(PIS) Individual Assignment
(PIS) Individual Assignment
Assignment
Principles of Information Security (PIS)
Prepared by:
Name | Student No.
Vishwa Bandara | EMSc-IS-83-551
Submitted to:
Dr. Manjula Sandirigama
Due Date:
29th July 2023
Part – A
Policy Statements
1
Execution Plan Our team will define clear access roles, permissions, and responsibilities for each
job role within the organization and seamlessly integrate the RBAC model into existing systems and
processes.
Please note that the above plans are tailored to our organization's needs and context. We will involve
relevant stakeholders, such as IT teams, management, and legal/compliance, in the planning and
implementation processes to ensure a comprehensive and successful approach to information security.
2
Part – B
In this attack, an attacker attempts to gain unauthorized access to the data by repeatedly trying
different password combinations until the correct one is found. The attacker utilizes automated tools
to speed up the process, trying various common passwords or even dictionary words. If weak
passwords are used or not enough security measures are in place to limit login attempts, the attacker
could eventually gain access to the data.
Ransomware Attack
Ransomware is a type of malware that encrypts the victim's data and demands a ransom payment to
provide the decryption key. In this attack, the attacker gains access to the system, often through
phishing emails or unpatched vulnerabilities. Once inside, the attacker deploys the ransomware, which
then encrypts critical data. The victim is left with a choice: pay the ransom to get the decryption key
or risk losing access to their data permanently.
3
Part-C
The main goal of the Data Protection Act 1998 (DPA) was to protect your privacy and rights when it
comes to your data. This law applied to both electronic and paper-based systems that held your
information. It put rules in place for organizations (known as data controllers) that collected and
processed your data, as well as those who handled data on behalf of these organizations (known as
data processors).
The DPA laid out eight essential principles that organizations had to follow when dealing with
personal data. These principles ensured that your data was treated fairly and lawfully, used for specific
and legitimate purposes, and kept accurate and up-to-date. It also required that your data be stored
securely and not kept for longer than necessary.
As an individual, you had rights under this law. You had the right to access your data held by
organizations, request corrections if there were any mistakes, and even object to certain types of data
processing.
One crucial aspect was obtaining your consent before organizations could process your data. They had
to explain clearly why they needed your information and seek your explicit agreement unless there
were specific situations where consent wasn't necessary for valid reasons.
The DPA also addressed the transfer of your data outside the European Economic Area (EEA) to
ensure it was adequately protected wherever it went.
Organizations were required to take appropriate measures to protect their data from unauthorized
access, loss, or damage, and they had to register with the Information Commissioner's Office (ICO) to
show they were complying with the law.
If organizations failed to adhere to the Data Protection Act, they could face enforcement actions,
including fines or even criminal prosecution in severe cases.
It's important to note that the Data Protection Act 1998 was eventually replaced by the General Data
Protection Regulation (GDPR) in the EU, which brought even stronger protections for your data. So,
always keep yourself updated with the latest data protection regulations to stay informed about your
rights and how your information is being handled.