AS2 Security Assignment
AS2 Security Assignment
Security
ASSIGNMENT
No.1
Class: GCS0903B
ID: GCS200284
Assignment due: 30 A p r i l 202 2
Assignment submitted: 30 A p r i l 2 0 2 2
Page 1
ASSIGNMENT 2 FRONT SHEET
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that making a
false declaration is a form of malpractice.
Grading grid
P5 P6 P7 P8 M3 M4 M5 D2 D3
Page 2
Summative Feedback: Resubmission Feedback:
Lecturer Signature:
Page 3
Assignment Brief 1 (RQF)
Higher National Certificate/Diploma in Computing
Submission Format:
Format:
● The submission is in the form of an individual written report. This should be written in a concise,
formal business style using single spacing and font size 12. You are required to make use of
headings, paragraphs and subsections as appropriate, and all work must be supported with research
and referenced using the Harvard referencing system. Please also provide a bibliography using the
Harvard referencing system.
Submission
● Students are compulsory to submit the assignment in due date and in a way requested by the
Tutor.
● The form of submission will be a soft copy posted on http://cms.greenwich.edu.vn/.
● Remember to convert the word file into PDF file before the submission on CMS.
Note:
● The individual Assignment must be your own work, and not copied by or from another student.
● If you use ideas, quotes or data (such as diagrams) from books, journals or other sources, you
must reference your sources, using the Harvard style.
● Make sure that you understand and follow the guidelines to avoid plagiarism. Failure to comply
this requirement will result in a failed assignment.
Page 4
LO1 Assess risks to IT security.
Assignment scenario
A manufacturing company “Wheelie good” in Ho Chi Min City making bicycle parts for export has called
your company to propose a Security Policy for their organization, after reading stories in the media related
to security breaches, etc. in organizations and their ramifications.
Task 1
In preparation for this task, you will prepare a report considering:
• The security risks faced by the company.
• How data protection regulations and ISO risk management standards apply to IT security.
• The potential impact that an IT security audit might have on the security of the organization.
• The responsibilities of employees and stakeholders in relation to security.
Task 2
Following your report:
• You will now design and implement a security policy
• While considering the components to be included in disaster recovery plan for Wheelie good,
justify why you have included these components in your plan.
Task 3
In addition to your security policy, you will evaluate the proposed tools used within the policy and how
they align with IT security. You will include sections on how to administer and implement these policies.
Page 5
Learning Outcomes and Assessment Criteria (Assignment 1):
Learning Outcome Pass Merit Distinction
LO3 P5 Discuss risk M3 Summarise the D2 Consider how IT
assessment ISO 31000 risk security can be
procedures. management aligned with
methodology and its organisational policy,
application in IT detailing the security
P6 Explain data security. impact of any
protection processes misalignment.
and regulations as
applicable to an M4 Discuss possible
organisation. impacts to
organisational security
resulting from an IT
security audit.
LO4 P7 Design and M5 Discuss the roles D3 Evaluate the
implement a security of stakeholders in the suitability of the tools
policy for an organisation to used in an
organisation. implement security organisational policy.
audit
recommendations.
P8 List the main
components of an
organisational disaster
recovery plan,
justifying the reasons
for inclusion.
Page 6
Table of Contents
I. Discuss risk assessment procedures (P5) ...................................................................... 9
1. Risk assessment definition ....................................................................................................................9
2. Risk assessment steps ............................................................................................................................9
3. The goal of risk assessments ...............................................................................................................10
4. The importance of risk assessment ....................................................................................................11
5. Asset ......................................................................................................................................................11
5.1. Asset definition .......................................................................................................................... 11
5.2. Understanding Assets................................................................................................................ 12
5.3. Types of assets ......................................................................................................................... 12
6. Threat ...................................................................................................................................................13
6.1. Threat definition ......................................................................................................................... 13
6.2. Where Do Cyber Threats Come From? ..................................................................................... 14
6.3. Examples of Cyber Threats ....................................................................................................... 14
6.4. Protect Against and Identify Cyber Threats ................................................................................ 15
II. Explain data protection processes and regulations as applicable to an organisation
(P6) 16
1. Data protection ....................................................................................................................................16
2. Data protection process in an organization.......................................................................................16
3. The importance of data protection.....................................................................................................19
III. Summarise the ISO 31000 risk management methodology and its application in IT
security (M3) ........................................................................................................................... 19
1. Define ISO 31000 management methodology ...................................................................................20
2. Benefits of ISO 31000 ..........................................................................................................................21
3. Example of apply ISO 31000 in organization ...................................................................................22
IV. Discuss possible impacts to organisational security resulting from an IT security
audit (M4) ............................................................................................................................... 22
1. Security audit definition......................................................................................................................22
2. Benefits of IT Security Audit ..............................................................................................................22
3. Types of IT Security Audit .................................................................................................................22
4. How does Security Audit impact to an organization? ......................................................................23
V. Discuss the roles of stakeholders in the organization to implement security audit
recommendations. (M5) ......................................................................................................... 24
1. Stakeholder definition .........................................................................................................................24
2. Understanding Stakeholders ..............................................................................................................24
Page 7
3. The roles of stakeholders in the organization ...................................................................................25
VI. Design and implement a security policy for an organisation (P7) ........................... 25
1. Define security policy ..........................................................................................................................25
2. Understanding Security Policy ...........................................................................................................25
3. Security policy examples .....................................................................................................................26
4. The most and should that must exist while creating a policy ..........................................................26
5. Elements of an Information Security Policy .....................................................................................27
6. Steps to design a policy........................................................................................................................29
VII. List the main components of an organisational disaster recovery plan, justifying
the reasons for inclusion. (P8) ............................................................................................... 30
1. Disaster Recovery Plan .......................................................................................................................30
2. 7 Components That Make A Great Disaster Recovery Plan ...........................................................30
3. The importance of Disaster Recovery Plan .......................................................................................31
3.1. Cost-Efficiency .......................................................................................................................... 31
3.2. Increased Employee Productivity ............................................................................................... 32
3.3. Greater Customer Retention ...................................................................................................... 32
3.4. A Better Understanding of Scalability ......................................................................................... 32
VIII. Reference ..................................................................................................................... 32
Table of Figures
Figure 1: Risk assessment step ......................................................................................................................... 10
Figure 2: IT assets............................................................................................................................................. 12
Figure 3: IT threat ............................................................................................................................................. 13
Figure 4: Data protection .................................................................................................................................. 16
Figure 5: ISO 31000 template .......................................................................................................................... 21
Page 8
I. Discuss risk assessment procedures (P5)
1. Risk assessment definition
The identification of threats that potentially have a negative influence on an organization's ability to
conduct business is known as risk assessment. These evaluations aid in the identification of these inherent
business risks, as well as the implementation of procedures, processes, and controls to mitigate their
influence on corporate operations.
A risk assessment framework (RAF) can be used by businesses to prioritize and share the contents of
their evaluation, including any threats to their information technology (IT) infrastructure. The RAF assists
a company in identifying prospective hazards, as well as any business assets that may be put at risk as a
result of these hazards, as well as the potential consequences if these risks materialize.
The Chief Risk Officer (CRO) or a Chief Risk Manager is usually in charge of the risk assessment
process in large corporations.
2. Risk assessment steps
The method used to conduct a risk assessment varies greatly depending on the risks specific to the type
of business, the industry in which the business operates, and the compliance rules that apply to that
particular business or industry. Regardless of the sort of business or industry, there are five broad measures
that companies can take.
• Step 1: Determine the dangers. The first stage in a risk assessment is to identify any potential
risks that would have a negative impact on the organization's capacity to conduct business if they
occurred. Natural catastrophes, utility outages, cyberattacks, and power outages are all potential
dangers that could be evaluated or discovered during a risk assessment.
• Step 2: Determine what could be injured or who could be harmed. After the risks have been
determined, the following stage is to assess which business assets would be harmed if the risk
materialized. Critical infrastructure, IT systems, business operations, company reputation, and
even employee safety are all considered to be at risk from these hazards.
• Step 3: Assess the hazards and devise countermeasures. A risk analysis can assist in determining
how hazards will affect business assets, as well as the steps that can be implemented to reduce
or eliminate the effects of these hazards on business assets. Property damage, company
interruption, financial loss, and legal penalties are all possible risks.
• Step 4: Make a note of your results. The company's risk assessment findings should be
documented and filed as formal records that are easily accessible. Details on potential dangers,
their related risks, and plans to avoid the hazards should be included in the records.
• Step 5: Regularly review and update the risk assessment. In today's business world, potential
dangers, risks, and the controls that go along with them can alter quickly. It is critical for
businesses to update their risk assessments on a frequent basis in order to keep up with these
changes.
Page 9
Figure 1: Risk assessment step
Distinct sectors have different risk assessment tools, such as risk assessment templates. They could be
valuable for firms who are creating their first risk assessments or upgrading older ones.
3. The goal of risk assessments
The particular goals of risk assessments will likely differ based on industry, business type, and relevant
compliance laws, similar to risk assessment phases. In an information security risk assessment, for example,
weaknesses in the organization's IT security architecture should be identified, as well as compliance with
information security-specific laws, mandates, and regulations.
The following are some common goals and objectives for conducting risk assessments across industries
and business types:
Page 10
• Developing a risk profile that provides a quantitative analysis of the types of threats the
organization faces.
• Developing an accurate inventory of IT assets and data assets.
• Justifying the cost of security countermeasures to mitigate risks and vulnerabilities.
• Developing an accurate inventory of IT assets and data assets.
• Identifying, prioritizing and documenting risks, threats and known vulnerabilities to the
organization's production infrastructure and assets.
• Determining budgeting to remediate or mitigate the identified risks, threats and vulnerabilities.
• Understanding the return on investment, if funds are invested in infrastructure or other business
assets to offset potential risk.
5. Asset
5.1. Asset definition
A resource with economic worth that an individual, corporation, or country possesses or controls
with the hope of future gain is referred to as an asset. Assets are bought or developed to raise a
company's value or benefit its operations, and they are reported on the balance sheet. Whether it's
manufacturing equipment or a patent, an asset can be looked of as something that can create cash flow,
cut expenses, or increase sales in the future.
Page 11
Figure 2: IT assets
5.2. Understanding Assets
An asset represents a company's economic resource or access that other individuals or firms do not
have. A right or other access is legally enforceable, which means that economic resources can be used
at the discretion of a company and can be prohibited or limited by an owner.
A company must have a right to an asset as of the date of the financial statements in order for it to
be present. An economic resource is something that is limited in supply and has the potential to generate
economic benefit by increasing cash inflows or decreasing cash outflows.
5.3. Types of assets
• Current assets: Current assets are highly liquid assets that can be sold and converted into
currency in a short period of time. Cash, bonds, mutual funds, stocks, and other marketable
securities are regarded the most liquid current assets, which means they can be sold easily and
rapidly without impacting their value. Cash, accounts receivable, inventory, and prepaid
expenses are examples of current assets for firms.
• Fixed assets: Fixed assets, also known as hard assets or long-term assets, can take a long time
to produce cash value and are often deemed low-liquidity, which means they can't be sold fast
at the appropriate price. Buildings, land, furniture, and any other item that is not planned for
sale within the year are examples of fixed assets.
• Tangible assets: Inventory, real estate, machinery, currency, and furniture are examples of
tangible assets that are physically tangible and often in the owner's hands. The majority of
tangible assets are also regarded as current assets.
• Intangible assets: Intangible assets are items or goods that exist only in theory and not in
reality. Permits, intellectual property, patents, brand reputation, and trademarks are examples
of intangible assets that increase in value as a result of successful use.
Page 12
• Operating assets: Operating assets are any assets that create money and help maintain
workflow through day-to-day business operations. Copyrights, licenses, inventory, and
machinery are examples of operating assets.
• Non-operating assets: Non-operating assets, such as unoccupied property or short-term
investments, are goods owned by a company that create revenue but are not required for daily
operations.
6. Threat
6.1. Threat definition
A threat is any event that may have a negative impact on an asset, such as if it is lost, taken offline,
or accessed by an unauthorized party.
Threats are defined as events that jeopardize an asset's confidentiality, integrity, or availability, and
might be purposeful or unintentional.
Employee error, a technical malfunction, or an event that causes physical damage, such as a fire or
natural disaster, are examples of intentional threats, whereas accidental threats typically involve
employee error, a technical malfunction, or an event that causes physical damage, such as a fire or
natural disaster.
Figure 3: IT threat
Page 13
6.2. Where Do Cyber Threats Come From?
• Hostile Nation-States National cyber warfare programs provide emerging cyber threats
ranging from propaganda, website defacement, espionage, key infrastructure disruption, and
loss of life. When compared to other threat actors, government-sponsored programs are
becoming more sophisticated and pose advanced threats. Their growing capabilities have the
potential to cause widespread, long-term harm to the national security of many countries,
including the United States. Hostile nation-states pose the greatest risk due to their ability to
use technology and tools effectively against the most difficult targets, such as classified
networks and critical infrastructure such as electricity grids and gas control valves.
• Terrorist Groups Terrorist organizations are increasingly employing cyber attacks to harm
national interests. They are less sophisticated in cyber attacks and have a lower proclivity to
use cyber means than nation-states. Terrorist organizations are likely to pose significant cyber
threats as more technically competent generations join their ranks.
• Corporate Spies and Organized Crime Organizations Corporate Spies and organized crime
groups pose a threat because of their ability to conduct industrial espionage to steal trade secrets
or large-scale monetary theft. In general, these parties are interested in profit-based activities,
either making a profit or disrupting a business's ability to make a profit by attacking
competitors' key infrastructure, stealing trade secrets, or gaining access and blackmailing
material.
• Hacktivists’ activities cover a wide range of political ideals and issues. Most hacktivist
organizations are more concerned with spreading propaganda than with causing damage to
infrastructure or disrupting services. Instead of causing maximum damage to an organization,
their goal is to support their political agenda.
• Disgruntled Insiders Insiders who are dissatisfied with their jobs are a common source of
cybercrime. Insiders don't always need a high level of computer knowledge to expose sensitive
data because they may be authorized to access it. Insider threats also include third-party vendors
and employees who may introduce malware into systems unintentionally or who may log into
a secure S3 bucket, download its contents, and share it online, resulting in a data breach. If you
don't check your S3 permissions, someone else will.
• Hackers Malicious intruders may use a zero-day exploit to gain unauthorized access to data.
Hackers may break into computer systems for the sake of a challenge or bragging rights.
Previously, this required a high level of skill. Today, sophisticated attacks can be made simple
by downloading automated attack scripts and protocols from the Internet.
• Natural Disasters Natural disasters pose a cyber threat because they can disrupt your critical
infrastructure in the same way that a cyber attack can.
• Accidental Actions of Authorized Users An authorized user may fail to configure S3 security
correctly, resulting in a potential data leak. Poor configuration, rather than hackers or
disgruntled insiders, has been responsible for some of the most serious data breaches.
Page 15
Operational assessments identify potential incidents related to events, investigations, or
activities and advise on how to respond to them. For instance, what to do if a computer
becomes infected with malware.
• Tactical Assessments
Tactical assessments are real-time evaluations of events, investigations, and activities
that support day-to-day operations.
Cyber threat intelligence, when used correctly, provides insights into cyber threats and
promotes a faster, more targeted response. It can help decision-makers determine acceptable
cybersecurity risks, controls, and budget constraints in equipment and personnel, as well as
support incident response and post-incident response activities.
Page 16
After you've absorbed all of your company's information. Administrators must analyze the
threats that an enterprise's data may be exposed to:
• In the case of a cyber-attack on the network.
• Natural disasters, such as fires, earthquakes, and other events, result in data loss.
• Only solutions to protect enterprise data from cyber threats will be discussed in this article.
Human error is one of the most serious threats to organizational data security. As a result,
implementing measures to train and promote awareness of data security among agency employees is
one of the most important and effective ways to secure data security in the workplace. It's your
company.
Periodic data security awareness and training programs for organizations and network security
are required. It's the most essential option for reducing company data breaches and saving money on
security services outsourcing. Simultaneously, firms must have a data security strategy and processes
in place for dealing with and using data in the company, utilizing data management and assurance
standards such as ISO 27001 and PCI DSS. These documents will also be utilized for data security
policy adoption and awareness training inside the company.
➢ Raise awareness about data security for employees
Enterprise data security risks are constantly present. As a result, rather than deploying security
measures once, it is important to do so on a regular basis. Each company should have a leader or a
specialist expert with understanding of corporate data security and privacy who is in charge of
overseeing the installation of security measures, processes, and procedures, if at all possible. protect
the safety of data This will assist organizations and their data in reducing cybersecurity risks.
➢ Data security management
It is critical to document protocols for responding to network and data security events. They
aid in the reduction of network security damage to enterprises.
Alternatively, you could consider employing expert ANM assessment and troubleshooting
units. These units will be in charge of consulting the response process and coordinating incident
handling, assisting your company in minimizing damage in the event of an incident.
➢ Troubleshoot and manage problems
Page 17
All system components (including software and hardware) are set to fulfill the security policy's
standards, which is an effective approach for ensuring the security of your business data.
Normally, before bringing a device into operation, firms should have configuration rules in
place. These policies can include passwords, accounts, services, and system setup, among other
things.
Some companies have a propensity of installing pre-installed versions on all of their devices.
Pre-installed versions, on the other hand, frequently have old vulnerabilities that haven't been fixed
in a long time, leaving the system susceptible to hackers. Furthermore, the security of these
installations is unknown. It's conceivable that the installation originally had viruses or flaws.
➢ Configure the system safely
Separating separate network zones will assist isolate and limit the impact caused by network
security threats such as leaking company data, infecting code, poisoning, and so on in the event of a
network security disaster.
Between untrusted external network zones and internal network zones, use extra firewalls. The
DMZ also aids in access management between various network zones. From there, connections from
hazardous network locations to safe network areas can be prevented.
Review penetration testing on a regular basis. This is to ensure that the network zone access
policy is always correctly executed.
➢ Make sure the network is divided into separate zones
Separating separate network zones will assist isolate and limit the impact caused by network
security threats such as leaking company data, infecting code, poisoning, and so on in the event of a
network security disaster.
Between untrusted external network zones and internal network zones, use extra firewalls. The
DMZ also aids in access management between various network zones. From there, connections from
hazardous network locations to safe network areas can be prevented.
Review penetration testing on a regular basis. This is to ensure that the network zone access
policy is always correctly executed.
➢ Secure Enterprise Data with Cybersecurity Monitoring
It's critical to use network traffic monitoring tools both inside and outside the network to help
regulate and detect irregularities in network data as soon as possible, maximizing detection and
prevention. Prevent attacks as soon as possible. IDS, IPS, and SIEM systems are the most prevalent
solutions used by businesses today. In this case, IDS and IPS stand for intrusion detection and
prevention systems. SIEM (Security Information and Event Management) is a network monitoring
solution.
➢ Control access
For enterprise networks, decentralization and access control measures are essential. These
policies aid in the effective control of access into and out of the system.
Page 18
To accomplish this, you must need users to be given only the access privileges they need to
complete their tasks. Preferred accounts should only be used for critical systems, database
administrator positions, or critical systems. User activity, especially when it involves sensitive
information, necessitates the recording and tight management of data and the user's account. At the
same time, you must always keep in mind – To protect data, create a strong password.
Physical security measures connected to access control to corporate premises and personal
offices (travel employees, sirens and magnetic card systems, security guards, and so on) are critical
in managing enterprise data access.
➢ Enhanced malware protection
Enterprises should implement methods to avoid and protect data from dangerous malware.
There are numerous options available today to reduce the risk of malware infection on various levels.
User-specific anti-malware solutions, centralized anti-malware solutions, gateway anti-malware
solutions, and so on. Choose a realistic solution for your business based on your financial situation.
➢ Update patches regularly
As new attack methods emerge, no system can be considered completely secure. As a result,
keeping operating systems and software updates up to date is critical for protecting company data
and reducing the risk of cyber-attacks on enterprise systems. Of course, for the sake of providing the
highest level of system security. Enterprises must install a variety of security solutions that combine
security rules in a timely manner.
➢ Perform encryption of critical data
Finally, before transferring the data, encrypt it. This is an important job that contributes to the
protection of corporate data. In the event that data is lost due to a network assault or compressed
transmission line listening. Data encryption will assist you in preventing sensitive information from
getting into the wrong hands. To protect your data, you should also employ robust encryption. Weak
base64 encoding protections are unsafe and easily decrypted.
III. Summarise the ISO 31000 risk management methodology and its application in IT
security (M3)
Page 19
1. Define ISO 31000 management methodology
The international standard for risk management is BS ISO 31000. What is the definition of risk
management? Through thorough standards and concepts, this standard assists companies in analyzing and
assessing risk. The BS ISO 31000 standard can be applied to all business activities, including planning,
operations management, and information transfer processes, whether you operate in a public, private, or
community organization. This international standard is used to develop management skills and ensure
workplace safety and security to a certain extent in order to control risks to a certain amount. It's referred
to as risk management.
You may manage risk and increase your organization's performance, stakeholder confidence, and reduce
harm by following the concepts and recommendations of BS ISO 31000. This worldwide standard also aids
in the improvement of organizational performance and safety, laying the groundwork for proactive
decision-making and management across the board.
Page 20
Figure 5: ISO 31000 template
Page 21
3. Example of apply ISO 31000 in organization
IFC has 15 years of experience in investment, research and development, equipment design and
production, solution offering, service implementation, and operation and maintenance, having been founded
in 2004. AMR (electronic meter data acquisition system), SCADA/EMS/DMS (supervisory control and
data acquisition system), SmartLight (urban lighting system control), and high-quality large-scale system
operation and management In Vietnam, high quality.
IFC becomes a sustainable development company, leading the market in the fields of automation,
electronics, and information technology in Vietnam, thanks to the application of ISO 31000: 2018 under
the National Quality Productivity program (under Decision 712), which was consulted by productivity
experts from the Center for Information - Communication, Standards, and Quality Measurement. In keeping
with the industrial revolution 4.0 movement, the IFC has established information infrastructure and smart
apps to help the country industrialize and modernize. Supporting local and international enterprises and
consumers in achieving energy management goals, optimizing resources, and connecting ideas in order to
generate valuable goods in the value chain that benefit people.
• With the audit results, it helps you create a benchmark for your organization by weighing your
present security structure and practices.
• Hacker risks are reduced by detecting probable hacker entry points and security weaknesses
ahead of time.
• Verifies your IT infrastructure's compliance with leading regulatory authorities and assists you
in complying.
• Finds gaps in your company's security training and awareness and assists you in making informed
decisions to improve it.
Page 22
➢ Approach Based
• Black Box Audit: In this type of audit, the auditor only has access to publicly available
information on the business being examined.
• White Box Audit: In this sort of security audit, the auditor is given detailed information
about the organization being audited (such as source code, personnel access, and so on).
• Grey Box Audit: To begin the auditing process, the auditor is given certain information
in a grey box audit. Although the auditors might acquire this information themselves, it
is provided to save time.
➢ Methodology Based
• Penetration Tests: The auditor tries to break into the organization’s infrastructure.
• Compliance Audits: Only certain parameters are checked to see if the organization is
complying with security standards.
• Risk Assessments: An analysis of critical resources that may be threatened in case of a
security breach.
• Vulnerability Tests: Necessary scans are performed to find possible security risks.
Many false positives may be present.
• Due Diligence Questionnaires: Used for an analysis of existing security standards in the
organization.
Page 23
• Telecommunications controls: Telecommunications controls are tested on both the client and
server sides, as well as the network that connects them, by auditors.
• Systems development audit: Audits in this area ensure that any systems in development fulfill
the organization's security objectives. This component of the audit is also carried out to ensure
that systems in development adhere to established guidelines.
• Information processing: These audits ensure that security mechanisms for data processing are
in place.
Page 24
3. The roles of stakeholders in the organization
• Direct the Management: Stakeholders can join the board of directors and thereby assist in
decision-making. They can take over and oversee certain departments, such as customer service,
human resources, or research & development, to ensure success.
• They Bring in Money: Stakeholders are the company's major investors, and they have the ability
to bring money in and out at any moment. The financial performance of the company will
influence their selection. As a result, they might exert pressure on management to provide
financial reports and, if necessary, modify methods. Some stakeholders can even increase or
decrease their investment in order to influence the market share price and so improve their
situation.
• Help in Decision Making: The board of directors includes major stakeholders. As a result, they
make choices in collaboration with other board members. They have the ability to sway decisions
as well. They continue to bring forward new ideas and threaten management to obey them.
Stakeholders also have complete control over senior management appointments. As a result, they
are present in every important decision-making area. They make decisions about liquidations and
acquisitions as well.
• Corporate Conscience: Large stakeholders are the company's primary stakeholders, and they
have overseen all of the company's major actions. They have the power to compel the corporation
to follow human rights and environmental regulations. They also keep an eye on outsourcing
activities and have the power to vote against any business action that may jeopardize the
company's long-term objectives.
• Other Responsibilities: The company's primary stakeholders have been watching over all of the
company's major actions. They have the power to compel the corporation to follow human rights
and environmental regulations. They also keep an eye on outsourcing activities and have the
power to vote down any business decision that may jeopardize the company's long-term
objectives.
Page 25
Once the threats have been identified, the likelihood of them occurring must be calculated. A corporation
must also figure out how to avoid those dangers. A few protections could include establishing particular
personnel policies as well as strong physical and network security. There must also be a plan in place for
what to do if a threat materializes. The company's security policy should be distributed to everyone, and
the method for preserving data should be reviewed and modified on a regular basis as new employees join.
3. Security policy examples
Insider threat incidences caused by human error cost businesses an average of $3.8 million each year —
that's a lot of money! Improved cybersecurity rules (and their dissemination) can enable employees in better
understanding how to keep data and apps secure. Here are some security policy examples to consider when
you construct a mature security program:
• Acceptable use policy (AUP) An AUP is a document that specifies the limits and procedures
that employees who use organizational IT assets must agree to in order to access the network or
systems. It's common onboarding procedure for new workers, requiring them to read and sign
the AUP before being given a network ID. SANS has a template for the AUP policy template
that you can use.
• Data breach response policy The data breach response policy's purpose is to establish the
procedure for dealing with a data breach and minimizing the impact on business operations and
consumers. Staff roles and duties in addressing an incident are typically defined in this policy, as
well as standards and metrics, incident reporting, remediation activities, and feedback systems.
SANS has a template for a data breach response policy that you can utilize.
• Disaster recovery plan A disaster recovery plan is created as part of a bigger business continuity
strategy that incorporates advice from both the cybersecurity and IT departments. Following that,
the CISO and assigned teams will handle the event according to the data breach response policy.
The business continuity plan, on the other hand, is only launched if the incident has a severe
impact on the organization. SANS provides a disaster recovery plan template that you can utilize.
• Business continuity plan A business continuity plan (BCP) outlines how the company would
operate in the event of a disaster and coordinates activities across the board. Furthermore, BCP
will work in tandem with the disaster recovery plan to restore hardware, software, and data that
are critical to business continuity.
• Remote access policy Remote labor during COVID-19 raised data breach expenses in the United
States by $137,000, according to an IBM analysis. A remote access policy, which specifies and
sets procedures for remotely accessing the organization's internal networks, can be implemented.
When scattered networks having the ability to expand into insecure network locations, such as
home networks or coffee shops, organizations require this strategy.
• Access control policy The criteria for user access, network access restrictions, and system
software controls are all defined by an access control policy (ACP). Techniques for monitoring
how systems are accessed and used, how access is terminated when an employee departs the
organization, and how unattended workstations should be secured are common additional
supplementary features.
4. The most and should that must exist while creating a policy
• Purpose: The policy's aims and expectations are well-defined.
Page 26
• Policy Compliance: Some security policy requirements may be influenced by federal and state
rules, so it's important to keep track of them.
• Last Tested Date: Policies must be a dynamic document that is examined and challenged on a
regular basis.
• Policy Last Updated Date: To react to changes in the company, outside threats, and technology,
security policy texts must be updated.
• Contact: All individuals inside a company are expected to read, understand, and follow
information security policies, thus there must be an owner if there are any questions.
Page 27
Define the target audience for the information security policy. You can also select which
audiences are excluded from the policy's coverage (for example, staff in another business unit which
manages security separately may not be in the scope of the policy).
• Information security objectives
Assist your management team in defining well-defined strategy and security objectives. The
three main goals of information security are:
o Confidentiality - Only authorized individuals should have access to data and
information assets.
o Integrity - Data must be complete, accurate, and undamaged, and IT systems must
remain operating.
o Availability - Users should be able to access information or systems whenever they
need them.
• Authority and access control policy
o Hierarchical pattern - A senior manager might be able to decide what data can be shared
and with whom. A senior manager's security policy may differ from that of a junior
employee. Each organizational role's level of authority over data and IT systems should be
specified in the policy.
o Network security policy - Users can only access company networks and servers through
one-of-a-kind logins that require authentication, such as passwords, biometrics, ID cards, or
tokens. You should keep an eye on all systems and keep track of all login attempts.
• Data classification
Data should be classified into categories such as "top secret," "secret," "confidential," and
"public," according to the guideline. When it comes to data classification, your goal is to:
o To make sure that people with lower clearance levels can't access important
information
o To safeguard highly sensitive data while avoiding unnecessary security measures for
less sensitive data
• Data support and operations
o Data protection regulations - Organizational standards, best practices, industry
compliance requirements, and relevant regulations must all be followed while storing
personal data or other sensitive data. Encryption, a firewall, and anti-malware protection are
all required by most security standards.
o Data backup - Encrypt data backups in accordance with industry standards. Backup media
should be kept in a secure location, or backups should be moved to a secure cloud storage
location.
o Movement of data - Only use secure protocols to send data. Any information copied to
portable devices or transmitted over a public network should be encrypted.
• Security awareness and behavior
Your employees should be aware of your IT security procedures. Conduct training sessions
for staff to learn about your security policies and mechanisms, such as data protection, access
control, and sensitive data classification.
o Social engineering - Particular attention should be paid to the threats of social
engineering attacks (such as phishing emails). Employees should be held accountable
for detecting, preventing, and reporting such assaults.
Page 28
o Clean desk policy - A cable lock is a good way to keep laptops safe. Documents that
are no longer needed should be shredded. Maintain a tidy printer area to prevent
documents from falling into the wrong hands.
o Acceptable Internet usage policy - Specify how the Internet should be governed. Do
you allow YouTube, social media websites, and other similar sites? Using a proxy,
you can block websites that you don't want to visit.
• Encryption policy
Encryption is the process of encrypting data in order to make it inaccessible to or invisible to
unauthorized parties. It aids in the protection of data at rest and in transit between places, ensuring
that sensitive, confidential, and proprietary information remains private. It can also make client-
server communication more secure. An encryption policy aids businesses in defining:
o The devices and media that the company needs to encrypt
o When encryption is required
o The minimal requirements for the encryption program you've chosen.
• Data backup policy
A data backup policy establishes the rules and methods for creating data backup copies. It's an
important part of your entire data security, business continuity, and disaster recovery plan. The
following are some of the most important features of a data backup policy:
o Identifies all data that the company needs to back up.
o Determines the backup frequency, such as when to make a full backup and when to do
incremental backups.
o Defines the place where backup data is stored.
o Lists all positions responsible for backup processes, such as backup administrators and
IT team members.
• Responsibilities, rights, and duties of personnel
Appoint personnel to conduct user access evaluations, education, change management, incident
management, security policy execution, and periodic updates. As part of the security policy,
responsibilities should be clearly specified.
• System hardening benchmarks
The information security policy should include security benchmarks for Linux, Windows
Server, AWS, and Kubernetes that the organization will employ to harden mission-critical systems,
such as the CIS benchmarks for Linux, Windows Server, AWS, and Kubernetes.
• References to regulations and compliance standards
Regulations and compliance requirements that affect the organization, such as GDPR, CCPA,
PCI DSS, SOX, and HIPAA, should be referenced in the information security policy.
Page 29
➢ Implement
➢ Monitor, review, revise
VII. List the main components of an organisational disaster recovery plan, justifying
the reasons for inclusion. (P8)
1. Disaster Recovery Plan
Any solid disaster recovery strategy has seven basic components. These include asset mapping,
determining the criticality and context of your assets, completing a risk assessment, defining your recovery
objectives, selecting a disaster recovery setup, funding for your setup, and testing and reviewing the plan.
2. 7 Components That Make A Great Disaster Recovery Plan
➢ Take Inventory of IT Assets
To begin, make a list of all your assets and decide which ones need to be safeguarded. Here are
some examples of assets:
o Network equipment
o Hardware
o Software
o Cloud services
o Critical data
Though time-consuming, compiling a list of assets can provide you with a comprehensive
understanding of your company's processes. Update your list on a regular basis as assets are
added, removed, or modified, and use it to purge unnecessary information.
➢ Sort Assets According to Criticality and Context
Now that you've taken inventory of your assets, you need to consider them in context. How
does your company put these assets to use? In the event of a disaster, which assets, if
compromised or lost, would have the greatest impact? Examine all of your mapped assets and
classify them from high to low impact.
Backing up all of your data is not always possible. Understanding the importance of each asset
and how they interact will allow you to prioritize which assets to prioritize in your disaster
recovery plan.
➢ Assess Potential Risks
Not all threats are created equal. What are the most serious threats to the overall health of your
company? Which assets are most likely to be targeted by these threats? Because critical systems
personnel are familiar with the most likely causes of service disruption, their input at this stage
is invaluable. You can't foresee every possible threat, but you can devise an effective plan by
weighing the likelihood and magnitude of each.
➢ Define Your RTO and RPO
There are two types of recovery objectives: recovery time objectives (RTO) and recovery point
objectives (RPO) (RPO). RTO refers to the amount of time your assets can be down before being
recovered, and RPO refers to the amount of data you are willing to lose. These objectives should
be defined early in the development of your disaster recovery plan in order to select an appropriate
setup.
Consult with your company's senior management and operations personnel for as little as one
minute, up to one day, or even longer, to discuss the potential disruption's impact. This data will
Page 30
enable you to define your RTO and RPO, as well as how frequently your data should be backed
up.
➢ Select A Disaster Recovery Setup
It is critical to have a remote data storage solution in place to protect your assets from cyber-
attacks and natural disasters that may cause physical damage. After you've mapped out your
required setup, select the cloud services, software, hardware, and partners you'll require to finish
it.
➢ Propose A Budget
All businesses, regardless of size or resources, should have a disaster recovery plan. Senior
management should be reminded of the importance of disaster recovery, but several options at
different price points should be presented.
Higher budgets will include a disaster recovery plan with improved RTOs and RPOs, more
generous support for critical services, and may be part of a larger business continuity plan. Each
company's disaster recovery plan requirements will vary, and with the right information,
management can balance risk and investment in disaster recovery plan technology to find the
right balance.
➢ Test and Review
To ensure that the disaster recovery plan is ready, it will need to be tested and reviewed in the
final stage. In the event of a disaster, all employees must be aware of their responsibilities.
Conduct a disaster drill to test the plan and see how employees react to the threat. Make changes
to the plan if things don't go as smoothly as you'd like.
A disaster recovery plan can never be fully implemented. It should be reviewed on a regular
basis, preferably every six months or so, to ensure that it remains effective. Assets, organizational
structure, and IT configuration will all change over time, necessitating the updating of the disaster
recovery plan.
To achieve these objectives, you will need to A) conduct an analysis of potential threats, B) keep IT
systems in good working order, and C) seek innovative solutions that will ensure business continuity
while focusing on cybersecurity.
On-time updates and the use of more innovative hardware and software can save businesses a lot of
money in the long run. Furthermore, an even larger shift is being observed, with an increasing number
of organizations adopting cloud-based data management over local storage and operations. As part of
disaster recovery planning, this pivot can reduce the cost of archive maintenance and the creation of
comprehensive backups.
Page 31
3.2. Increased Employee Productivity
A disaster recovery plan must be carried out by the appropriate individuals. When specific roles and
responsibilities are assigned ahead of time, both effectiveness and productivity improve.
In some cases, disaster recovery planning may imply having at least two people who can handle the
same task. Such redundancies can be extremely beneficial in the long run. When multiple employees
are capable of handling a given task, organizations can gain peace of mind about the network's overall
integrity. Furthermore, if someone is on vacation or sick leave, there will still be a qualified individual
within the organization who can handle the relevant task.
Likewise, the same cross-training rule applies when an employee leaves the company. These are
just a couple of scenarios that could be anticipated and addressed in a disaster planning strategy.
3.3. Greater Customer Retention
Clients nowadays expect nothing less than perfection and dependability. In the event of a failure or
downtime, they are unforgiving. Clients will simply move on to another service provider if a company
fails to meet their expectations.
Disaster recovery planning enables businesses to maintain a high level of service quality in the face
of adversity. Regaining an old customer after an IT disaster can be nearly impossible – a disastrous
effect that many businesses have firsthand.
Downtime will have a significant impact on customers in some industries. This is especially true for
business-to-business (B2B) service providers. The integrity of your company will have an impact on
the integrity of your clients' businesses. As a result, a chain reaction can result in the failure of multiple
businesses and a tarnished reputation.
By lowering the risk of downtime and data loss, your clients can be confident that they will receive
adequate service even if disaster strikes. As a result, investing in disaster recovery planning is a must
when it comes to long-term customer retention.
3.4. A Better Understanding of Scalability
Identifying innovative solutions is one of the most important things you'll have to do when planning
disaster recovery. Cloud-based data storage and backups, for example, simplify archive maintenance,
improve backup effectiveness, and lower disaster recovery costs.
Because cloud options are easily scalable, they provide more flexibility than onsite or offsite data
center maintenance. A switch can be completed long before a disaster strikes (if at all), and as the
company's technical demands change, so will the storage solution.
Disaster recovery planning begins with extensive research and comparison of options. Businesses
that engage in such a strategic process can quickly discover a data storage solution that makes far more
sense than the one currently in use and that can be tweaked on the fly.
VIII. Presentation
Link: https://bitly.com.vn/m4t10n
IX. Reference
SearchCompliance. (2022). What is a Risk Assessment? - Definition from WhatIs.com. [ONLINE]
Available at: https://searchcompliance.techtarget.com/definition/risk-assessment. [Accessed 29 April 2022].
Page 32
CCOHS. (2022). Risk Assessment : OSH Answers . [ONLINE] Available at:
https://www.ccohs.ca/oshanswers/hsprograms/risk_assessment.html#:~:text=Risk%20assessments%20are%
20very%20important,the%20public%2C%20etc. [Accessed 29 April 2022].
Investopedia. (2022). Asset Definition. [ONLINE] Available at:
https://www.investopedia.com/terms/a/asset.asp. [Accessed 29 April 2022].
Techopedia. (2022). What is Data Protection? - Definition from Techopedia. [ONLINE] Available at:
https://www.techopedia.com/definition/29406/data-protection. [Accessed 29 April 2022].
SecurityBox. (2022). Hướng dẫn 11 bước bảo mật dữ liệu cho doanh nghiệp. [ONLINE] Available at:
https://securitybox.vn/1281/huong-dan-tung-buoc-bao-mat-du-lieu-cho-doanh-nghiep/. [Accessed 29 April
2022]
QMS International. (2022). ISO 31000 - Risk Management | QMS International. [ONLINE] Available at:
https://www.qmsuk.com/iso-standards/iso-31000. [Accessed 29 April 2022].
VietQ. (2022). ISO 31000:2018: Thành công từ mô hình của IFC. [ONLINE] Available at:
https://vietq.vn/iso-310002018-giup-cong-ty-co-phan-dau-tu-va-phat-trien-ha-tang-vien-thong-han-che-rui-
do-va-lang-phi-d173192.html. [Accessed 29 April 2022].
Varghese, J. (2022). IT Security Audit: Importance, Types, and Methodology. [ONLINE] Available at:
https://www.getastra.com/blog/security-audit/it-security-audit/. [Accessed 29 April 2022].
SearchCIO. (2022). What is a security audit?. [ONLINE] Available at:
https://www.techtarget.com/searchcio/definition/security-
audit#:~:text=Security%20audits%20will%20help%20protect,and%20can%20catch%20new%20vulnerabilit
ies. [Accessed 29 April 2022].
Investopedia. (2022). Stakeholder Definition. [ONLINE] Available at:
https://www.investopedia.com/terms/s/stakeholder.asp. [Accessed 29 April 2022].
Techopedia. (2022). What is Security Policy? - Definition from Techopedia. [ONLINE] Available at:
https://www.techopedia.com/definition/4099/security-policy .[Accessed 29 April 2022].
SecurityScorecard. (2022). 6 Examples of Essential Cybersecurity Policies… | SecurityScorecard.
[ONLINE] Available at: https://securityscorecard.com/blog/cybersecurity-policy-examples . [Accessed 29
April 2022].
VARONIS. (2022). How to Create a Good Security Policy. [ONLINE] Available at:
https://www.varonis.com/blog/how-to-create-a-good-security-policy. [Accessed 29 April 2022].
Exabeam. (2022). Information Security Policy - Everything You Should Know | Exabeam. [ONLINE]
Available at: https://www.exabeam.com/information-security/information-security-policy/ . [Accessed 29
April 2022].
Page 33
Axiom. (2022). 7 Components That Make A Great Disaster Recovery Plan - Axiom. [ONLINE]
Available at: https://www.axiom.tech/7-components-that-make-a-great-disaster-recovery-
plan/#:~:text=There%20are%20seven%20main%20components,testing%20and%20reviewing%20the%20pl
an. [Accessed 29 April 2022].
Page 34