1 - Unit 5 - Assignment 2 Frontsheet
1 - Unit 5 - Assignment 2 Frontsheet
1 - Unit 5 - Assignment 2 Frontsheet
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Grading grid
P5 P6 P7 P8 M3 M4 M5 D2 D3
❒ Summative Feedback: ❒ Resubmission Feedback:
An asset is any important data, gadget, or other component of an organization's systems, frequently
because it holds sensitive data or may be used to obtain such data.
An employee's desktop computer, laptop, or company phone, for example, would be regarded an asset,
as would the apps on such devices. Critical infrastructure, such as servers and support systems, is also
an asset.
The most common assets in an organization are information assets. These include databases and
physical files, which contain sensitive information.
The 'information asset container,' which is where the information is maintained, is a related idea. This
is the application that was used to construct the database in the case of databases. It is the filing cabinet
where the information is kept for physical files.
A risk assessment framework (RAF) can be used by businesses to prioritize and share the contents
of their risk assessment, including any hazards to their information technology (IT) infrastructure. The
RAF assists an organization in identifying prospective dangers, as well as any business assets put at
risk by these hazards, as well as potential impact if these risks occur.
Users utilize the risk assessment process to examine their companies in order to:
Identify procedures and situations that have the potential to create harm, particularly to people.
Determine the likelihood of each hazard occurring and the severity of the consequences.
Determine what steps the organization can take to prevent or mitigate these threats from
occurring.
It's vital to know the difference between dangers and risks. Workplace accidents, crises, dangerous
substances, employee conflicts, stress, and other factors are all considered hazards. The risk of a
hazard, on the other hand, is the likelihood that it will cause harm. As part of your risk assessment
plan, you will identify risks, but you will also quantify the risk or likelihood of the hazards occurring.
A risk assessment plan's objective varies by industry, but in general, it helps firms prepare for and
combat risk. Other goals are as follows:
Examine your workplace to see whether practices or activities may be detrimental to your firm.
Include all areas of employment, including remote workers and non-routine duties such as repair and
maintenance. You should also go over accident/incident reports to see what hazards have already
impacted your company.
Step 2: Determine who might be harmed and how: You must determine which groups of people
in your company may be damaged by physical assaults, threats, intimidation, or verbal abuse.
Consider all of the people who work in your office at any given time. Maintenance workers,
security guards, and other contractors are examples of personnel that do not have regular shifts or
work patterns. Customers, guests, and members of the general public must all be considered.
o Young workers and trainees may be more vulnerable since they have had less training in
dealing with irate customers, robbery, and sexual harassment. They may also struggle to
recognize risky circumstances due to a lack of expertise.
o Temporary workers may be more vulnerable since they have received less training or
information about workplace violence than permanent employees.
o Night/shift employees, notably those working late at night, are more vulnerable since more
violent incidents occur at night. Furthermore, certain days of the week or times of day are
more dangerous than others, such as opening and closing times. Key holders may feel
especially insecure, and delivery of items is a high-risk period.
o Lone employees are more vulnerable because they lack the assistance of coworkers who
can act as a deterrent to a possible assailant or provide instant help and support if a problem
arises. In addition, if a violent incident occurs and a member of staff is harmed, it may take
longer for help to arrive. As a result, lone workers require special consideration in terms of
training and supervision, among other things.
Step 3: Evaluate the risks and take precautions:
The goal of this step is to consider ways to manage the risks of harm from workplace violence.
This can include avoiding a certain hazard entirely, minimizing its risk, or finding measures to
mitigate any harm that does occur. You must ensure that you have reduced hazards "to the greatest
extent reasonably practicable."
The risk is the possibility, high or low, that someone will be damaged by the hazards listed in step
1, as well as an indication of how serious the harm could be. A risk factor is something that
increases the likelihood of the hazard occurring.
At this level of your risk assessment, you must determine whether your company faces a
significant danger of violence. You can accomplish this in a variety of ways, but arguably the
simplest way to begin is to ask your employees and safety reps about their experiences. Sickness
absence numbers, personnel turnover, injury and illness records (especially occurrences of work-
related violence), stock losses, and police records can also be examined. Your local police
department may be willing to release crime data for your business to assist you in determining how
to combat violence and crime on your property. RIDDOR reports can also be a good source of
information, and crime mapping can assist you decide where to focus your efforts.
Risk factors: Because of the nature of their business, licensed and retail establishments are
more likely to see violence. Among these are:
Dealing with enormous sums of money or exchanging money.
Your employees making direct eye contact with customers.
Opening late at night or in the evening.
Managing customer complaints and conflicts. Dealing with irate consumers in
disputes/complaints, such as over goods, services, and refunds, allegations of short-
changing or cash blunders, or non-authorization of card purchases, can result in
embarrassment and violence.
Decide on precautions: The following stage is to determine whether there is anything else you
can do. Have you mitigated the hazards "to the greatest extent reasonably practicable"? To
accomplish this, you will need to:
Examine your existing controls to check they are functioning properly.
Consult with your employees about their suggestions. Employees have hands-on
knowledge and insight into their workplace, making them an excellent source of
information and ideas. Involving your employees will also inspire them to adopt and
own the arrangements you make. You should include your staff by having them:
1. Participate in the development and implementation of procedures to reduce the
risk of violence.
2. Participate in the assessment of any control measures.
3. Share your on-the-job experiences to assist other employees in recognizing and
responding to violence.
Compare your actions to current best practices, which are outlined in the Quick guide to
control measures.
Determine any further control measures required to decrease the risk to the lowest
achievable level.
Step 4: Record your findings and implement them: At this point, you should have identified the
measures you are already taking to keep your employees safe, as well as activities you may take to
enhance things even more. You must determine how you will carry out these actions. Remember
that it is action, not paperwork, that protects people; risk assessment is a tool, not an end in itself.
You will need to prioritize, and you may wish to consider the following to help you do so:
o Can I use multiple measures? Combining measures may be more successful than
relying solely on one. Can I employ a combination of short and long-term methods to
achieve both 'instant wins' and long-term effectiveness?
o How will employees react to these measures? How do I illustrate the worth of the
metrics?
o What are the potential drawbacks of the measures, such as clothing rules, searches, and
severe return policies?
o What will these treatments cost in terms of effectiveness? Control methods do not
always have to be costly in order to be successful.
Once you've decided what steps to take to keep your employees secure, you must put them into
action. Remember that documentation alone will not protect people; only when actions are
performed will they be protected.
o Appoint someone to be in charge of ensuring that the actions are carried out.
o Make certain that the measures are reasonable and agreed upon within certain
timeframes.
o Determine how you will effectively and consistently communicate, instruct, and train
your employees on your measurements.
Step 5: Review your risk assessment and update if necessary:
Nothing remains constant indefinitely. You can determine whether your control methods are
effective by speaking with your employees and monitoring incident rates and control measures.
Managers and staff must be given responsibility for overseeing the process and developing
reporting methods, as well as debating and assisting in the implementation of solutions and
assessing their efficacy.
Your risk assessment should be revisited on a regular basis to confirm that the risk of employee
harm from workplace violence has not altered and that no further control measures are required. It
should also be evaluated if there are any changes in your business that may enhance the risk of
violence, such as lone working or changes in the type of the work you undertake.
There is no legal time limit for reviewing your risk assessment. It is up to you to decide when a
review is appropriate, but the risk assessment is a living document that should be recorded and
updated as your company's experiences evolve. As a general rule, risk assessments should be
revisited on an annual basis.
Identify the organization's assets (e.g., network, servers, apps, data centers, tools, and so
on).
Create individual risk profiles for each asset.
Learn about the data that these assets store, transport, and generate.
Determine the asset's importance in terms of business operations. This includes the total
influence on revenue, reputation, and the likelihood of a company being exploited.
Determine the risk ranking of assets and prioritize them for evaluation.
Based on the assessment results, implement mitigation controls for each asset.
It is critical to recognize that a security risk assessment is not a one-time security exercise. Rather,
it is a constant action that should be carried out at least every other year. Continuous assessment
gives a current and up-to-date snapshot of the threats and risks to which a business is exposed.
Synopsys recommends annual examinations of important assets with a high impact and risk of
failure. The assessment process generates and collects a wealth of useful data. Here are a few
examples:
Information about:
Data repositories (for example, database management systems, files, and so on).
Security controls in place (for example, authentication systems, access control
systems, antivirus, spam controls, network monitoring, firewalls, intrusion detection
and prevention systems).
Current baseline operations and security standards for regulating bodies'
compliance.
Assets, risks, and vulnerabilities (including the consequences and likelihood of
occurrence).
Previous technical and procedural assessments of applications, policies, network
systems, and so on.
Mapping of mitigation controls for each asset risk identified.
As the amount of data created and saved continues to expand at unprecedented rates, the need of data
protection grows. There is also minimal tolerance for downtime, which might make access to critical
information impossible.
As a result, ensuring that data can be restored rapidly after corruption or loss is an important aspect of
a data protection strategy. Data protection also includes safeguarding data against compromise and
preserving data privacy.
2. Principles of data protection
The main principles of data protection are to protect and make data available in all circumstances.
Data protection refers to both operational data backup and business continuity/disaster recovery
(BCDR). Data security techniques are advancing in two directions: data availability and data
management.
Data availability ensures users have the data they need to conduct business even if the data is damaged
or lost.
The two basic parts of data management used in data protection are data lifecycle management and
information lifecycle management.
The process of automating the movement of vital data to online and offline storage is known as
data lifecycle management.
Information lifecycle management (ILM) is a complete strategy for valuing, categorizing, and
safeguarding information assets from application and user failures, malware and virus attacks,
equipment failure, and facility outages and interruptions.
Data management has lately expanded to include developing ways to extract corporate value from
otherwise dormant copies of data for reporting, test/dev enablement, analytics, and other applications.
Mirroring allows businesses to produce an exact clone of a website or files so that they are accessible
from many locations.
Storage snapshots can generate a set of pointers to information saved on tape or disk automatically,
allowing for speedier data recovery, whereas continuous data protection (CDP) backs up all data in a
business anytime a change is made.
RAID protection is a less expensive option that requires less overhead capacity. RAID combines
physical drives into a logical unit that appears to the operating system as a single hard drive. RAID
stores the same data on many drives in separate locations. As a result, I/O activities overlap in a
balanced manner, improving performance and security.
RAID protection must compute parity, a technique that determines if data has been lost or
overwritten as it is transferred from one storage location to another. This calculation uses up
compute resources.
The time it takes to return to a protected state is the cost of recovering from a media failure.
Mirrored systems can quickly restore to a protected state; RAID systems take longer since all
parity must be recalculated. When doing a drive rebuild, advanced RAID controllers do not need to
read an entire drive to retrieve data. They merely have to rebuild the data on that drive. Given that
most drives operate at roughly one-third capacity; clever RAID can drastically cut recovery times.
Erasure coding, like RAID, employs parity-based data protection schemes, writing both data and
parity across a cluster of storage nodes. Because erasure coding allows all nodes in a storage
cluster to participate in the replacement of a failing node, the rebuilding process is not CPU-
constrained and occurs faster than it would in a standard RAID array.
Another data protection option for scale-out storage is replication, which involves mirroring data
from one node to another or numerous nodes. Although replication is less complicated than erasure
coding, it requires at least twice the capacity of the protected data.
Data corruption: Snapshots can be used to restore data that has been corrupted or mistakenly
erased. Most storage systems today can track hundreds of snapshots without affecting performance
much.
Storage systems that use snapshots can collaborate with platforms like Oracle and Microsoft SQL
Server to capture a clean copy of data while the snapshot is taking place. This method allows for
frequent snapshots that can be stored for lengthy periods of time.
When data is corrupted or erased by mistake, a snapshot can be mounted and the data copied back
to the production volume, or the snapshot can replace the existing volume. This method loses very
little data and recovers data fairly instantly.
Storage system failure: Data centers rely on replication technologies built on snapshots to protect
against multiple disk failures or other significant events.
Only altered blocks of data are replicated from the primary storage system to an off-site secondary
storage system with snapshot replication. Snapshot replication is also used to copy data to onsite
secondary storage for recovery in the event that the original storage system fails.
Full-fledged data center failure: Protecting against data center failure necessitates a
comprehensive disaster recovery plan. Organizations, like in the other failure scenarios, have
several options. Snapshot replication, which duplicates data to a secondary site, is one option. The
cost of running a secondary site, on the other hand, can be too expensive.
Another option is to use cloud services. In the event of a severe disaster, an organization can
employ replication in conjunction with cloud backup products and services to retain the most
recent copies of critical data and to instantiate application images. As a result, in the case of a data
center failure, recovery is quick.
Data security is critical because it protects "Wheelie good" company information from fraudulent
activities like hacking, phishing, and identity theft. In order to function correctly, this company needs
ensure the security of their information by developing a data protection plan. The importance of data
protection develops in lockstep with the amount of data stored and generated. Data breaches and
cyberattacks can have disastrous repercussions. This organization must secure their data proactively
and regularly upgrade their security techniques.
Finally, the basic concept and relevance of data protection is safeguarding and protecting data from
various hazards and under diverse conditions. The following article goes into greater information
regarding data protection and its significance. All information at the firm "Wheelie good" must be kept
completely confidential at all times. Because consumer information, partner information, and company
secrets are all significant assets. They have the power to determine the company's survival. This is also
why hackers aim to compromise corporate information. They can make a lot of money if they can steal
this piece of info. Because such a threat exists, the company "Wheelie good" must emphasize
information security.’
III.Design and implement a security policy for an
organization (P7)
1. Security policy definition
A security policy is a written document that outlines how a corporation intends to protect its physical
and information technology (IT) assets. Security policies are dynamic documents that are constantly
updated and modified as technology, vulnerabilities, and security requirements evolve.
An acceptable usage policy may be included in a company's security policy. These indicate how the
organization intends to educate its staff about asset protection. They also include a description of how
security measures will be implemented and enforced, as well as a method for reviewing the policy's
efficacy to ensure that required corrections are made.
There are two type of security policies: Physical security policies and data security policies.
Physical security policies secure all physical assets in a business, including buildings, cars,
merchandise, and machines. These assets include IT equipment such as servers, computers, and hard
drives.
IT physical asset protection is very critical since physical equipment carry firm data. If a physical IT
asset is compromised, the data it stores and manages is jeopardized. To keep firm data safe,
information security policies rely on physical security policies.
- Procedures and other guidelines for gaining access to, monitoring, and managing these assets.
- Individuals' responsibilities for the physical assets they access and manage.
Physical assets are safeguarded by security guards, entry gates, and door and window locks. Other,
more advanced methods are also utilized to safeguard physical assets. A biometric verification system,
for example, can restrict access to a server room. Anyone entering the room would use a fingerprint
scanner to verify their identity.
Since data breaches and other incidents involving information security can have a detrimental impact
on an organization's reputation. These policies serve to assure data security, integrity, and availability,
also known as the CIA trinity. They're frequently utilized to safeguard sensitive client data and
personally identifying information.
Ensure legal and regulatory compliance: Many legal and regulatory obligations are geared at security
sensitive information. The Payment Card Industry Data Security Standard, for example, governs how
businesses handle customer payment card information. The Health Insurance Portability and
Accountability Act specifies how businesses must handle protected health information. Violations of
these rules can be costly.
Establish employee roles: Every employee generates information that may constitute a security risk.
Security policies outline the actions that must be taken to safeguard data and intellectual property.
Determine the vulnerabilities of third-party vendors. Some vulnerabilities arise as a result of
interactions with entities that may have differing security standards. Security policies aid in identifying
potential security holes.
Organizational: These policies serve as the master plan for the security program of the entire
organization.
System-specific: A system-specific policy governs the security of an information system or
network.
Issue-specific policies: These policies focus on certain parts of the wider organizational policy.
The following are some examples of issue-related security policies:
o Acceptable use policies establish the guidelines for employee use of company assets.
o Which personnel have access to which resources is determined by access control policies.
o Change management policies define methods for changing IT assets while minimizing
negative consequences.
o Disaster recovery policies ensure business continuation following a disruption in service.
These policies are often implemented after an incident has caused significant damage.
o event response policies specify how to respond to a security breach or event when it occurs.
The most fundamental requirement for business continuity is to maintain critical functions operational
during a crisis and to recover with as little downtime as possible. Natural catastrophes, fires, disease
outbreaks, cyberattacks, and other external hazards are all included in a business continuity strategy.
Business continuity is vital for firms of all sizes, but it may not be feasible for any but the largest
enterprises to retain all services during a crisis. According to many experts, the first stage in business
continuity planning is determining which operations are critical and allocating the available funds
appropriately. Administrators can put failover procedures in place once critical components have been
identified.
Disk mirroring, for example, allows an organization to keep up-to-date copies of data at
geographically distributed sites other than the core data center. This allows data access to continue
uninterrupted if one location is deactivated and safeguards against data loss.
During a crisis, the strategy should allow the organization to function at a bare minimum. Business
continuity aids an organization's resilience by allowing it to respond rapidly to an interruption. Strong
business continuity saves money, time, and the reputation of the organization. A prolonged outage
poses a financial, personal, and reputational danger.
Business continuity necessitates a business examining itself, analyzing possible areas of vulnerability,
and gathering important information – such as contact lists and technical schematics of systems – that
can be valuable outside of catastrophe scenarios. An organization may strengthen its communication,
technology, and resilience by implementing business continuity planning.
Business continuity may also be required for legal or regulatory reasons. It's critical to understand
which rules apply to a certain organization, especially in an era of rising regulation.
asset mapping.
determining the criticality and context of your assets.
completing a risk assessment.
defining your recovery objectives.
selecting a disaster recovery setup.
budgeting for your setup.
testing and reviewing the plan.
Network equipment
Hardware
Software
Cloud services
Critical data
Creating a list of assets, albeit time-consuming, can help you to gain a thorough grasp of your
company's processes. Regularly update your list when assets are added, withdrawn, or updated, and
use it to purge superfluous data.
3.2. determining the criticality and context of your assets
After you've taken inventory of your assets, you should examine them in context. How does your
company make use of these assets? Which assets, if compromised or lost, would have the greatest
impact in the event of a disaster? Go through all of your mapped assets and categorize them from high
to low effect.
It is not always possible to back up all of your data. Understanding the significance of each asset and
how they interact can help you choose which should be prioritized in your disaster recovery strategy.
Consult with your company's top management and operations employees to discuss the prospective
disruption's impact for as little as one minute, up to one day, or even longer. This information will help
you to set your RTO and RPO, as well as how frequently your data needs to be backed up.
A remote data storage solution is vital for protecting your assets from cyber-attacks and natural
calamities that may cause physical harm. After you've laid out your needed configuration, choose the
cloud services, software, hardware, and partners you'll need to complete it.
Higher budgets will include a disaster recovery plan with improved RTOs and RPOs, more generous
support for more essential services, and may be part of a larger business continuity strategy. Each
company's disaster recovery plan requirements will differ, and with the appropriate information,
business can assess risk and investment in disaster recovery plan technologies to achieve the correct
balance.
A catastrophe recovery strategy is never complete. It should be examined on a regular basis, ideally
every six months or so, to verify that it is still effective. Assets, organizational structure, and IT
configuration will all change over time, and the disaster recovery plan must be updated to reflect these
changes.
Each department is responsible for determining its own MEFs and essential resources.
Services, programs, or activities that are crucial to the department's continuing operations and
would have a direct impact on the department's success if they were halted for an extended
length of time are considered essential functions. MEFs will provide as a road map for
resuming operations after a disaster or substantial disruption. Four to six basic functions should
be included in general, with more if the department or unit is highly complicated.
Each department is in charge of administering university MEFs, and they must be as specific as
possible when developing standards and relationships for each function. Consider how the
function would have to be altered or amended if one of the main hazards noted in the risk
assessment caused a significant interruption.
Each department is responsible for carrying out a BIA for each MEF in order to analyze and
document the potential implications and negative consequences of a disaster or large
interruption. A business impact analysis (BIA) is conducted for each mission-critical function
to assess and document the possible repercussions and negative ramifications of a disaster or
severe interruption. By examining dependencies, peak periods, negative repercussions, and
financial considerations (RTOs), a BIA can assist in determining recovery priorities and
recovery time targets.
Each department must examine the human and technological resources needed to guarantee
that operations run smoothly.
Each department is responsible for setting and fulfilling RTOs, which are the amount of time
necessary to recover a process or function and return corporate operations to normal, or as near
to normal as feasible.
Describe the kind of events that might occur prior to the public declaration of a disruption, as
well as how to invoke the BCP.
Set the format of the BCP, including the executive overview, objectives and scope, outcomes
summary, and recovery activities.
Timely Evaluation and Maintenance: Each department plan administrator will be in charge
of yearly reviewing and maintaining all BCPs and related documentation. The goal of
reviewing is to verify that the plan is recent and kept up to date while staying ready. The VCU
director of disaster preparation will oversee the upkeep of this program.
Training and Exercises: The disaster preparation director will oversee all departments' annual
testing. Testing strategies range from the simplest (no notice activities) to the most complicated
(full scale). Each has its own set of features, goals, and rewards. The sort of testing should be
defined by the organization's expertise with business continuity preparation, as well as the
complexity, scope, and nature of its operations. Tabletop exercises, functional exercises, and
full scale exercises are examples of testing procedures with increasing complexity.
References
acqnotes.com. [Online] Available at: https://acqnotes.com/acqnote/tasks/risk-identification-procedures
[Accessed 19 04 2023].