Unit - 05 - Security Assignment
Unit - 05 - Security Assignment
Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST
Do the assessment criteria awarded match
those shown in the assignment brief? Y/N
• Constructive?
Y/N
• Linked to relevant assessment
criteria? Y/N
Y/N
• Agreeing actions?
Does the assessment decision need
Y/N
amending?
Assessor signature Date
Give details:
Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID
Unit 05: Security
Unit Title
Assignment Number 1 Assessor
Date Received 1st
Submission Date
submission
Date Received 2nd
Re-submission Date
submission
Assessor Feedback:
Resubmission Feedback:
Important Points:
1. Check carefully the hand in date and the instructions given with the assignment. Late submissions will not be
accepted.
2. Ensure that you give yourself enough time to complete the assignment by the due date.
3. Don’t leave things such as printing to the last minute – excuses of this nature will not be accepted for failure
to hand in the work on time.
4. You must take responsibility for managing your own time effectively.
5. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply
(in writing) for an extension.
6. Failure to achieve at least a PASS grade will result in a REFERRAL grade being given.
7. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will then be asked to
complete an alternative assignment.
8. Take great care that if you use other people’s work or ideas in your assignment, you properly reference
them, using the HARVARD referencing system, in you text and any bibliography, otherwise you may be guilty
of plagiarism.
9. If you are caught plagiarising you could have your grade reduced to A REFERRAL or at worst you could be
excluded from the course.
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own
without attributing the sources in the correct way. I further understand what it means to copy another’s work.
Unit Tutor
Issue Date
Submission Date
Submission Format:
The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings, paragraphs
and subsections as appropriate, and all work must be supported with research and referenced using the
Harvard referencing system. Please also provide an end list of references using the Harvard referencing
system.
METROPOLIS CAPITAL Banks Head Office is a 5 Story Building in Kollupitiya with the Ground
Floor allocated for Customer Services, the First Floor allocated for HR, the Second Floor allocated for
Meeting Rooms and Senior Executive Staff, the Third Floor is allocated for the Technical Support Team
and the Fourth Floor hosts High Performance Servers running core banking systems. Fifth Floor is for
some other outside companies that are not related with the METROPOLIS CAPITAL Bank. Other than
this, METROPOLIS CAPITAL bank provides a lot of services to customers including online and mobile
banking facilities. Therefore, their core banking system must communicate with several outside systems
and all communication between outside systems, Data centers and the Head Office is protected by a
single firewall. In Addition, METROPOLIS CAPITAL Bank has recently implemented a bring your
own device (BYOD) concept for Senior Executive Staff and HR Departments and to facilitate this, they
are providing employee WiFi as well as a guest WiFi Hotspot.
The bank has signed agreements, AMCs, contracts and NDAs with several Local and foreign IT service
vendors. Some local vendors provide services and supports to foreign companies. METROPOLIS
CAPITAL Banks Technical Support Team is a local third-party vendor, contracted by METROPOLIS
CAPITAL Bank and managed by their Supply chain management officer. The Technical Support Team
provides onsite and remote support for their customers.
METROPOLIS CAPITAL bank strictly follows the rules and regulations enforced by the government
and the Central Bank. Therefore, they have obtained the ISO 31000:2009 certification. In addition to
this, the areas of datacenters, branches, ATM and HQ is covered by CCTV and 24x7 monitoring is
happening. Other security functions like VA scanning, internal auditing, and security operation done by
the bank employees. They have purchased a VA scanning tool, Privilege access management (PAM)
system, Endpoint detection and respond (EDR) system, Data loss prevention (DLP) tool, Web
application firewall (WAF) and Secure mail gateway which are managed by the Technical Support
Team.
It has been reported that an emergency is likely to occur where a work from home situation may be
initiated. Therefore, you have been employed by METROPOLIS CAPITAL Bank as a Network Security
Analyst to recommend and implement a suitable Security solution to facilitate this situation.
Activity 01
Discuss and assess the security procedures and types of security risks METROPOLIS CAPITAL Bank
may face under its current status and evaluate a range of physical and virtual security measures that
can be employed to ensure the integrity of organizational IT security. You also need to analyze the
benefits of implementing network monitoring systems for METROPOLIS CAPITAL Bank with valid
reasons in order to minimize security risks identified and enhance the organizational security.
Activity 02
2.1 Discuss how an incorrect/improper configuration for network infrastructure such as firewall and VPN
could impact METROPOLIS CAPITAL Bank. Assess IT security risks that may face by the employees of
METROPOLIS CAPITAL Bank and propose how the organization can facilitate their employees with a
“Secure remote working environment”.
2.2. Discuss how following technologies would benefit METROPOLIS CAPITAL Bank and its Clients to
increase network performance. (Support your answer with suitable illustrations).
i) Static IP,
ii) NAT
iii)DMZ
Activity 03
3.1 Review risk assessment procedures for METROPOLIS CAPITAL Bank to protect itself and its
clients. Explain the mandatory data protection laws and procedures which will be applied to data storage
solutions provided by METROPOLIS CAPITAL Bank. Explain the topic "ISO 31000 risk management
methodology" and summarize the ISO 31000 risk management methodology and its application in IT
security. Analyze possible impacts to organizational security resulting from an IT security audit.
Recommend how IT security can be aligned with organizational Policy, detailing the security impact of
any misalignment.
Activity 04
4.1 Design and Implement suitable security policy to prevent misuse and exploitations in line with
METROPOLIS CAPITAL Bank using the Organizational policy tools for the given scenario,
While evaluating and justifying the suitability of the tools used in an organizational policy to meet
business needs. Identify the stakeholders who are subject to the METROPOLIS CAPITAL Bank and
describe the role of these stakeholders to build security audit recommendations for the organization.
4.2 Discuss and present a disaster recovery plan for METROPOLIS CAPITAL Bank for all their sites to
guarantee maximum reliability to their clients. (Student must develop a PowerPoint-based presentation
which illustrates the recovery plan within 15 minutes of time including justifications and reasons for
decisions and options used).
Grading Rubric
Grading Criteria Achieved Feedback
Activity 01................................................................................................................................20
M1 Analyze the benefits of implementing network monitoring systems with supporting reasons.............35
1.9 Supports that can be gain through monitoring system of Metropolis Capital Bank..........................39
D1 Evaluate a range of physical and virtual security measures that can be employed to ensure the integrity
of organizational IT security........................................................................................................................40
1.11 The way physical security and virtual security impact to Metropolis Capital Bank........................44
Activity 02................................................................................................................................45
2.1 P3 Discuss the potential impact to IT security of incorrect configuration of firewall policies and third-
party VPNs...................................................................................................................................................45
2.2 P4 Discuss, using an example for each, how implementing a DMZ, static IP and NAT in a network
can improve network security......................................................................................................................53
2.2.8 The impact of implementing a DMZ, static IP, and NAT in a network can improve the network
security of Metropolis Capital Bank........................................................................................................60
Activity 03................................................................................................................................66
3.2.3 Importance of data centers are for process and regulation application to Metropolis Capital Bank.
..................................................................................................................................................................68
3.3 M3 Summarize the ISO 31000 risk management methodology and its application in IT security.......69
3.4.4 Analyze the impacts when auditing for Metropolis Capital Bank..................................................73
3.5 D2 Recommend how IT security can be aligned with organizational Policy, detailing the security
impact of any misalignment.........................................................................................................................74
Activity 04................................................................................................................................75
4.1 P7 Design a suitable security policy for an organization, including the main components of an
organizational disaster recovery plan...........................................................................................................75
4.2 P8 Discuss the roles of stakeholders in the organization in implementing security audits....................81
4.2.7 Discuss the specific roles and responsibilities of stakeholders in the context of security audit.....86
4.3 M5 Justify the security plan developed giving reasons for the elements selected.................................88
4.4 D3 Evaluate the suitability of the tools used in an organizational policy to meet business needs.........89
Conclusion................................................................................................................................90
Reference..................................................................................................................................91
Figure 1 Information Security..........................................................................................................................21
Figure 2 Types of attacks.................................................................................................................................23
Figure 3 Active Attack.....................................................................................................................................23
Figure 4 Passive Attack....................................................................................................................................24
Figure 5 Virus...................................................................................................................................................26
Figure 6 Worms................................................................................................................................................27
Figure 7Trojans................................................................................................................................................27
Figure 8 Spyware.............................................................................................................................................28
Figure 9 Fileless malware.................................................................................................................................29
Figure 10 Dos Attack.......................................................................................................................................29
Figure 11 DDOS Attack...................................................................................................................................30
Figure 12 Network Monitoring System...........................................................................................................37
Figure 13 Firewall............................................................................................................................................46
Figure 14 Packet filtering firewall....................................................................................................................47
Figure 15 Circuit-level gateway.......................................................................................................................47
Figure 16 Application-level gateway...............................................................................................................48
Figure 17 Stateful inspection firewall..............................................................................................................48
Figure 18 Next-generation firewall..................................................................................................................49
Figure 19 VPN.................................................................................................................................................50
Figure 20 Remote Access VPN........................................................................................................................51
Figure 21 Site to Site VPN...............................................................................................................................52
Figure 22 DMZ.................................................................................................................................................54
Figure 23 Example for IP Address...................................................................................................................58
Figure 24 NAT.................................................................................................................................................58
Figure 25 Example for Static NAT..................................................................................................................59
Figure 26 Dynamic NAT..................................................................................................................................60
Figure 27 Port Address Translation (PAT)......................................................................................................61
Figure 28 Data centers......................................................................................................................................68
Figure 29 ISO 31000 risk management............................................................................................................71
Figure 30 IT Audit............................................................................................................................................72
Figure 31 Presentation cover page...................................................................................................................78
Figure 32 Definition of Disaster Recovery Plan..............................................................................................79
Figure 33 Importance of Disaster Recovery Plan............................................................................................79
Figure 34 Types of Disasters that Organization can plan................................................................................80
Figure 35 Recovery Plan Consideration...........................................................................................................80
Figure 36 Types of disaster recovery plan.......................................................................................................81
Figure 37 Components of disaster recovery plan.............................................................................................81
Figure 38 Benifits of disaster recovery plan....................................................................................................82
Figure 39 stakeholders......................................................................................................................................83
Figure 40 Security Audit..................................................................................................................................86
Active Attack
Active attacks are a sort of cybersecurity attack when an attacker tries to change, damage, or impair a
system's or network's regular operation. Active attacks, as opposed to passive assaults, which just involve
monitoring or eavesdropping on a system or network, can be more harmful since they include the attacker
taking actual action against the target system or network. Source:
GeeksforGeeks, (2023)
Passive Attack
A passive attack does not eat up system resources and instead makes an effort to gather or use information
from the system. Attacks that are passive in nature spy on or keep track of transmission. The adversary
wants to intercept the transmission of information in order to collect it. Attackers that use passive methods
observe or gather data without making any changes or erasing it. Passive assaults can take the form of
eavesdropping, in which the attacker listens in on network traffic to gather sensitive data, or sniffing, in
which the attacker intercepts and examines data packets to steal sensitive data.
GeeksforGeeks, (2023)
2. Attack victims who are still alive are 2. The victim of a passive attack is not
aware of the assault. aware of the assault.
3. Resources on the system are modified. 3. No changes are made to the system's
resources.
4. Active attack puts the availability and 4. The availability and integrity of data
integrity of data in danger. may be threatened by passive attacks.
1.3.2 Integrity
Protect against unauthorized information modification. Threat actors may damage or modify your data to
cause subsequent harm even if they cannot see it all at once.
1.3.3 Availability
Availability safeguards a system's capacity to provide full user access to software systems and data when
required. Making the technology infrastructure, applications, and data available when needed for a
business process or the advantage of a company's clients is the aim of availability.
Source (Imperva 2023)
Figure 5 Virus
Source: Protect your devices and data from malware (no date)
Worms
malware that gains access to an operating system by utilizing software flaws and backdoors. The worm can
launch assaults like distributed denial of service (DDoS) after it is set up in the network.
Figure 6 Worms
Source: Raposo, L. and Name (no date)
Trojans
malicious code or software that conceals itself in games, apps, or email attachments as a legitimate
program. The malware is downloaded by an unwary user, who then lets it take over their computer.
Figure 7Trojans
Source: Ice (2019)
Ransomware
Through encryption, a person or organization is prevented from accessing their own systems or data. There
is no assurance that paying the ransom will actually restore full access or functioning. Instead, the attacker
often wants a ransom in exchange for a decryption key.
Cryptojacking
Without the victim's awareness, attackers install malware on their victim's device and start using their
processing power to earn cryptocurrency. Systems that are affected might become sluggish, and
cryptojacking tools might make systems unstable.
Spyware
An unwary user's data, including private information like passwords and payment information, is accessed
by a hostile actor. Mobile devices, desktop programs, and web browsers can all be impacted by spyware.
Figure 8 Spyware
Source: Start-up spyware company accidentally exposed its data
online
Adware
An advertiser can give the user targeted advertising by tracking a user's browsing activity to identify
behavior patterns and interests. Adware is similar to spyware but does not require the user to install
software on their device, and while it may not always be used maliciously, it can be used without the user's
knowledge and endanger their privacy.
Rootkits
Applications, firmware, operating system kernels, or hypervisors can all be modified with software to
enable remote administrative access to a computer. The attacker can take full control of the computer,
launch the operating system from a corrupted environment, and spread further malware.
Source: Cyber security threats: Types & sources: Imperva (2023)
DOS Attack
An attempt to disable a device or network such that its intended users are unable to access it is known as a
denial-of-service (DoS) attack. DoS attacks achieve this by bombarding the object of attack with
connections or by providing it with data that causes an issue.
2. Financial risk
Financial risk is the possibility that the company may be unable to manage its debt and meet its financial
commitments. Instability, losses in the financial sector, or changes in stock prices, currency exchange
rates, interest rates, etc. are the usual causes of this kind of risk.
3. Operational risk
Operational risk is the possibility of suffering losses due to ineffective or defective procedures, rules,
policies, plans, or situations that interfere with business operations. Operational risk can be brought on
by several sources, including human mistakes, criminal activities like fraud, and natural disasters.
4. Legal risk
A mistake or willful disregard for client responsibilities exposes businesses to legal risk. It is regulated
by the same legal system that sets the standards for goods, customers, and commercial practices. The
potential risks of violating tax laws are seen from the standpoint of an investor.
5. Strategic risk
A company's business model may be adversely affected by an occurrence, which is known as strategic
risk. The value proposition that draws clients and produces revenue is compromised by a strategic risk.
As an illustration, if a company's business strategy is to be the low-cost provider of a product and a rival
from a country with low wages suddenly joins the market, the company will find that its value
proposition has been shattered.
6. Technology risk
The possibility that a technological failure may cause a firm to be disrupted is what is meant by the term
"technology risk," also known as "information technology risk." Information security events,
cyberattacks, password theft, service failures, and other dangers are just a few of the many technology
risks that businesses must deal with.
Every sort of technological risk has the potential to result in financial, reputational, regulatory, or
strategic risk if an adequate incident response is not used. Consequently, it's essential to have a strong
technology risk management strategy in place to foresee such issues.
7. Culture risk
The word "risk culture" refers to the values, beliefs, knowledge, attitudes, and awareness of risk that are
shared by a group of individuals that have a similar goal. All organizations, including for-profit and
nonprofit organizations as well as for-profit and public organizations, must follow this rule.
8. Fraud risk
Fraud risk refers to the potential for any unforeseen loss, including those involving money, reputation, or
physical property, because of dishonest behavior on the part of internal or external actors. Financial
losses resulting from theft, embezzlement, or other sorts of financial crime are one-way fraud influences
society.
1.6.2 The way organizational risk can impact to Metropolis Capital Bank.
The performance, standing, and financial stability of Metropolis Capital Bank can all be significantly
impacted by organizational risk. Organizational risks, such as inefficient financial management, fraud, or
operational inefficiencies, can result in significant financial losses for the bank. These losses may be
brought on, among other things, by financial theft, unsuccessful investments, or disciplinary actions.
Financial losses have the potential to lower a bank's capital base, restrict its capacity to provide loans and
diminish shareholder value. Organizational risks that result in poor news or low public perception could
harm the bank's reputation. For instance, if the bank is linked to a scandal or is thought to have engaged in
unethical behavior, customers may lose faith in it. A bank's market position may suffer, and its customer
base may be lost as a result of a damaged reputation. It may also find it difficult to attract new clients. For
failing to comply with legal and regulatory duties, the bank may face legal action, fines, and other
consequences. Risks to an organization can have severe effects, such as breaching anti-money laundering
laws or failing to understand consumer expectations. A bank's ability to conduct business may be restricted
by regulatory actions, certain activities may be prohibited, or even the license of the bank may be revoked.
Organizational risks,
including technological setbacks, cyberattacks, and internal system failures, could impair the bank's ability
to conduct business. Loss of services slowed transactions, and disgruntled customers may result from these
interruptions. Operational hiccups undermine not only the bank's effectiveness but also the trust that its
clients have in it to deliver dependable services. Organizational hazards that cause a toxic environment or
low employee engagement may affect employee morale and productivity. High turnover rates can harm the
cost of hiring new employees, the loss of institutional knowledge, and the continuity of service. Unhappy
employees may give poor customer service and low customer satisfaction. Organizational risks may affect
a bank's ability to attract.
investors and gain access to the capital markets. If a bank is perceived as having weak risk management
practices or a high-risk profile, investors could be reluctant to participate or give money. Lower investor
confidence may limit the bank's ability to expand and its access to finance.
To prevent the impacts of these risks, Metropolis Capital Bank should have strong risk management
practices including successful compliance systems, ongoing surveillance, and regular risk assessments. It
should also promote a culture of risk accountability and knowledge among all employees, ensuring that
everyone is aware of their roles in risk management. By proactively detecting, assessing, and managing
organizational risks, the bank can retain its financial stability, uphold its good name, and increase its long-
term profitability.
There are some recommendations for Metropolis Capital Bank to prevent risk.
First every bank needs to create a risk management framework to prevent from a risk and it is same for the
Metropolis Capital Bank. Create an extensive risk management framework that covers every aspect of the
bank's activities. This should involve locating, analyzing, monitoring, and minimizing a variety of risks,
including credit, operational, market, and liquidity risks. secondly, to prevent a risk there should be a strong
corporate governance. In a metropolis capital bank corporate governance structure is strong and roles,
duties, and reporting lines are all well-defined. Ensure that the board of directors’ exercises sound control
over management and holds them responsible for risk management procedures. Also, ensure conformity to
all relevant laws, rules, and industry standards by putting in place robust compliance mechanisms. Keep up
with changing regulatory requirements by routinely reviewing and updating compliance policies and
processes. To find potential risks and weaknesses in the Metropolis Capital Bank's operations, conduct
frequent risk assessments. Analyzing new risks and gauging how well existing risk controls are working
should be included in this. To protect assets, stop fraud, and spot inconsistencies, Metropolis Capital Bank
should have a place for robust internal control measures. This comprises internal audits regularly,
authorization procedures, and the segregation of roles. Employ and educate qualified personnel who possess
the knowledge and abilities needed to properly manage risks. To keep staff members up to speed on the
most effective risk management techniques, promote a culture of risk awareness, and offer continual
training. To safeguard consumer information, stop data breaches, and assure the availability and integrity of
crucial systems, implement strong information security procedures. It also involves employee awareness
initiatives, encryption, regular security audits, and tight access limits.
Risk prevention is a continual process that calls for constant observation, evaluation, and modification. A
metropolitan capital bank can strengthen its resilience and defend against numerous risks by putting these
suggestions into practice and upholding a solid risk management culture.
The monitoring system can increase Metropolis Capital Bank's security by continuously scanning for any
unexpected activity or potential security issues. It can detect suspicious transaction patterns, unauthorized
access attempts, or any other indications of fraud or aggressive behavior. By immediately alerting the
appropriate parties, the solution aids in preventing security breaches and protecting the bank and its clients
from any dangers. A monitoring system is crucial for fraud detection and prevention. In order to detect
fraudulent activities including account theft, identity theft, and incorrect transactions, it can monitor
customer behaviour and transactional data. By flagging suspicious activities or trends, the technology
enables Metropolis Capital Bank to take immediate action, look into the situation further, and protect its
customers' accounts and assets. Financial firms are subject to a number of regulatory rules and compliance
requirements. The monitoring system ensures that the Metropolis Capital Bank follows these regulations
by reviewing transactions for any potential violations. It can recognize and report suspected behaviors like
money laundering or financing terrorism in accordance with the rules of regulatory authorities. The
monitoring system's encouragement of compliance helps the bank maintain its reputation, stay out of
trouble, and keep moral standards. Monitoring systems help the Metropolis Capital Bank detect and
minimize operational risk. By analyzing transactional and client data, the system can identify risk factors
such as unusual trading activity, significant fund transfers, or significant changes in consumer behavior.
This enables the bank to manage risks proactively, implement effective risk mitigation techniques, and
lower potential losses. The monitoring system's operational efficacy can be improved by automating
transaction detection and analysis. Finding anomalies or potential threats takes less manual labor, allowing
bank workers to focus on other crucial tasks. The system's ability to generate reports, send out alerts in real
time, and visualize data enables quicker decision-making and improves operational effectiveness overall.
Additionally, the system keeps a close eye on customer accounts for any suspicious activity in order to
protect the bank's customers. . It can detect unauthorized access attempts, strange login behaviors, or
changes to personal information to add an additional layer of security. By promptly warning users of
potential threats and urging them to change their passwords or contact their bank, the system helps
customers take the necessary precautions to protect their accounts and sensitive information.
The monitoring system of Metropolis Capital Bank provides crucial assistance in the areas of security,
fraud prevention, compliance, risk management, operational efficiency, and customer protection. It ensures
the bank's effective functioning while defending the organization's and its clients' interests.
D1 Evaluate a range of physical and virtual security measures that can be
employed to ensure the integrity of organizational IT security.
1.10 Definition of security
Information technology (IT) security refers to the methods, tools, and personnel used to safeguard a
business's digital assets. The basic goal of IT security is to safeguard these assets, gadgets, and services
from unauthorized users, often known as threat actors, who might disrupt, steal from, or exploit them.
These risks could be intentional or unintentional, and they could come from the outside or the inside.
A successful security plan uses a number of approaches to minimize flaws and concentrate on specific
cyber threats. To identify, stop, and address security concerns, security procedures, IT services, and
software tools are all used. However, both IT security providers and thieves benefit from technological
improvements. To safeguard firm assets, businesses must regularly evaluate, update, and enhance security
to stay ahead of threats and more cunning hackers.
Source: (Bacon & Contributor, 2021)
02. Surveillance
For both preventive and post-incident recovery, this is one of the most crucial physical security elements.
In this context, surveillance refers to the tools, employees, and resources that businesses utilize to keep an
eye on what goes on in various physical locations and establishments. Closed-circuit television (CCTV)
cameras, which capture activities across many spaces, are the most popular sort of surveillance. The
advantage of these surveillance cameras is that they are useful in both preventing and catching criminal
activity. Threat actors are deterred from breaking into or vandalizing a building when they encounter a
CCTV camera because they are worried that their identities may be captured on film. Similarly, to this, if a
specific asset or piece of equipment is taken, surveillance can offer the visual proof required to identify the
offender and their methods.
Source: (Cobb, 2021)
03. Testing
Physical security is both a preventative strategy and a tool for responding to incidents. The importance of
testing is rising, particularly when it comes to organizational cohesion. Because they aid in the
coordination of big groups and their way of response, fire drills are an essential exercise for schools and
buildings. To practice role assignments and responsibilities and reduce the possibility of errors, these
policy tests should be carried out regularly.
Source: (Cobb, 2021)
Figure 13 Firewall
Source: (Introduction of firewall in computer network, 2023)
2. Circuit-level gateway
A firewall known as a circuit-level gateway that provides User Datagram Protocol (UDP) and
Transmission Control Protocol (TCP) connection security connects the transport and application levels of
an Open Systems Interconnection (OSI) network model, including the session layer. In contrast to
application gateways, circuit-level gateways monitor TCP data packet handshaking and session adherence
to firewall rules and regulations.
Figure 19 VPN
Source: (Kaspersky, 2023)
2.1.5 Types of VPN
1. Remote Access VPN
2. Site to Site VPN
Intranet based VPN: When several offices of the same company are connected using Site-to-Site
VPN type, it is called as Intranet based VPN.
Extranet based VPN: When companies use Site-to-site VPN type to connect to the office of another
company, it is called as Extranet based VPN.
Figure 21 Site to Site VPN
Source: WP-content: A beginner’s guide to wordpress’ most important directory (2023)
serves as a useful method of defense for VPNs do not shield users from social
activists in difficult environments. media data archiving. some devices are
unreliable
protects you when working remotely decreases the speed of the internet
connection
Figure 22 DMZ
Source: A., J. (2023)
Examples for DMZ.
There are six examples for DMZ. They are:
Web servers DNS servers
FTP servers Proxy servers
Email servers VoIP servers
1. Web servers
A DMZ can be used to set up web servers that communicate with internal database servers. As a result,
internal databases—the repositories in charge of maintaining confidential information—become more
secure. Web servers can directly connect to the internal database server or use application firewalls to do so,
even if the DMZ is still defending against threats.
2. FTP servers
FTP, or file transfer protocol, is a method of sending data to any computer connected to the internet,
anywhere in the world. On computer networks, it is a typical network protocol used to transfer files from a
client to a server. Significant content on an FTP server, which also permits direct file interaction, may be
found on a company website. As a result, it must always be kept apart from vital internal systems.
3. Email servers
A piece of software known as a mail server, sometimes known as a mail transfer agent, receives incoming
emails from nearby users and distant senders and forwards them for delivery. Frequently, servers unable to
connect directly to the internet are used to store personal messages and the user information that records
login information. In order to connect with and access the email database without being directly exposed to
potentially dangerous traffic, an email server is built or installed inside the DMZ.
4. DNS servers
A DNS server maintains a database with the hostnames associated with public IP addresses. It usually
resolves or converts these names into IP addresses. DNS servers employ specialized software, and the
protocols for inter-server communication are also specialized. Queries coming from outside the DMZ are
blocked from accessing the internal network by a DNS server placed inside the DMZ. A second DNS server
can be added to your internal network to further improve security.
5. Proxy servers
A proxy server and a firewall are frequently used in tandem. Other computers utilize it to access websites.
When another device requests a Web page, the proxy server retrieves it and transmits it to the correct asking
computer. By establishing connections on their behalf, proxy servers shield clients from communicating
directly with a server. They also distinguish between internal and external networks and reduce traffic by
caching web information.
6. VoIP servers
While internal LAN access is restricted and firewalls are set up to scrutinize all incoming data, voice-over-
internet protocol (VoIP) servers can connect to both the internal network and the Internet.
Figure 24 NAT
Source: (What is Network Address Translation,2023)
Types of NAT
Class A: 10.0.0.0 - 10.255.255.255 (10.0.0.0 / 8)
Class B: 172.16.0.0 - 172.31.255.255 (172.16.0.0/12)
Class C: 192.168.0.0 - 192.168.255.255 (192.168.0.0/16)
1. configure private/public IP address mapping by using the ip nat inside source static PRIVATE_IP
PUBLIC_IP command
2. configure the router’s inside interface using the ip nat inside command
3. configure the router’s outside interface using the ip nat outside command
Here is an example.
With dynamic NAT, you need to specify two sets of addresses on your Cisco router:
The inside addresses that will be translated
A pool of global addresses
2.2.8 The impact of implementing a DMZ, static IP, and NAT in a network can
improve the network security of Metropolis Capital Bank.
By adopting a DMZ (Demilitarized Zone), static IP addressing, and NAT (Network Address Translation),
Metropolis Capital Bank can improve the security of its network.
There is a DMZ, or distinct network segment, between the internal network, which is a trusted network,
and the external network, which is an untrusted network and typically the Internet. In order to create a
DMZ, Metropolis Capital Bank can place any servers that are accessible to the general public there,
including its email or internet servers. Isolation makes it less likely that unauthorized individuals will
access private information and systems on the internal network. It increases security by allowing managed
and restricted access to the DMZ servers. Giving a network device a static IP address might increase its
security. Static IP addresses make it easier to manage and keep track of network devices. The bank can set
up specific rules and access controls based on known IP addresses to limit access to the network to only
authorized devices. It helps to lessen the risk of unauthorized devices connecting to the network and makes
it simpler to identify and track devices. NAT is a technique that transforms privately used IP addresses on a
local network into internet IP addresses that are open to the public. By using NAT to hide the internal IP
addresses of its equipment from external networks, Metropolis Capital Bank makes it more difficult for
potential attackers to reach such devices directly. By acting as a gateway and allowing many devices with
private IP addresses to connect to the Internet using a single public IP address, NAT adds an extra degree
of security.
In general, using a DMZ, static IP addressing, and NAT together can improve the network security of
Metropolis Capital Bank. These actions help to isolate important servers, limit network access, and conceal
the internal network's infrastructure, which lowers the attack surface and strengthens the bank's network
security posture. It's important to keep in mind that network security is a multi-layered strategy, and in
order to provide full protection, other security measures like firewalls, intrusion detection systems, and
regular security audits should also be implemented.
01. Security - Passwords help stop unauthorized people from accessing sensitive, private, or private
information. They serve as a barrier, preventing unauthorized access to resources that are secured
without the proper password.
02. Passwords - are used for user authentication to confirm a user's identity when they want to access a
system, device, or account. The user certifies their ownership or authorization to use that account or
resource by entering the proper password.
03. Data security - By limiting access to the information to those who have been given permission,
passwords assist safeguard the confidentiality of personal or secret data. This is especially crucial for
accounts that house sensitive data like financial or personal information or communications.
04. Online accounts, including email, social networking, online banking, and e-commerce platforms, must
be protected with passwords. They act as a line of defense against unauthorized entry, assisting in the
prevention of fraud, identity theft, and unlawful use of personal accounts.
05. Passwords are typically used in computer networks to safeguard connections to Wi-Fi networks,
routers, servers, and other network hardware. Network managers can keep unauthorized users off their
network and possibly protect its security by creating a strong password.
Regulation compliance: Password-based security measures must be put in place by many businesses and
organizations due to legal or regulatory requirements. By guaranteeing that only authorized users have
access to sensitive data or systems, passwords assist in meeting compliance requirements.
When possible, implement additional safety features like multi-factor authentication and create strong, one-
of-a-kind passwords for each account to ensure the safety of passwords.
01. In a management system or central repository, policies are often written down and kept. This
repository can be equipped with access control methods to limit who can view the policy documents
and gain access to them. Because of this, the policies can only be viewed by authorized individuals,
and maintaining confidentiality is also ensured.
02. To limit a person's or a group's access to policy papers, several levels of permission can be granted to
them. For instance, some people who require access to the policies but do not need to be able to
change them may be given read-only access. The ability to alter or update the policies, however, may
be granted to specific employees or policy administrators with greater authority.
03. The method of controlling access based on job positions or responsibilities inside an organization is
called "role-based access control" and is frequently employed. There are access permissions and
limitations assigned to each role. By tying rights to established roles rather than to specific users, this
makes managing access control simpler.
04. Mechanisms for monitoring and recording policy document access should be in place. Organizations
may track who accessed the policy when it happened, and what was done by installing access logging
and auditing. Identifying any illegal access attempts or policy changes is much easier thanks to this.
05. updating of policies regularly: Access control should include this step as well. To guarantee that only
authorized workers can make modifications or updates to policies, organizations may assign specific
people or groups the duty of reviewing policies.
Organizations can enforce sound management, confidentiality, and integrity of policy documents by
putting in place strong access control systems. This lowers the possibility of unauthorized changes, data
breaches, or policy abuse.
Benefits of a policy
Policies in numerous sectors are advantageous for organizations, institutions of higher learning, the
government, and other regulated environments.
01. Consistent action and decision-making are facilitated by policies. To achieve standardization and
uniformity throughout an organization or institution, they construct a set of standards and norms.
Fairness, equality, and predictability in procedures and results are all supported by this consistency.
02. For people or stakeholders, policies clearly define expectations and rules. They offer guidance on the
proper way to carry out duties, appropriate behaviors, and desired results. Making sure that everyone is
aware of their obligations and roles, and clear policies help reduce uncertainty, disagreements, and
misunderstandings.
03. Risk management and risk mitigation are frequent goals when developing policies for certain tasks or
contexts. They support risk identification and provide strategies for mitigating or preventing it. Policies
help to create a more secure and safe environment by establishing rules and procedures that safeguard
people, property, and reputations.
04. Laws, rules, and industry standards are all things that policies aid firms in adhering to. They make
certain that procedures and methods comply with moral and legal requirements. Organizations can
show they are adhering to rules by adhering to set policies, which is important during audits and
investigations by the legal or regulatory authorities.
05. By outlining the constraints within which decisions should be made, policies act as a foundation for
decision-making. They give certain people or groups the authority to make decisions, allowing them to
do so within the established parameters in a reasoned and consistent manner. Policies simplify the
decision-making process, hence lowering ambiguity and uncertainty.
06. Employee conduct and activities are governed by policies, which operate as a point of reference for
them. Expected behavior, business ethics, and performance criteria are described. Additionally, policies
create an accountability structure that enables companies to deal with any deviations or violations by
enacting the proper disciplinary actions.
07. Its culture, beliefs, and strategic goals are reflected in its policies. They assist in forming and reiterating
desired behaviors, fostering a supportive and consistent workplace culture. Between stakeholders,
policies can foster mutual respect, trust, and a feeling of purpose.
08. It is possible to review and modify policies because they are not constant. Organizations can react to
evolving conditions, fresh technologies, and new threats by routinely examining and revising rules. To
keep policies current, efficient, and in line with organizational objectives, this encourages ongoing
improvement.
Within organizations and institutions, policies generally offer structure, direction, and control. In the end,
they provide consistency, responsibility, and compliance, which helps with efficiency, risk management,
and the accomplishment of business goals.
3.2.3 Importance of data centers are for process and regulation application to
Metropolis Capital Bank.
Business operations and legal compliance for organizations like Metropolis Capital Bank depend on data
centers.
Massive volumes of sensitive data, such as customer information, financial records, and transactional
information, should be housed at every bank in a reliable and secure environment at data centers. They
have many effective physical and digital security measures in place, including access controls, firewalls,
encryption, and backup systems. The availability, integrity, and confidentiality of the data are ensured by
preventing unauthorized access, data loss, and breaches. Data centers provide advantages like high
availability and continuous operation. They have redundant power supplies, cooling systems, backup
generators, and network infrastructure to lessen downtime. This is crucial for financial institutions like
Metropolis Capital Bank since any decrease in processing speed or data availability could result in
financial losses, impair customer service, and breach regulatory requirements. Metropolis Capital Bank
generates and processes enormous amounts of data every day, including customer transactions, risk
assessments, compliance reports, and regulatory filings. Data centers provide the processing power and
storage capacity needed to handle these data-intensive operations efficiently. They include server clusters,
high-performance computing systems, and data storage arrays that can quickly process and analyze
enormous datasets, enabling banks to make informed decisions, identify trends, lower risks, and comply
with reporting regulations. Data centers implement efficient disaster recovery plans to guarantee
Metropolis Capital Bank's continuity in the case of natural disasters, hardware failures, or cyberattacks.
They put up failover systems so that operations could be quickly moved to different locations, redundant
copies of the data were created, and off-site backups were made. By doing this, Metropolis Capital Bank
can minimize the effects of disruptions and adhere to regulatory obligations while promptly restarting
operations and restoring critical data. Numerous legislation and compliance requirements, including as
know-your-customer (KYC) rules, anti-money laundering (AML) laws, and financial reporting standards,
apply to the banking industry. Data centers offer the infrastructure and security safeguards needed to carry
out these regulatory obligations. They facilitate the implementation of data governance, audit trails, and
access controls that protect against data breaches and illegal access to sensitive data, assist in
demonstrating compliance, and enable regulatory audits. As financial organizations grow and their data
needs evolve, data centers offer the scalability and flexibility to meet increasing data volumes and
processing requirements. They can quickly scale up storage and processing power, adapt to new
technologies by incorporating new services and applications, and evolve with the times. This scalability
allows Metropolis Capital Bank to manage its expanding data needs while continuing to adhere to evolving
regulatory regimes.
The ability of Metropolis Capital Bank to store, manage, and secure enormous volumes of data depends on
data centers. They provide the support systems, security safeguards, and operational resilience needed to
ensure regulatory compliance, preserve customer data, and maintain uninterrupted financial services.
3.3 M3 Summarize the ISO 31000 risk management methodology and its
application in IT security.
3.3.1 Definition of ISO 3100 risk management methodology.
A group of standards known as ISO 31000 deal with risk management in organizations. Organizations can
utilize these worldwide standards as a jumping off point for a general approach to risk management.
Organizations face a variety of issues on a regular basis, such as trying to evaluate and enhance various
processes to increase productivity and efficiency. They also have to cope with a variety of dangers, which
can change depending on their sector.
To provide organizations with a framework when addressing the risks that they and their workers confront
throughout their operations, the ISO 31000 risk management standard was created.
Source: (What is the ISO 31000 risk management standard? 2023)
The above are the types of IT audit and the Below are the explanation to IT audits.
1.Security audits.
A security audit assesses the security of the system from a methodical standpoint by assessing how
effectively an information system complies with a predetermined set of criteria. As part of a
comprehensive audit, it is standard practice to analyze the software, hardware, information processing
methods, and user behavior.
2. Compliance audits
A compliance audit entails a thorough investigation of a company's adherence to legal obligations. The
strength and thoroughness of risk management procedures, security regulations, user access limitations,
and compliance preparations are evaluated in reports on compliance audits.
3. Operational audits
An operational audit is a method for evaluating a business' operations. It is vital to analyze the internal
systems, processes, and practices of the business. In addition to the company's financial status, the
management procedures are evaluated in this type of audit. An operational audit searches for areas where
the organization's operations could be more effective, productive, and efficient.
4. IT governance audits
Internal audits of IT governance should examine more than just how rules are being followed. By assessing
the effectiveness of IT governance components and assuring stakeholders that policies and processes are
followed and are functioning as intended, internal audit enhances the performance of the firm.
A software audit is an internal or external review of a software application to assess the application's
quality, development, and compliance with laws, regulations, and policies. The procedure is handled by
internal teams, one independent auditor, or multiple.
3.4.4 Analyze the impacts when auditing for Metropolis Capital Bank.
When doing an examination for Metropolis Capital Bank, a number of scenarios could happen. The
reliability and quality of financial data, guaranteeing rule compliance, identifying potential risks, and
operational flaws are all crucial components of audits.
The correctness and completeness of financial statements and reports are verified by auditing. Auditors
should carefully examine Metropolis Capital Bank's financial records, transactions, and internal controls to
ensure that the information provided is accurate. As a result, the bank's financial integrity is increased, and
stakeholders have greater faith in its business processes. The Metropolis Capital Bank is subject to a
number of laws and regulations created by governmental and regulatory bodies. A bank's compliance with
anti-money laundering and know-your-customer regulations, for instance, is checked via an audit. By
discovering and correcting any non-compliance issues during the audit, the bank can prevent potential fines
and reputational damage. Auditors assess the bank's internal control structure, risk management strategies,
and operational procedures. Through this review, they are able to identify potential risks, weaknesses, and
control gaps. The audit provides the bank with the opportunity to create more stringent controls and take
remedial action, which reduces the risk of fraud, errors, or operational disruptions. Audits usually reveal
the inefficiencies and flaws in systems and procedures. An examination of the bank's operations by the
auditor may lead to recommendations for cost-saving measures, process simplification, and efficiency
enhancements. You may put these ideas into practice to boost customer service, operational effectiveness,
and resource allocation. A thorough audit carried out by a reputable, independent auditing agency can
improve the bank's dependability and repute. External stakeholders, including investors, clients, and
regulators, evaluate the bank's financial health, risk management practices, and ethical compliance using
audit reports. A successful audit raises stakeholder trust and improves the bank's reputation. As auditors
evaluate the internal control environment at the bank, they can discover a poor or ineffective internal
control environment. The auditors' suggestions and comments have reinforced the bank's internal control
architecture. This can involve bolstering role separation, data security measures, and documentation
procedures to reduce the risk of fraud and mistakes. The audit's findings and recommendations are highly
advantageous to the bank's management and board of directors. In the audit report, emerging risks, market
trends, and problem areas could be highlighted. With this information, the management of the bank may
make decisions on risk-reduction, resource allocation, and strategic planning plans with certainty. Audits
are not a one-time event but a continual procedure. Routine audits support a culture of continuous
improvement within the bank through ongoing monitoring, self-evaluation, and weakness rectification. By
employing audit input, the bank may improve performance, reduce procedures, and adapt to changing
market conditions.
Auditing has several different consequences on Metropolis Capital Bank, including improving financial
accuracy, compliance, risk management, process improvement, trust, and strategic decision-making. The
bank may improve operations and maintain the confidence of its stakeholders by fixing issues, putting
suggestions into action, and adhering to regulations.
3.5 D2 Recommend how IT security can be aligned with organizational
Policy, detailing the security impact of any misalignment.
A Metropolis Capital Bank's policies help ensure that it complies with all relevant legal and regulatory
requirements. The bank provides guidelines on how to safeguard customer data, prevent money laundering,
adhere to anti-corruption laws, and meet industry-specific regulations. Failure to follow these regulations
may result in legal consequences, penalties, and reputational damage. Credit risk, market risk, operational
risk, and liquidity risk are just a few of the many hazards that a bank must identify, assess, and manage.
Policies specify how to do this. They specify the roles at different organizational levels as well as the risk-
reduction strategies. Policies provide standardized procedures for daily actions, which promote consistency
and efficiency. Employees are given the flexibility to choose within set parameters while processes are
streamlined and roles and responsibilities are clarified. Transparency, accountability, and those three things
are encouraged by policies in the workplace. They provide guidelines for handling sensitive information,
conflicts of interest, and employee behavior. Policies also specify how violations and unethical behavior
should be reported. The implications that could affect Metropolis Capital Bank are listed above, while
those that could occur in the absence of a policy are listed below.
Without policies, Metropolis Capital Bank may unwittingly infringe the law, putting it at risk for fines and
other legal and regulatory repercussions. The institution's reputation may suffer as a result of customers'
trust being damaged. Lack of established procedures and standards may lead to inconsistent operations,
errors, and inefficiency. Risk management may be difficult as a result, operations may be affected, and
there may be financial losses. If there are no policies in place, roles, responsibilities, and moral obligations
might not be obvious. Lack of clear protocols for handling misconduct and unethical behavior may create
an atmosphere where these things are more likely to occur. Policies provide a framework that facilitates
strategic planning and decision-making. Without clear policies, it becomes difficult to align business
objectives, rein in expansion, and respond to evolving market conditions.
Activity 04
LO4 Manage organizational security.
4.1 P7 Design a suitable security policy for an organization, including the
main components of an organizational disaster recovery plan.
4.1.1 Create a Security Policy
1.Individual Investors
These are private individuals that invest their own money to buy a company's stock. They can be individual
shareholders who purchase a few shares or institutional investors that purchase significant ownership
interests.
2.Institutional Investors
These are businesses that make significant financial investments on behalf of their members or customers.
Investment banks, insurance businesses, hedge funds, and mutual funds are a few examples. Institutional
investors can possess big stakes in businesses and frequently have access to significant financial resources.
3.Cooporate stockholders
Shares of a specific organization are occasionally owned by other corporations or businesses. These
corporate stockholders may be rivals, suppliers, or strategic allies who bought shares in the corporation for
a variety of objectives, including increasing power, establishing professional connections, or diversifying
their investment portfolio.
5.Employee stockholders
With stock option plans or employee stock ownership plans, several businesses provide their employees
the chance to become stockholders. This promotes a sense of ownership and alignment with the company's
aims by allowing employees to have a stake in the business and profit from its success.
6.Retail Inverters
Retail investors are people who use trading platforms or brokerage accounts to make stock purchases. In
terms of the size of their investments, they are different from institutional investors. Retail investors
frequently buy and sell stocks for their portfolios, but they might not be as powerful or wealthy as
institutional investors.
4.2.7 Discuss the specific roles and responsibilities of stakeholders in the context of
security audit.
Several stakeholders have important roles to play and duties to fulfill in the context of a security audit.
These parties work together to guarantee the efficacy, reliability, and compliance of the security measures
used by an organization.
05. Employees
Abide by security guidelines and rules.
Attend security awareness training.
Security occurrences and shady behavior should be immediately reported.
obey the rules on passwords, access, and data protection.
Keep the assets of the organization accessible, honest, and confidential.
The achievement of a security audit depends on these parties working together effectively and
communicating with one another. Stakeholders can collaboratively contribute to the ongoing enhancement
of a company's safety record and resilience against changing threats by carrying out their various tasks and
duties.
4.3 M5 Justify the security plan developed giving reasons for the elements
selected.
To safeguard an organization's resources and data, a thorough security policy must be developed. The
following is a step-by-step process for creating a security policy.
01. Define the Goals and the Scope
By outlining the property, systems, and data that the security policy will cover, you can determine
its scope.
Clearly define the policy's goals, such as maintaining system availability, safeguarding sensitive
data, and adhering to legal requirements.
02. Perform a risk assessment.
Analyze the possible threats and weaknesses to the resources and systems of the company.
Determine potential risks, the likelihoods, and the effects of different security occurrences.
Place dangers in order of likelihood and probable impact.
03. Specify the necessary security measures.
To reduce identified risks, decide on the security controls and precautions that are required.
Consider industry best practices, statutory and regulatory obligations, and any unique requirements
of the organization.
Define the standards for business continuity, incident response, data protection, access control, and
other pertinent areas.
04. Construct security policies.
Based on the determined requirements, develop unique regulations that cover particular security
areas.
The following are some examples of policies: permissible use, classification of information, control
of passwords, security of networks, and incident handling.
The goals, regulations, duties, and instructions about the area should be expressly stated in each
policy.
05. Get Stakeholders Involved.
To get feedback and make sure their needs are considered, work together with important
stakeholders from many departments, including information technology, legal, HR, and
management.
To improve the efficacy and applicability of the policy, solicit feedback and consider pertinent
suggestions.
06. Review and endorsement.
Review the security policy that has been written in-depth.
Consult with legal counsel and subject matter experts to make sure that all rules and regulations are
being followed.
Ensure that the appropriate approvals are received from the organization's highest executives and
any other leaders.
07. Discuss and Train.
Inform all staff members and stakeholders of the security policy.
Hold training seminars to make sure everyone is aware of their obligations.
Give instructions on how to execute the policy and respond to any queries or worries.
08. Update and Review Frequently:
The security policy should be reviewed and updated regularly.
Keep an eye out for shifts in the regulatory environment, the threat landscape, and technical
developments that could have an impact on the policy.
Improve the efficiency of the policy by incorporating the knowledge gained from security events
and employee feedback.
Endpoint Security
It is essential to guarantee the security of the devices used by employees given the BYOD concept
implemented for Senior Executive Staff and HR Departments. Endpoint security tools, such as Endpoint
Detection and Response (EDR) systems, can be used to keep an eye on endpoints, safeguard them from
sophisticated threats, and give real-time threat intelligence.
It's vital to keep in mind that the usefulness of these tools and measures depends on several variables,
including the bank's specific needs, budget, and existing infrastructure. To customize the disaster recovery
plan to the needs of the bank specifically, it is advised to undertake a complete risk assessment and interact
with pertinent stakeholders, including the technical support team and management.
Conclusion
In this assignment, the security measures for protecting digital assets in enterprises are examined. Risk
assessments, access controls, improved network security, system update management, personnel training,
and the development of incident response plans are all given a lot of attention. Enterprises can implement
these measures to safeguard their digital assets, lessen vulnerabilities, and lessen the impact of security
events.
Reference
(No date) Bing. Available at: https://www.bing.com/?%2Fth (Accessed: 19 July 2023).
Fruhlinger, J. (2020) What is information security? definition, principles, and jobs, CSO Online. Available
at: https://www.csoonline.com/article/3513899/what-is-information-security-definition-principles-and-
jobs.html#:~:text=Information%20security%2C%20sometimes%20abbreviated%20to,or%20physical
%20location%20to%20another. (Accessed: 16 May 2023).
Difference between active attack and PASSIVE ATTAC (no date) Tutorials Point. Available at:
https://www.tutorialspoint.com/difference-between-active-attack-and-passive-attack (Accessed: 22 May
2023).
Active and passive attacks in information security (2023) GeeksforGeeks. Available at:
https://www.geeksforgeeks.org/active-and-passive-attacks-in-information-security/ (Accessed: 20 July
2023).
A., J. (2023) WP-content uploads: What it is and how to upload files in WordPress, Hostinger Tutorials.
Available at: https://www.hostinger.com/tutorials/wordpress-content-uploads (Accessed: 20 July
2023).
Alimam Miya, By and Miya, A. (2023) What is computer network attacks?, Use My Notes. Available at:
https://usemynotes.com/computer-network-attacks/ (Accessed: 20 July 2023).
‘key information security concepts’ presentation slideshows (no date) SlideServe. Available at:
https://www.slideserve.com/search/key-information-security-concepts-ppt-presentation (Accessed: 20
July 2023).
What is information security: Policy, principles & threats: Imperva (2023) Learning Center. Available at:
https://www.imperva.com/learn/data-security/information-security-infosec/ (Accessed: 22 May 2023).
(No date a) What is information security risk? — riskoptics - reciprocity. Available at:
https://reciprocity.com/resources/what-is-information-security-risk/ (Accessed: 20 July 2023).
What are computer viruses?: Definition & types of viruses (no date) Fortinet. Available at:
https://www.fortinet.com/resources/cyberglossary/computer-virus (Accessed: 22 July 2023).
Toulas, B. (2022) Hackers breach software vendor for Magento Supply-Chain attacks, BleepingComputer.
Available at: https://www.bleepingcomputer.com/news/security/hackers-breach-software-vendor-for-
magento-supply-chain-attacks/ (Accessed: 22 July 2023).
Protect your devices and data from malware (no date) Microsoft Support. Available at:
https://support.microsoft.com/en-us/windows/protect-my-pc-from-viruses-b2025ed1-02d5-1e87-ba5f-
71999008e026 (Accessed: 22 July 2023).
(No date) Start-up spyware company accidentally exposed its data online - izoologic. Available at:
https://izoologic.com/2018/11/08/start-spyware-company-germany-accidentally-exposed-data-online/
(Accessed: 22 July 2023).
Raposo, L. and Name (no date) Don’t be in the dark when it comes to malware, SNECS. Available at:
https://www.snecsllc.com/dont-be-in-the-dark-when-it-comes-to-malware/ (Accessed: 22 July 2023).
Ice (2019) Things you should do if you get a trojan virus, Web Safety Tips. Available at:
https://www.websafetytips.com/things-you-should-do-if-you-get-a-trojan-virus/ (Accessed: 22 July
2023).
Cyber security threats: Types & sources: Imperva (2023) Learning Center. Available at:
https://www.imperva.com/learn/application-security/cyber-security-threats/ (Accessed: 22 July 2023).
(No date) DDoS attack trends for Q1 2021 - cloudflare. Available at:
https://cf-assets.www.cloudflare.com/slt3lc6tev37/5UkCE0bVNndsnHAJvXs5LL/
d6b7d68c75daeca7fa313f5023646d86/BDES-1645_DDoS_Trends_Report_Q1-21_Report.pdf
(Accessed: 11 June 2023).
What is a DDOS attack: Types, prevention & remediation (no date) OneLogin. Available at:
https://www.onelogin.com/learn/ddos-attack (Accessed: 12 June 2023).
Security procedure (no date) Security Procedure - an overview | ScienceDirect Topics. Available at:
https://www.sciencedirect.com/topics/computer-science/security-procedure (Accessed: 22 July 2023).
Imgur (no date) Imgur.com, Imgur. Available at: https://imgur.com/iXCwsPA (Accessed: 03 August 2023).
(No date a) Research article - researchgate | find and share research. Available at:
https://www.researchgate.net/profile/Michail-Michalos/publication/
341370438_Design_and_Implementation_of_Firewall_Security_Policies_using_Linux_Iptables/
links/5ec516bc299bf1c09acc07ee/Design-and-Implementation-of-Firewall-Security-Policies-using-
Linux-Iptables.pdf?origin=publication_detail (Accessed: 03 August 2023).
What is a Next Gen Firewall (NGFW)? (no date) HPE Aruba Networking. Available at:
https://www.arubanetworks.com/faq/what-is-next-gen-firewall/ (Accessed: 03 August 2023).
Kaspersky (2023) What is VPN? how it works, types of VPN, www.kaspersky.com. Available at:
https://www.kaspersky.com/resource-center/definitions/what-is-a-vpn (Accessed: 03 August 2023).
Types of virtual private network (VPN) and its protocols (2023) GeeksforGeeks. Available at:
https://www.geeksforgeeks.org/types-of-virtual-private-network-vpn-and-its-protocols/ (Accessed: 03
August 2023).
(No date a) Your guide to remote access VPN - greyson.com. Available at: https://www.greyson.com/wp-
content/uploads/2020/03/Greyson-Technologies-Remote-Access-VPN-Guide.pdf (Accessed: 03
August 2023).
WP-content: A beginner’s guide to wordpress’ most important directory (2023) MalCare. Available at:
https://www.malcare.com/blog/wp-content-uploads/ (Accessed: 03 August 2023).
A., J. (2023) WP-content uploads: What it is and how to upload files in WordPress, Hostinger Tutorials.
Available at: https://www.hostinger.com/tutorials/wordpress-content-uploads (Accessed: 03 August
2023).
Upravnik (2023) Static Nat, Study CCNA. Available at: https://study-ccna.com/static-nat/ (Accessed: 04
August 2023).
Upravnik (2023a) Dynamic nat, Study CCNA. Available at: https://study-ccna.com/dynamic-nat/ (Accessed:
04 August 2023).
Upravnik (2022) Port Address Translation (PAT) configuration, Study CCNA. Available at: https://study-
ccna.com/port-address-translation-pat-configuration/ (Accessed: 04 August 2023).
Cole, B. (2021) What is a risk assessment? - definition from whatis.com, Security. Available at:
https://www.techtarget.com/searchsecurity/definition/risk-assessment (Accessed: 12 June 2023).
What is a data center? (no date) IBM. Available at: https://www.ibm.com/topics/data-centers (Accessed: 04
August 2023).
Kittichais (2017) Big Data Icon set data center and centralized vector image on VectorStock, VectorStock.
Available at: https://www.vectorstock.com/royalty-free-vector/big-data-icon-set-data-center-and-
centralized-vector-16266121 (Accessed: 04 August 2023).
What is Data Protection: Principles, strategies & policies: Imperva (2023) Learning Center. Available at:
https://www.imperva.com/learn/data-security/data-protection/ (Accessed: 04 August 2023).
What is the ISO 31000 risk management standard? (2023) SafetyCulture. Available at:
https://safetyculture.com/topics/iso-31000-risk-management/ (Accessed: 04 August 2023).
Cole, B. (2014) What is it audit (Information Technology Audit)?: Definition from TechTarget, CIO.
Available at: https://www.techtarget.com/searchcio/definition/IT-audit-information-technology-
audit#:~:text=An%20IT%20audit%20is%20the,with%20the%20business’s%20overall%20goals.
(Accessed: 16 June 2023).
About Pam JahnkeGetting up at 2 in the morning might shock some of her listeners (2018) Symposium
brings stakeholders to the table, Mid. Available at:
https://www.midwestfarmreport.com/2018/04/03/symposium-brings-stakeholders-to-the-table/
(Accessed: 11 September 2023).
Gillis, A.S. (2022) What is a security audit? - definition from TechTarget, CIO. Available at:
https://www.techtarget.com/searchcio/definition/security-audit (Accessed: 18 June 2023).
MacNeill, B. (no date) Security & Audit Services. Available at: https://synapticvision.com/services/security
(Accessed: 11 September 2023).