion
It is basic to shield our OT to keep cybercriminals from jabbing through,
however remember to secure IT also. It's similarly vital to anchor all IoT
gadgets all through the plan stage. On the off chance that IT experts can gain
from history, they can keep a disastrous episode like Stuxnet from occurring
for their associations.
8. References https://www.giiresearch.com/report/bis556462-global-
c4isr-systems-market-analysis-forecast.html
http://malebits.com/lifestyle/c4istar-systems-facilitate-battle-management
https://www.capgemini.com/2009/08/sabsa-and-togaf-for-security-architecture/
http://www.un.org/en/sections/un-charter/chapter-vii/index.html
https://en.wikipedia.org/wiki/Stuxnet
https://www.wired.com/2013/03/stuxnet-act-of-force/
https://securityintelligence.com/lesson-learned-from-stuxnet/
https://www.google.com.au/search?
q=calculating+matrix+of+qualittive+risk+analysis&rlz=1C1GCEA_enAU819AU819&oq=calculating+ma
trix+of+qualittive+risk+analysis&aqs=chrome..69i57.23095j0j8&sourceid=chrome&ie=UTF-8
13 | P a g e