Sec Udesh Assignment
Sec Udesh Assignment
Ms.Samindi
Assessor Internal Verifier
Unit 05: Security
Unit(s)
EMC Cyber
Assignment title
• Constructive?
Y/N
• Linked to relevant assessment
criteria? Y/N
Give details:
Internal Verifier
Date
signature
1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
8. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
9. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct way. I further understand what it means to copy
another’s work.
Issue Date
Submission Format:
The submission should be in the form of an individual written report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as
appropriate, and all work must be supported with research and referenced using Harvard referencing system.
Please provide in- text citation and an end list of references using Harvard referencing system.
Section 4.2 of the assignment required to do a 15 minutes presentation to illustrate the answers.
Scenario
‘EMC Cyber’ is a reputed cyber security company based in Colombo Sri Lanka that is delivering
security products and services across the entire information technology infrastructure. The company
has a number of clients both in Sri Lanka and abroad, which includes some of the top-level companies
of the world serving in multitude of industries. The company develops cyber security software
including firewalls, anti-virus, intrusion detection and protection, and endpoint security. EMC Cyber is
tasked with protecting companies’ networks, clouds, web applications and emails. They also offer
advanced threat protection, secure unified access, and endpoint security. Further they also play the
role of consulting clients on security threats and how to solve them. Additionally the company follows
different risk management standards depending on the company, with the ISO 31000 being the most
prominent.
One of the clients of EMC Cyber, Lockhead Aerospace manufacturing which is a reputed aircraft
manufacturer based in the US, has tasked the company to investigate the security implications of
developing IOT based automation applications in their manufacturing process. The client has
requested EMC to further audit security risks of implementing web based IOT applications in their
manufacturing process and to propose solutions. Further, Lockhead uses ISO standards and has
instructed EMC to use the ISO risk management standards when proposing the solution.
The director of the company understands such a system would be the target for cyber-attacks. As you
are following a BTEC course which includes a unit in security, the director has asked you to
investigate and report on potential cyber security threats to their web site, applications and
infrastructure. After the investigation you need to plan a solution and how to implement it according
standard software engineering principles.
Activity 01
Assuming the role of External Security Analyst, you need to compile a report focusing on following
elements to the board of EMC Cyber’;
1.1 Identify the CIA Triad concept and evaluate why and how the CIA Triad could be utilize to EMC
Cyber in order to improve the organization’s security.
1.2 Identify types of security risks EMC Cyber is subject to its present setup and the impact that they
would make on the business itself. Evaluate at least three physical and virtual security risks identified
and suggest the security measures that can be implemented in order to improve the organization’s
security.
1.3 Develop and describe security procedures for EMC Cyber to minimize the impact of issues
discussed in section (1.1) by assessing and rectifying the risks.
Activity 02
2.1 Identify how EMC Cyber and its clients will be impacted by improper/ incorrect configurations
that are applicable to firewalls and VPN solutions. IT security can include a network monitoring
system. Discuss how EMC cyber can benefit by implementing a network monitoring system with
supporting reasons.
2.2 Explain how the following technologies would benefit EMC Cyber and its Clients by facilitating a
‘trusted network’. (Support your answer with suitable examples).
i) DMZ
ii) Static IP
iii)NAT
2.3 Identify and evaluate the tools that can be utilized by EMC cyber to improve the network and
security performance without compromising each other. Evaluate at least three virtual and physical
security measures that can be implemented by EMC to uphold the integrity of organization’s IT
policy.
Activity 03
3.1 Discuss suitable risk assessment integrated enterprise risk management procedures for EMC
Cyber solutions and the impact an IT security audit will have on safeguarding organization and its
clients. Furthermore, your discussion should include how IT security can be aligned with an
organizational IT policy and how misalignment of such a policy can impact on organization’s security.
(This can include one or more of the following: network change management, audit control, business
continuance/disaster recovery plans, potential loss of data/business, intellectual property, Data
Protection Act; Computer Misuse Act; ISO 31000 standards.)
3.2 Explain the mandatory data protection laws and procedures which will be applied to data storage
solutions provided by EMC Cyber. You should also summarize ISO 31000 risk management
methodology.
Activity 04
4.1 Design an organizational security policy for EMC Cyber to minimize exploitations and misuses
while evaluating the suitability of the tools used in an organizational policy.
4.2 Develop and present a disaster recovery plan for EMC Cyber according to the ISO/IEC 17799:2005
or similar standard which should include the main components of an organizational disaster recovery
plan with justifications. Discuss how critical the roles of the stakeholders in the organization to
successfully implement the security policy and the disaster recovery plan you recommended as a part
of the security audit.
(Students should produce a 15 minutes PowerPoint presentation which illustrates the answer for
this section including justifications and reason for decisions and options used).
Grading Rubric
HND 78 BATCH
N.M.Udesh Ishanka (Student ID :Kan-00142214)
Contents
1.1 Identify the CIA Triad concept and evaluate why and how the CIA Triad could be
utilize to EMC Cyber in order to improve the organization’s security. ................................. 5
1.2 Identify types of security risks EMC Cyber is subject to its present setup and the
impact that they would make on the business itself. Evaluate at least three physical and
virtual security risks identified and suggest the security measures that can be implemented
in order to improve the organization’s security. .................................................................... 8
1.2.1 Identification of security risks that EMC company will be faced. ...................... 8
1.2.2 List of Risks ............................................................................................................. 8
1.3 Develop and describe security procedures for EMC Cyber to minimize the impact of
issues discussed in section (1.1) by assessing and rectifying the risks. ............................... 11
Activity 02 ............................................................................................................................... 17
2.1 Identify how EMC Cyber and its clients will be impacted by improper/ incorrect
configurations that are applicable to firewalls and VPN solutions. IT security can include a
network monitoring system. Discuss how EMC cyber can benefit by implementing a
network monitoring system with supporting reasons. .......................................................... 17
2.2 Explain how the following technologies would benefit EMC Cyber and its Clients
by facilitating a ‘trusted network’. (Support your answer with suitable examples). ........... 21
2.3 Identify and evaluate the tools that can be utilized by EMC cyber to improve the
network and security performance without compromising each other. Evaluate at least
three virtual and physical security measures that can be implemented by EMC to uphold
the integrity of organization’s IT policy. ............................................................................. 27
Activity 03 ............................................................................................................................... 29
3.1 Discuss suitable risk assessment integrated enterprise risk management procedures for
EMC Cyber solutions and the impact an IT security audit will have on safeguarding
organization and its clients. Furthermore, your discussion should include how IT security
can be aligned with an organizational IT policy and how misalignment of such a policy can
impact on organization’s security. ....................................................................................... 29
3.2 Explain the mandatory data protection laws and procedures which will be applied to
data storage solutions provided by EMC Cyber. You should also summarize ISO 31000
risk management methodology. ........................................................................................... 34
Activity 04 ............................................................................................................................... 38
4.1 Design an organizational security policy for EMC Cyber to minimize exploitations and
misuses while evaluating the suitability of the tools used in an organizational policy. ....... 38
4.2 Develop and present a disaster recovery plan for EMC Cyber according to the ISO/IEC
17799:2005 or similar standard which should include the main components of an
organizational disaster recovery plan with justifications. Discuss how critical the roles of
the stakeholders in the organization to successfully implement the security policy and the
disaster recovery plan you recommended as a part of the security audit ............................. 44
References ................................................................................................................................ 65
Table of figures
Executive Summary.
Users of this system should have a basic idea of how to manage network security
infrastructure. This report provides an overview of network security systems in use in this
world. Some public network security systems show it integrated. This report involves
designing a network security system for the Colombo EMC wherever it operates on a day-to-
day basis. They needed this network security system for good local and international
cooperation in services.
1.1 Identify the CIA Triad concept and evaluate why and how the CIA
Triad could be utilize to EMC Cyber in order to improve the
organization’s security.
1.1.1 Introduction.
EMC is one of the most reputed cyber security companies in Sri Lanka. EMC typically
provides its services to Lockheed Aerospace Manufacturing Company, a reputed small and
medium scale business in Sri Lanka and overseas business and US based aircraft
manufacturer. EMC Cybersecurity develops cybersecurity software for its customers
including SAAS, PAAS, LAAS, IOT and firewalls, anti-virus, intrusion detection and
security and endpoint security. EMC Cyber is also responsible for protecting corporate
networks, cloud, web applications and email. They also offer advanced threat protection,
secure integrated access and endpoint security. They also play the role of seeking advice from
CIA Triad.
The Cia Triad is a security model that highlights core information security objectives and is a
guide for organizations to stay their sensitive information shielded from unauthorized access
and data exfiltration.
A simple but widely applied security model is the CIA triangle; Advocating confidentiality,
integrity and availability; Here are three key pointers in moving your security system forward.
The CIA triad is important to data security since it enhances security posture, helps
organizations keep compliant with complicated laws and ensures business continuity.
The CIA triad is important to data security since it enhances security posture, helps
organizations keep compliant with complicated laws and ensures business continuity.
Vulnerabilities area unit the explanations that's serving to begin risk. Vulnerability could be a
operate that everyone the corporate could face attributable to that a lot of users and network
personals making an attempt to guard their pc systems from vulnerabilities by keeping code
security patches up to now.
Threats are caused to the company from inside the company and will be from the skin the
corporate. Ordinarily most of the threats are affected from the outside the company. Threats
Assets are a measure of a company's physical resources. The company usually measures the
exploitation of the remaining assets. An asset is an asset that has economic value and is a
person, corporation or value in the hope of making a future profit. Risks are the dark things
that can happen to that business in the near future. Basically, the risks are outweighed by the
external and internal risks that occur in the negative. Liability, loss, or any other negative
event caused by an external or internal risk is considered a risk.
Dark things that are about to happen within the future during a business risk unit. Basically,
the chance is outweighed by the chance of damaging the business, the inflated liability, and
also the proven fact that the loss is somewhat risky for the business, as an example, the
negative risk to the business. thanks to the shortage of a correct security system, the native
unit of the EMC company there might face variety of risks to the corporation.
Physical damages.
Physical damage is basically the damage that can be done to physical properties. The risk of
security damage to the corporation is high as EMC loses a physical security system. When an
organization suffers physical damage, it will incur a huge loss to the organization as a result
of the breakdown of the property used by the organization. (stakeholdermap).
Equipment malfunction.
Equipment malfunction suggests that once there aren't any virus guards to the computers or
the other physical science it’s get accomplished by viruses and it step by step get awry
therefore with none security, instrumentation malfunction is additionally sure variety of risk
to the EMC company.
Loss of data.
Loss of data could be a part of risks that may be affected to company. once there's no security.
Of the folks might doing frauds to the business. These knowledge loss is any method or event
that leads to knowledge being corrupted or deleted and badly undecipherable by the user.
(stakeholdermap).
Natural disaster.
Phishing cloud provider.
Social engineering attacks.
Unauthorized access
Server failure.
Distributed denial of service attacks.
VM – level attacks.
Cloud service providers vulnerabilities.
Date lost and inadequate date backups.
System vulnerabilities.
Malicious code.
Building risks square measure, the foremost common variety of physical risk. assume fires or
explosions. To manage building risk, and therefore the risk to mechanism, it's vital that
organizations.
Fraud risk.
Marketing and reputation risk.
Legal and regulation risk.
Technology risk.
Operational risk.
Financial risk.
Security instructions
Firewall.
Date backups.
Anti – virus.
Physical access control.
Cryptography.
Procedures and policies square measure the foundations and regulation that enforced by each
company to its security, avoid numerous styles of frauds etc. So, these procedures and
policies ought to adapt by each staff and employers. and therefore, the alternative reason to
implement rules and regulation is to continue the business for future. That EMC company
additionally enforced numerous procedures to reduce their risks. As told within the higher
than that are a number of the risk that was long-faced by the EMC company.
The first risk within the list of risks, to cut back the physical harms that may happen to the
physical properties use a decent security system however essentially the most effective
methodology is to keep up a property damage claim procedure. this suggests once one thing
sadly happens to property, claim loss in line with the loss gain by victimization this property
harm claim procedure.
As on the risk list, EMC will perform a replacement procedure known as the regular review
procedure by cutting off the regular equipment malfunctions once it has set out to implement
the second risk of equipment malfunction. The company has created a review schedule in line
with the routine equipment testing, which will reduce equipment performance and
malfunctions.
Make a backup of each information we tend to enter into the pc to attenuate information risk
loss. This reduces the chance of information loss. once a particular company reduces the
chance of information loss, the corporate will expand its business space and gain insight into
the company's past things.
Risk Evaluation.
After the chance assessment or analysis has been completed, a risk analysis ought to present
itself. A risk analysis compares valued risk against the chance principles that the organization
The purpose of the danger treatment is to cut back, take away or transfer risk from the EMC
company. it's usually higher for an organization to set up ahead and stop a risk from
occurring than it's for them to require the possibility and face that risk. designing ahead will
facilitate to save lots of an organization tons of time and cash as a result of some risks might
encourage be terribly damaging to a business.
Avoidance strategies.
These ways obtain to completely stop a possible risk from happening or impacting on an
organization in the slightest degree. Main subdivisions of the turning away ways cluster
contain transfer and changings.
Minimize strategies.
These methods require a recalculation of the risk to a product or organization. Avoidance
Methods Trimming methods do not seem to be feasible, or mitigation techniques are often
used when they have already failed.
Access control.
Physical barriers.
Fingerprint lock doors.
Electronic ID card system.
Security lights and speaker.
Standard ACL.
An access-list that's developed entirely mistreatment the supply scientific discipline address.
These access management lists enable or block the whole protocol suite. They don’t
differentiate between scientific discipline traffic like UDP, TCP, and HTTPS. They use
numbers 1-99 or 1300-1999 therefore the router will acknowledge the address because the
supply scientific discipline address.
Extended (Access control list ) ACL. An access-list that's wide used because it will
differentiate scientific discipline traffic. It uses each supply and destination scientific
discipline addresses and port numbers to create sense of scientific discipline traffic. you'll
additionally specify that scientific discipline traffic ought to be allowed or denied. They use
the numbers 100-199 and 2000-2699.
According to this assessment that specialize in the hardware and computer code resources
that used on EMC cloud service supplier for that contemplate the chance that face specific
hardware and computer code element in EMC fail. As a security professional contemplate
following steps to tackle to cut back risk and increase security.
Operational Risk.
Risk of loss ensuing from inadequate or unsuccessful internal processes, people, and systems,
or from external events, however is best viewed because the risk arising from the execution
of Associate in Nursing institution’s business functions. Operational risk exists in each
organization, no matter size or complexness from the biggest establishments to regional and
community banks.
EMC company would like backup and inscribe sensitive date. Use associate degree opposing
– virus software package and keep it updated. defend against power surges with associate
degree UPS.
Infrastructure risk.
IT infrastructure associate degreed operations will generally represent a major spent of the
entire IT allow an organization. In times of budget constraints, it's imperative that
organizations reevaluate and contour their IT infrastructure and operations, building
leadership in digitization at an equivalent time.
Data Quality.
Activity 02
2.1 Identify how EMC Cyber and its clients will be impacted by improper/
incorrect configurations that are applicable to firewalls and VPN
solutions. IT security can include a network monitoring system. Discuss
how EMC cyber can benefit by implementing a network monitoring
system with supporting reasons.
2.1.1 . Firewalls.
Many of the putative It firms is employed to put in a firewall system to the servers as a result
of it like security system that mistreatment to guard the necessary information’s. once broadly
speaking cite the firewall it’s a software package program that used prevents unauthorized
access to or from a non-public network. once there's associate access from associate
unauthorized network or from another non-public network it’s a risks to the corporate as a
result of they'll take all the inner data through that therefore to forestall those stuffs most
firms area unit mistreatment firewall system. Firewalls area unit the tools that may be
accustomed enhance the protection of the computers connected to a network. By putting in a
firewall system, it makes laptop the pc distinctive in different words the firewall completely
isolates computer from net employing a Wall of cod. Firewalls has varied skills the most
ability it's was it will enhance the protection by sanctioning granular management over what
variety of system functions. Some folks suppose that the firewall could be a system that's
Firewall policy could be a set of rules that has a way to use this package therefore it’s simple
to handle the package. This associate degree application that's designed to regulate the flow
of net protocol (IP). and also, the firewall policy is contained the categories of firewalls and
Firewall Architectures. after remark sorts the categories of firewalls their square measure
varied kinds types.
Application gateways
Packet filters
Proxy servers
Figure 3 - Firewall
Application Gateways.
An application entryway may be a proxy server that gives access management at the
appliance layer. It performs as application-layer entryway between the protected network and
therefore the untrusted network. as a result of it works at the appliance layer, it's proficient to
Packet Filters .
A packet filter may be a firewall that reviews every packet for user-defined filtering rules to
regulate whether or not to pass or block it. for instance, the filtering rule may would like all
Telnet requests to be born. victimization this info, the firewall can block all packets that have
a port range twenty-three (the default port range for Telnet) in their header. Filtering rules is
engineered on supply information science address, destination information science address,
Layer four (that is, TCP/ UDP) supply port, and Layer four destination port. Thus, a packet
filter makes selections supported the network layer and therefore the transport layer.
Proxy Servers.
A proxy service is associate application that redirects users’ requests to the real services
supported associate degree organization’s security policy. All message between a user and
therefore the actual server happens through the proxy server. Thus, a proxy server performs
as a communications broker between shoppers and therefore the real application servers. as a
result of it performs as a stop wherever requests area unit valid against specific applications, a
proxy server is sometimes process intensive and might become a bottleneck below significant
traffic conditions. (Microsoft).
The browse one thing or search one thing from network system their net traffic from
snooping, interfaces, and censorship to avoid use VPN (Virtual non-public networks). VPN
may be a Secure tunnel between 2 or a lot of devises to stop from net traffic, snooping,
interference, and censorship. A VPN uses encoding and alternative security mechanisms to
stop unauthorized users from accessing knowledge, and to make sure that knowledge cannot
be changed while not detection because it flows through the web. It then uses the tunneling
method to move the encrypted knowledge across the web. Tunneling may be a mechanism
for encapsulating one protocol in another protocol. within the context of the web, tunneling
permits such protocols as IPX, AppleTalk, and science to be encrypted and so encapsulated in
2.1.4 Policy.
VPN policy may be a set of rules that features a way to use this secure tunnel therefore it’s
simple to handle this tunnel. this can be AN application that's designed to regulate the net
traffic from snooping, interference and censorship. and therefore, the VPN policy is
contained the categories of VPNs and VPN Architectures. once observe sorts the categories}
of VPN there are varied kinds types.
1) Access VPNs give remote users like road warriors (or mobile users), telecommuters,
and branch offices with reliable access to company networks.
2) Computer network VPNs permit branch offices to be connected to company
headquarters in a very secure manner.
Figure 4 – VPN
2.2Explain how the following technologies would benefit EMC Cyber and
its Clients by facilitating a ‘trusted network’. (Support your answer
with suitable examples).
i) Static IP
ii) DMZ
iii) NAT
A static net Protocol (IP) address (static scientific discipline address) may be a permanent
range assigned to a pc by an online service supplier (ISP). scientific discipline addresses are
helpful for recreation services, web site hosting or Protocol (VoIP). Speed and liableness are
key blessings. per a static address is constant, systems with static scientific discipline
addresses are at risk of knowledge extraction and better security risks.
DHCP IPs.
A DHCP server is employed to import different informatics addresses and mechanically tack
together another network info. In most homes and little businesses, the router works because
the DHCP server. In giant networks, one laptop might act because the DHCP server. In short,
the method goes like this: a tool (the client) requests informatics address from a router (the
host), when that the host assigns AN out their informatics address to permit the consumer to
speak on the network.
DMS, abbreviated for a militarized zone, is a limited network in which organizations can
protect their internal networks. It allows organizations to secure private networks (LANs) and
provide access to unreliable networks such as networks. The militarized region typically uses
an external interface to store resources, servers, and services. DMZ will be a logical sub-
network, or a physical network substitute as a secure bridge between an enclosed and exterior
network. A DMZ network has restricted access to the inner network, and all of its
communication is scanned on a firewall before being transported internally. If AN aggressor
plans to breach or attack an organization’s network, a winning attempt can solely end in the
The over-all plan place public long-faced servers within the "DMZ network" so will separate
them from personal, trustworthy network. The uses case is that as a result of server
encompasses a public face, it may be greatly unmoving. If that happens, and a hateful party
gains access to server ought to be lonely within the zone network and not have direct access
to the personal hosts.
There are some ways to set up a network with a zone. The basic approaches are to use either
one or two firewalls, although most electronic equipment DMZs are planned with 2 firewalls.
the essential technique may be prolonged on to form advanced constructions, looking on the
network necessities. A solo firewall with a minimum of 3 network interfaces may be
accustomed build a specification containing a zone. the surface network is created by
connection the general public web. totally different sets of firewalls rules for traffic among
the net and also the zone, the local area network and also the zone, and also the LAN are
network PC network and also the web firmly management that ports and kinds of traffic are
permissible into the zone from the net, limit property to specific hosts within the within
network and forestall unasked connections either to the net or the within local area network
from the zone.
Network Address Translation (NAT) Type Measurement Internet requirements occur very
quickly and the top user is unaware that it has occurred however to access resources outside
the network just like the web these computers got to have a public address so as for replies to
their requests to come to them. this is often wherever ( NAT) comes into play. A digital PC
within a network makes an invitation to a computer on the web. Routers at intervals the
network determine that the request isn't for a resource within the network, so that they send
the request to the firewall. The firewall sees the request from the pc with the interior
scientific discipline. IT then makes a similar request to the web mistreatment its own public
address, and returns the response from the web resource to the pc within the personal network.
From outlook of the digital computer, it seems that communication is directly with the
positioning on the web. once NAT is employed during this approach, all users within the
personal network access the web have a similar public scientific discipline address once they
use the web. There are several advantages we will get from the Network Address Translation
(NAT).
Static IPs.
It is a permanent range assigned to a PC through net service supplier. Static IPs are helpful to
net hosting or vocalization net protocol (VOIP). the most advantage of exploitation static IPs
is speed and reliability. So, once EMC company is doing dealings with external countries it
wants a quick net affiliation for these varieties of activities the static IPs are extremely
facilitate full to the EMC company.
Figure 6 – IP
DMZ.
This refers to a host or other network that exists as a secure and intermediate network, in
alternative terms it refers to a network between two organizations or an organization's
internal network. Once the EMC company has managed its buyers, some external network
system may attack the EMC network work system. EMC will use regional network systems
to prevent such attacks.
NAT. Network address conversion is to limit the public IP address that EMC may use for
security and economic purposes. When a public IP address is available, EMS's NAT system
is used to answer incoming requests over an unknown IP address. The NAT system is very
helpful to EMC to prevent these activities.
A trustworthy network system could be a network of plans that are joined to every different,
and it will expose solely to official users, and permits for less than protected knowledge to be
transmitted. A trustworthy Network System design uses current standards, protocols and
hardware plans to implement “trust.” trustworthy Network System deliver very important
security services like user authentication, complete network device admission management,
end-device standing checks, policy-based access management, traffic filtering, machine-
driven rectification of noncompliant devices and auditing. The trustworthy Computing cluster
has broadcast trade standards for trustworthy Network System. many profitable trustworthy
Network System technologies are advanced, as well as Cisco Trust Sec, Cisco Clean Access
formerly referred to as Cisco Network Admission management, and Microsoft Network
Access Protection.
Network access device: All network systems on a permanent network system operate
through a network access device, which applies to the policy. Devices such as
switches, routers, VPN concentrators, and wireless access points may have NAD
practicality.
Other Servers :- These contain trusted versions of Audit, VPN, DHCP and DNS
servers.
Client Device :- Every server device must be evaluated before entering a trusted
network system.
Authorization and Access Control Server :- The authorization and access management
server upholds the policy and provides rules to NADs supported the results of
authentication and posture validation.
2.3 Identify and evaluate the tools that can be utilized by EMC cyber to
improve the network and security performance without compromising
each other. Evaluate at least three virtual and physical security measures
that can be implemented by EMC to uphold the integrity of organization’s
IT policy.
Network browsing can be a systematic attempt by the PC network to find slow or failed
network mechanisms, such as full or stopped / frozen servers, failed routers, and failed
devices. Network frustration or similar downtime is a subset. If this happens, the network
viewing system alerts the network administrator. Network viewing the network management
subsection is a subsection. Network observance is mostly applied through package
applications and tools. Network observance services area unit loosely want to find whether or
not a given internet server is operative and connected properly to networks worldwide.
several servers that create this job offer an additional complete visual image of each the web
and networks.
Keeping Informed without inhouse staff :- A network observation service can send warnings
and data to SMB owner as problems arise. Otherwise, SMB might have to either effort to
observation their network security themselves or rent a full-time IT employee- that may well
be terribly expensive. information breaches are additional harmful and dearer the longer they
are going while not being noticed .
Optimizing and monitoring the network :- Many small business homeowners expect the unit
to rise. This growth cannot be achieved if the components of their IT infrastructure area unit
are overloaded or slowed down. Network viewing services can set up the infrastructure of a
minimal business, showing the development space of the associated SMB owner and any
issues that currently need to be addressed. (indesignsecrets).
PRTG Monitor.
Monitoring and alerting uptimes and downtimes or slow servers. system health monitoring of
various hardware devices network device monitoring and bandwidth accounting. application
monitoring virtual servers service level agreement (SLA) monitoring. System usage
monitoring ( CPU load, free memory, or free disk space). Email server monitoring and
reviewing various backup solutions.
DataDog.
Designed specifically for hybrid cloud setups. Extensibility is possible because to a large
number of APIs (Application Programming Interfaces) with extensive documentation.
Monitor the network's, apps', tools', and services' performance. Agents are available for a
Activity 03
(This can include one or more of the following: network change management, audit control,
business continuance/disaster recovery plans, potential loss of data/business, intellectual
property, Data Protection Act; Computer Misuse Act; ISO 31000 standards.)
Risk is a dark environment will face in the future. Information technology happens during a
relatively short period of time . These risks can occur as a result of grouping. There will be
many risks to the organization due to the mistakes of the staff of the organization. Therefore,
the owner as an associate owner of the organization should assess the risk.
Risk Assessment.
A risks area unit common factor to numerous massive organization communities,
corporations ETC. So, risk assessment suggests that the term wont to the general method for
establish and analysis the hazards and risk that planning to occur to the corporate or
Risk is a common factor for large organizational communities, with companies using ETC.
Therefore, Risk Assessment is information security that is extremely useful for a corporation
to attempt as a result of any organization or large company that has a useful knowledge of the
data leaked. Their competitors can get the bank rap they want for the organization or
corporation. These include a number of utility complete information that companies are said
to have.
Ex:- Number of costumers they have.
Information about the assets.
The type of the customers they have.
Banking information.
There are many ways to protect the required knowledge in the form of information leakage
from a business or organization that is at high risk from the organization.
Employee monitoring.
This is additionally a technique of knowledge protection as a result of a number of the
employees or staff could do Froud activities to the corporate thus as associate owner got
aware of that thus oft watching the employees the employees the staff or workers is a vital
task to try and do. However, there are limits to watch the staff. as a result of their privacy
things that worker additionally protective thus watching of the staff is permissible wherever
The Internet of Things (IoT) refers to a system of reticulated, internet-connected objects that
are ready to collect and transfer information over a wireless network while not human
intervention. A thing in the web of things will be an individual with a heart monitor implant,
a farm animal with a biochip electrical device, an automobile that has built-in sensors to alert
the motive force when tire pressure is low or any other natural or man-made object which
will be assigned an online Protocol (IP) address and is ready to transfer information over a
network. more and more, organizations in a variety of industries are mistreatment IoT to
work a lot of expeditiously, higher perceive clients to deliver enhanced customer service,
improve decision-making and increase the worth of the business. an IoT scheme consists of
web-enabled good devices that use embedded systems, like processors, sensors and
communication hardware, to collect, send and act on information they acquire from their
environments. IoT devices share the sensing element information they collect by connecting
to an IoT entree or different edge device wherever information is either sent to the cloud to be
analyzed or analyzed domestically. Sometimes, these devices communicate with other related
devices and act on the data they get from one another. The devices do most of the work while
not human intervention, though folks will move with the devices -- for example, to line them
up, provide them directions or access the information. 5G Network Direct Connect (IoT), for
3.2 Explain the mandatory data protection laws and procedures which will
be applied to data storage solutions provided by EMC Cyber. You
should also summarize ISO 31000 risk management methodology.
For everything there should be lows and rules that must always fallow. If not that EMC
company can’t do it for unendingly. First, company to check what's the meaning of law. Low
means that an explicit kind of order that's implemented by the pinnacle of the organization to
minimize the mistakes, frauds, federations among the employees who are operating in the
organization Implementing lows may be a is a task that's done by the CEO of the company as
a result of he ought to knowledge to implement the appropriate laws for the employees. once
the low gets high some worker won't work properly or once there are square measure less
laws conjointly the employee won't properly. Forget the work done by the employees the
chief executive officer should assume from his perspective, the corporate’s perspective and
employee’s perspective then will continue organization or the company peacefully with none
mistakes, frauds and foveations. Every chief executive officer is trying to find scale back the
risks that returning towards his organization for that ought to implement lows and rules
unendingly however there are square measure tips once implementing lows for the risks, that
tips once square measure in ISO 31000 – 2018 / ISO 17799: 2005.
3.2.2 Summarization of ISO 31000: 2018 / ISO 17799: 2005 related to EMC
company.
The ISO 31000: 2018 / ISO 17799: 2005 this is often consisting of risk management tips,
providing principles and frame works to manage risks in EMC company. once the CEO of the
EMC company is following those ISO 31000: 2018 / ISO 17799: 2005 low it simple to
In different words, the chief operating officer of the EMC company will compare the threats
that he long-faced within the past with the new threats that comes towards. And different
profit the owner of the EMC company has was it will compare their risk management
practices with associate degree internationally recognized Benchmark providing sound
principals for effective management and company governance. Another profit it's was the
Owner of the EMC company will establish the risks before it established to the corporate.
From these advantages EMC company will move forward with none threats and risks. And
owner of the EMC company will take choices before there's risks attack or threat attack.
If the EMC company is affected with the risks the EMC company will have consequences in
terms of economic performance and skilled name still because the setting safely and social
out comes. If the threats or risks get settled to the economic performance of the EMC
company it an enormous loss for the corporate as a result of customers can reject the
corporate and also the banks UN agency giving loans to the corporate might rejected and also
the finally the workers UN agency area unit rely from the EMC company get affected. when
the economic performances it gets affected to the skilled name. If the EMC company is
dealing or doing group action with the foreign countries the skilled name is very necessary. If
it gets broken thanks to the threats or risks attacks those countries conjointly beginning to
reject the corporate. thanks to these reasons managing risks effectively helps the EMC
company to perform well in AN setting packed with uncertainty.
In each immense scale company, there's Audit firm to look at this scenario of the corporate. If
the workers did any frauds, felonious business they get caught during this scenario. that's the
advantage of associate audit firm. If there no any department known as audit firm the
corporate should get bank rapt as a result of nobody is there to seek out the frauds and
different wrong things that's happening within the company. In some corporations there are
unit security audits, which means this audit is there to visualize weather security system is
functioning in correct manner. If there's no audit system to look at the protection system the
protection system additionally may get corrupted by the higher than things and points, will
tell that there's a large impact to the organization security from the IT security audits.
The IT services connected with the IT security audit the organization will have a lot of
formidable IT system in situ. There square measure several departments within the company
once the IT security audit connect with every department the perform of the IT security audit
could vary from management to resource designing as a sequence network. For an
organization knowledge is that the one in all the key assets that needs high security
management. If the info gets discharged or hacked by the competitors or different firm it's a
main reason to the corporate get bank rapt or the corporate get a nasty name, as a result of
3.2.7 IT security Audits can identify the Vulnerable points and problem
areas in the company.
The special feature of IT security audits system has, it will determine the vulnerable points
and drawback areas simply. The IT system could be a large one with many elements together
with hardware, software, knowledge and procedures however the IT security system will
determine the vulnerable areas simply. From the IT security system, are able to} check
weather our hardware or software package tools are designed properly and dealing properly.
And security audits square measure retracing the safety incidents or the harmful state of
affairs that company round-faced within the past from the previous which may have exposed
our security weak points. the opposite main factor that's done by the audit was the main focus
on the finishing up tests in terms of network weaknesses, software package, access
management and security applications.
Security functions aligned with the company’s goals and documented in company policies
and procedures. company policies and procedures don't seem to be simply paperwork—they
are the idea of a powerful security arrange. Once the corporate policies and procedures are
advanced or updated with the corporate staffs facilitate, organization’s security basis are
going to be a lot of current, sound and in compliance.
Organizational style is measured in policy works as a forceful policy tool to place policy to
action. However, earlier analysis has not examined the project organization as a definite
variety of structure style and, hence, has not given a lot of care to such organizations as a
planned alternative once selecting policy tools. the aim of the article is to look at the project
as a policy tool however do such impermanent organizations operate as a selected variety of
organization once public policy is applied? The article relies on a framework of policy
operation and is incontestable with 2 welfare reforms within the Swedish public sector, that
were ready and applied as project organizations. The case studies and also the examination
show that it's important that a project organization fits into the governance structure once
used as a policy tool. If not, the project can stay summarized and cannot have sufficient
influence on the permanent structure. The thought of encapsulation indicates a desire to
defend the project from a possible hostile atmosphere. The implication of this can be that
structure style as a policy tool could be a matter that rates a lot of attention within the planned
discussion on implementing public policies and on the quality of mistreatment bound policy
tools.
4..1.2 DRP
Enhancing the
availability of
resources: If an
Intelligence server
in a cluster is not
available, it can be
recovered by the
other intelligence
servers in the
cluster. This
prevents time and
information from
losing valuable time
if a server fails.
Backup. Fast file access. Installation to accelerate the High
Natural catastrophe of a backup process of
protection. solution catastrophe
Failed hard drive based on recovery and
security. cloud. preserve your data.
Recovery if OS
fails If backup sites are
implemented a few
miles away from
the main operation
Improving
emergency
management by
delivering
real time
information
As the security
expert, the author
suggests setting up
disaster recovery
sites and redundant
servers that are
situated a distance,
but can be accessed
easily via different
methods.
4.2 Develop and present a disaster recovery plan for EMC Cyber according
to the ISO/IEC 17799:2005 or similar standard which should include
the main components of an organizational disaster recovery plan with
justifications. Discuss how critical the roles of the stakeholders in the
organization to successfully implement the security policy and the
disaster recovery plan you recommended as a part of the security audit
An organization will begin its DRP arrangement with a list of immediate important action
steps and important contacts, so that the most important information comes out quickly and
simply. This provision should describe the roles and functions of the members of the disaster
relief team and describe the factors that make the provision work. This provision specifies
event response and recovery activity in detail.
Stake holder.
Definition of the term "partner": "An individual, group, or organization that has a focus or
concern on an organization. The activities (objectives, and policies' of the organization may
influence or influence the parties, the government (and its agencies), the owners
(shareholders), The community in which suppliers, unions and the company attract its
resources. Should be treated equally as employees of the company. Stakeholders in a
corporation
Types of shareholders.
are individuals and constituencies who voluntarily or unwillingly contribute to the volume
and activities that create wealth and are therefore the event response and recovery activists.
St Primary Stakeholders - Usually stakeholders are those who deal with the business
financially. For example, shareholders, customers, suppliers, creditors and employees).St
excluded stakeholders - people like children or the impartial public, because initially they do
not have a financial impact on the corporation. Nowadays the concept is taken from a related
partisan point of view and some groups, like the general public, are documented as
stakeholders while others stand apart. From such a point of view, plants, animals, or perhaps
geology do not present as stakeholders and voices, however full of life to refer to human
groups or individuals alone. Secondary stakeholders - usually external stakeholders, even if
they do so without direct financial involvement with the business - are individuals who
influence its activities. For example, the final public, communities, action groups, business
support groups and the media.
Can read Security’s customers from 2 viewpoints: the roles and tasks that they need, and also
the security assistances they acquire. The roles and tasks side area unit very important as a
result of it controls however ought to interconnect to varied security customers, supported
permitting and swaying them to perform their roles in security, though that role could be a
humble one, like victimization Associate in Nursing access card to realize admission to the
Internal stakeholder.
According to Nilson (2006: p170), internal stakeholders are those within the management,
selling consultants, designers, purchasing, producing, assembly and sales, whereas external
stakeholders are the users/customers, distributors, governments, suppliers, communities, laws
and laws. (Karim, et al., 2007, pp.8).
1) Project manager.
The project manager is answerable of guaranteeing that the project team finishes the project.
The project manager creates the project arrange and oversees the team's execution of project
operations.
2) Investors.
Investors raise or decrease their holdings in a firm based on its financial performance.
3) Directors.
Directors participate within the business's decision-making method. once it involves EMC,
principally administrators area unit concerned in adopting EMC security policies. The author
outlines the duties that EMC administrators should fulfil.
The company's stock is control by the company's shareowner. Highlight the roles of
the shareholders within the EMC as follows.
Provide a supply of funding for the EMC.
Using their option privileges, they'll inquire into and approve the EMC's security
policy.
Assistance with the EMC's decision-making method.
Employees.
An worker may be an employee or a manager for an organization. The EMC worker plays the
important role in implementing EMC security policies and procedures to secure the data
security of the EMC cloud.
External Stakeholders.
Government organizations.
Governmental agencies for various areas of administration are established by the government.
Refer to the duties of government agencies as follows.
Role Title
Responsible for data backup system Backup Admin
Coordinator of the recovery team Network specialist
Responsible for server system System engineer
Team lead Head of IT
Responsible for security system Security admin
Responsible for data storage system Storage Admin
Team lead Head of IT
https://www.researchgate.net/publication/266686928_Classification_of_Security_Threats_in
_Inf ormation_Systems [Accessed 13 Feb. 2023].