2nd Semester: Unit 1 Security 2022
2nd Semester: Unit 1 Security 2022
2nd semester
SECURITY
EMC CYBER
Binadi Jayarathne
Student Declaration
Confidentiality
C.I.A.
TRIAD
Integrity Availability
CIA stands for Confidentiality, Integrity and Availability. It is a highly efficient security
model that is used to form the basis of the development of security systems and policies. The
origin of this triad is unclear but it is said that even war generals such as Julius Caesar used
this model to safeguard critical information.
Confidentiality, the first factor, means that data should be kept secret, private and out of reach
from individuals who aren’t supposed to access them. For example, bank accounts must only
be accessed by the owner and the relevant employees in the bank and not anyone else.
Integrity involves in making sure that your data is trustworthy and free from being subjected
to unnecessary changes. The integrity of data only remains if it is authentic, accurate and
reliable. But there would be point in the first two factors if not for the last one. Availability
means that data must be available for individuals to whom they serve. This means individuals
who have access to specific information must be able to access it whenever they need
wherever they are, without having to wait for an inordinate amount of time. These three key
components in maintaining security can be compromised accidentally or deliberately.
How can the CIA triad be used to enhance the security of the EMC CYBER company?
a. Classify data and information in the company into these types according to
the privacy and security level.
b. Identify and label restricted data and collect them into one folder.
Example:
Financial data, IP addresses etc.
c. Encrypt restricted data.
Example:
Use full-disk encryption(FDE)
Whole disk encryption encrypts the entire disk including swap files,
system files, and hibernation files. If an encrypted disk is lost, stolen, or
placed into another computer, the encrypted state of the drive remains
unchanged, and only an authorized user can access its contents. It is the
most secure way to encrypt or hide data and it supports most OS. You can
get access to the data by a password or pin.
A threat exploits a vulnerability and can damage or destroy an asset. They have the potential
to steal or damage data, disrupt business, or create harm in general. Threats in cyber security
are often called cyber threats. These threats can be divided into 3 main parts.
Intentional threats
Threats
Unintentional threats
Natural threats
Intentional threats are methods like malware, ransomware, phishing, malicious code that are
used to intentionally compromise a security or software system.
Unintentional threats often occur by human error. Being unaware about threats, leaving
sensitive information unmonitored, not doing regular updates when needed and simply
keeping the door open for thieves to sneak in are some of the many ways these threats could
occur.
Natural threats are acts of nature such as floods, tornadoes, earthquakes etc. While they aren’t
typically associated with cyber security, they are unpredictable and can damage your assets.
Below are some threats that may have an impact on the EMC Cyber Company.
1. Computer Virus
2. Trojan Horse
A Trojan Horse Virus is a type of malware that downloads onto a computer disguised as a
legitimate program. When the program is downloaded the malicious codes that the attacker
hid in the program will execute the task the attacker designed it for, such as gain access to
corporate systems, spy on user’s online activity or steal sensitive data.Just like the actual
Trojan horse, a real enormous wooden horse, in which the enemies of the city of Troy were
able to get inside the city gates pretending the horse was a gift. When inside the soldiers
inside the horse climbed out and let the rest in as well.
There are a few elements of the history of the real Trojan horse makes it an appropriate name
for these types of cyber attacks :
In the original story, the attackers hadn’t succeeded in defeated the city’s defence
system for 10 years until they came up with the Trojan horse. Similarly, this type of
malware can be a good way to get behind an otherwise tight set of defences.
The Trojan horse appeared to be a legitimate gift, just like how the Trojan virus seems
to be a legitimate system.
The soldiers in the Trojan horse controlled the city’s defence system. Similarly, the
malware takes control of your computer, potentially leaving it vulnerable to other
“invaders”.
Backdoor Trojan
Banker Trojan
Distributed denial-of-service Trojan
Downloader Trojan
Exploit Trojan
3. Computer worm
A computer worm self-replicates and infects other uninfected computers while remaining
active on infected systems. It often does this by exploiting parts of an operating system that
are automatic and invisible to the user. It is common for worms to be noticed only when their
uncontrolled replication consumes system resources, slowing or stopping other tasks.
4. Bots
A ‘bot’ – short for robot – is a software program that performs automated, repetitive, pre-
defined tasks. Bots typically imitate or replace human user behaviour. Because they are
automated, they operate much faster than human users. They carry out useful functions, such
as customer service or indexing search engines, but they can also come in the form of
malware – used to gain total control over a computer. A bot can also appear as a warning
saying that your computer will get a virus if you do not click on the associated link. Clicking
the link subsequently infects your computer with a virus. Internet bots can also be referred to
as spiders, crawlers, or web bots.
Malware bots and internet bots can be programmed/hacked to break into user accounts, san
the internet for contact information, to send spam, or perform other harmful acts. To carry out
these attacks and disguise the source of the attack traffic, attackers may distribute bad bots in
a botnet. ( a bot network ) A botnet is a number of internet connected devices, each running
one or more bots, often without the device owners’ knowledge. Because each device has its
own IP address, botnet traffic comes from numerous IP addresses, making it harder to
identify and block the source of the malicious bot traffic. Botnets can often grow themselves
by using devices to send out spam emails, which can infect more machines.
One of the most common ways in which bots infect your computer is via downloads.
Malware is delivered in download format via social media or email messages that advise
clicking a link. The link is often in picture or video form, with either containing viruses and
other malware. If your computer is infected with malware, it may be part of a botnet. While
malware bots create problems and issues for organizations, the dangers for consumers include
their potential for carrying out data and identity theft, keylogging sensitive information such
as passwords, bank details and addresses, and phishing.
Spambots
Malicious chatterbots
File-sharing bots
Credential stuffing
DoS or Ddos bots
5. Adware
Adware is unwanted software designed to throw advertisements up on the user’s screen, most
often within a web browser. It uses an underhanded method to either disguise itself as
legitimate, or hide itself within another program to trick the user into installing it on their
device. Once adware hijacks someone’s device, it might carry out all sorts of unwanted tasks.
The software's functions may be designed to analyse the location and which Internet sites the
user visits, and then present advertising pertinent to the types of goods or services featured
there. While adware is more of a nuisance than a harmful malware threat to cyber security, if
the adware authors sell the user’s browsing behaviour and information to third parties, they
can even use it to target the user with more advertisements customized to the user’s viewing
habits.
Ransomware is a form of malware designed to encrypt files on a device, rendering any files
and the systems that rely on them unusable. Malicious actors then demand ransom in
exchange for decryption.
Network vulnerabilities
OS vulnerabilities
Human vulnerabilities
Process vulnerabilities
Network vulnerabilities are issues with a network’s hardware or software that expose it to
intrusion by someone outside. Examples include, insecure Wi-Fi access points and poorly-
configured firewalls.
Cyber risk is the intersection of assets, threats and vulnerabilities. It’s the potential for loss,
damage or destruction of an asset when a threat takes advantage of a vulnerability. If you put
it in another way:
The end goal of a DMZ is to allow an organization to access untrusted networks, such as the
internet, while ensuring its private network or LAN remains secure. Organizations typically store
external-facing services and resources, as well as servers for the Domain Name System (DNS),
File Transfer Protocol (FTP), mail and web servers in the DMZ.
These servers and resources are isolated and given limited access to the LAN to ensure they can
be accessed via the internet but the internal LAN cannot. As a result, a DMZ approach makes it
more difficult for a hacker to gain direct access to an organization’s data and internal servers via
the internet.
The main benefit of a DMZ is to provide an internal network with an advanced security layer by
restricting access to sensitive data and servers. A DMZ enables website visitors to obtain certain
services while providing a buffer between them and the organization’s private network. As a
result, the DMZ also offers additional security benefits, such as:
1. Enabling access control: Businesses can provide users with access to services outside the
perimeters of their network through the public internet. The DMZ enables access to these services
while implementing network segmentation to make it more difficult for an unauthorized user to
reach the private network. A DMZ may also include a proxy server, which centralizes internal
traffic flow and simplifies the monitoring and recording of that traffic.
2. Preventing network investigation: By providing a buffer between the internet and a private
network, a DMZ prevents attackers from performing the investigation work they carry out the
search for potential targets. Servers within the DMZ are exposed publicly but are offered another
layer of security by a firewall that prevents an attacker from seeing inside the internal network.
Even if a DMZ system gets compromised, the internal firewall separates the private network from
the DMZ to keep it secure and make external investigation difficult.
3. Blocking Internet Protocol (IP) fooling: Attackers attempt to find ways to gain access to
systems by spoofing an IP address and impersonating an approved device signed in to a network.
A DMZ can discover and stall such spoofing attempts as another service verifies the legitimacy of
Static IP address
Having Static IP addresses can help in many ways when it comes building an entrusted
system. Some of these ways are list down below,
NAT
Network Address Translation (NAT) is a process that enables one, unique IP address to,
represent an entire group of computers. In network address translation, a network device,
often a router or NAT firewall, assigns a computer or computers inside a private network a
public address. In this way, network address translation allows the single device to act as an
intermediary or agent between the local, private network and the public network that is the
internet. NAT’s main purpose is to conserve the number of public IP addresses in use, for
both security and economic goals.
EMC Cyber
Disaster
Recovery Plan
2)Policy Statement
Corporate management has approved the following policy statement:
The disaster management team of the company shall design a widespread IT disaster
recovery plan.
A formal risk assessment shall be undertaken for the determination of the
requirements for the disaster recovery plan.
The disaster recovery plan should cover all essential and critical infrastructure
elements, systems and networks, in accordance to the main business activities.
The disaster recovery plan should be tested in a virtual environment tested once every
couple of months so that it can be implemented in emergencies without hesitation and
that the management and staff understand how to act accordingly to it without doubt.
All staff members must be made aware of the disaster recovery plan and their own
respective roles.
The disaster recovery plan is to be kept up to date and is to be modified when needed
to avoid future mishaps.
3)Objectives
The main objective of this disaster recovery plan (DRP) is to for it to be well-structured,
comprehensive and easily understood so that it will be most helpful to maintain the business
continuity of our company, EMC Cyber, in case of an anticipated or unforeseen disaster.
Further objectives are as follows:
Team Wardens
Ayan Abbas Samadhi Nisansala
011-345-1234 011-875-1234
077-678-3333 071-879-3900
Team Leads
Person identifying
incident
Edward De Silva
011-693-1234
David Williams Nalini Gunasekara 077-253-3964
011-387-1234 011-456-1234
071-778-3441 071-345-2322 Anjana Gunasekara
011-911-1234
078-368-5535
Mobile 077-173-7812
Mobile 074-145-7452
Mobile 077-244-3579
Mobile 072-654-4577
Mobile 078-788-2369
Mobile 077-777-7776
1. Plan Overview
Auto standby
generator (tested
regularly)
Nearest police
station: Town hall
Police station,
Colombo 7
In-charge of all
company’s hardware
devices – Mr.
Marcus Fernando
(Tel no. : 077-123-
7653)
Regular software
updates on all
devices.
2. Emergency
3. Media
4. Insurance
Insurance policies are also a part of the DRP for it is an important business continuity
strategy. These policies include, errors and omissions, liability and business interruption
insurance.
Policy Coverage Amount of Person Next Renewal
Period Coverage Responsible for Date
Coverage
General liability 02 years 100,000 Mr. Indika 01/01/2024
insurance Dayarathne
Directors and 02 Years 120,000 Mrs. Anupama 01/01/2024
officers liability Perera
insurance
Property 03 Years 900,000 Mrs. Chen Yee 01/01/2025
insurance
Vehicle 03 Years 800,000 Mr. M. Nazeem 01/01/2025
insurance
Business 01 Year 1,000,000 Mr. Shawn 01/01/2023
The ERT shall prepare an initial assessment of the impact of the incident on the financial
affairs of the company. The assessment should include:
The immediate financial needs of the company must also be addressed by the ERT.
These may include,
The legal team and Emergency response team shall work together and review the aftermath
of the incident and decide whether there may be legal actions resulting from the disaster.
6. DRP Exercising
To launch a successful disaster recovery plan into action smoothly and efficiently with a
minimum number of mistakes, every employee must play their assigned role properly. To do
this everyone should have their duty practiced and rehearsed more than one time. Therefore,
DRP exercises are a crucial part of the DRP. No one fails or passes in these exercises and no
one will be judged on them. They will be done simply to ensure that all members of the
emergency teams as well as everyone who has at least a small part in the DRP are confident
of their capabilities, familiar with their roles and well-practiced and ready whenever a
disastrous situation unravels itself.