0% found this document useful (0 votes)
56 views82 pages

Sec Udesh Assignment

The document summarizes an internal verification of assessment decisions for a student named Narayana Mudiyanselage Udesh Ishanka enrolled in the BTEC Higher National Diploma in Computing – Software Engineering program. The assessor, Ms. Samindi, assessed the student's work on the Security unit assignment titled "EMC Cyber" and determined that the student had met the criteria for a Pass. The internal verifier reviewed the assessor's evaluation and agreed that the Pass grade was justified based on the student's work and feedback. The internal verification was completed and signed off on by both the assessor and internal verifier.

Uploaded by

udesh ishanka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
56 views82 pages

Sec Udesh Assignment

The document summarizes an internal verification of assessment decisions for a student named Narayana Mudiyanselage Udesh Ishanka enrolled in the BTEC Higher National Diploma in Computing – Software Engineering program. The assessor, Ms. Samindi, assessed the student's work on the Security unit assignment titled "EMC Cyber" and determined that the student had met the criteria for a Pass. The internal verifier reviewed the assessor's evaluation and agreed that the Pass grade was justified based on the student's work and feedback. The internal verification was completed and signed off on by both the assessor and internal verifier.

Uploaded by

udesh ishanka
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 82

Higher Nationals

Internal verification of assessment decisions – BTEC (RQF)


INTERNAL VERIFICATION – ASSESSMENT DECISIONS

Programme title BTEC Higher National Diploma in Computing – Software Engineering

Ms.Samindi
Assessor Internal Verifier
Unit 05: Security
Unit(s)
EMC Cyber
Assignment title

Student’s name Narayana Mudiyanselage Udesh Ishanka

List which assessment Pass Merit Distinction


criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST

Do the assessment criteria awarded


match those shown in the assignment Y/N
brief?

Is the Pass/Merit/Distinction grade


awarded justified by the assessor’s
Y/N
comments on the student work?
Has the work been assessed
Y/N
accurately?
Is the feedback to the student:
Give details:

• Constructive?
Y/N
• Linked to relevant assessment
criteria? Y/N

• Identifying opportunities for


improved performance?
Y/N

• Agreeing actions? Y/N

Does the assessment decision need


Y/N
amending?
Assessor signature Date

Internal Verifier signature Date


Programme Leader signature (if
Date
required)
Confirm action completed
Remedial action taken

Give details:

Assessor signature Date

Internal Verifier
Date
signature

Programme Leader signature


Date
(if required)
Higher Nationals - Summative Assignment Feedback Form
Student Name/ID Narayana Mudiyanselage Udesh Ishanka / Kan-00142214

Unit Title Unit 05: Security

Assignment Number 1 Assessor Ms.Samindi

11.03.2023 Date Received


Submission Date
1st submission
Date Received 2nd
Re-submission Date
submission
Assessor Feedback:

LO1. Assess risks to IT security

Pass, Merit & Distinction P1 P2 M1 D1


Descripts

LO2. Describe IT security solutions.

Pass, Merit & Distinction P3 P4 M2 D1


Descripts

LO3. Review mechanisms to control organisational IT security.

Pass, Merit & Distinction P5 P6 M3 M4 D2


Descripts

LO4. Manage organisational security.

Pass, Merit & Distinction P7 P8 M5 D3


Descripts

Grade: Assessor Signature: Date:


Resubmission Feedback:

Grade: Assessor Signature: Date:


Internal Verifier’s Comments:

Signature & Date:


* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades
decisions have been agreed at the assessment board
Pearson
Higher Nationals in
Computing
Unit 5 : Security
General Guidelines

1. A Cover page or title page – You should always attach a title page to your assignment. Use
previous page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.

Word Processing Rules

1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.

Important Points:

1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the
compulsory information. eg: Figures, tables of comparison etc. Adding text boxes in the body
except for the before mentioned compulsory information will result in rejection of your work.
2. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
8. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will
then be asked to complete an alternative assignment.
9. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration

I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as
my own without attributing the sources in the correct way. I further understand what it means to copy
another’s work.

1. I know that plagiarism is a punishable offence because it constitutes theft.


2. I understand the plagiarism and copying policy of the Edexcel UK.
3. I know what the consequences will be if I plagiarize or copy another’s work in any of the
assignments for this programme. .
4. I declare therefore that all work presented by me for every aspects of my programme, will be of
my own, and where I have made use of another’s work, I will attribute the source in the correct
way.
5. I acknowledge that the attachment of this document, signed or not, constitutes a binding
agreement between myself and Pearson UK.
6. I understand that my assignment will not be considered as submitted if this document is not
attached to the main submission.

[email protected]

Student’s Signature: Date: 11.03.2023


(Provide E-mail ID) (Provide Submission Date)
Assignment Brief
Student Name /ID Number Narayana Mudiyanselage Udesh Ishanka / Kan-00142214

Unit Number and Title Unit 5- Security

Academic Year 2020/2021

Unit Tutor Ms.Samindi

Assignment Title EMC Cyber

Issue Date

Submission Date 11.03.2023

IV Name & Date

Submission Format:

The submission should be in the form of an individual written report written in a concise, formal business style
using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as
appropriate, and all work must be supported with research and referenced using Harvard referencing system.
Please provide in- text citation and an end list of references using Harvard referencing system.

Section 4.2 of the assignment required to do a 15 minutes presentation to illustrate the answers.

Unit Learning Outcomes:

LO1 Assess risks to IT security.

LO2 Describe IT security solutions.

LO3 Review mechanisms to control organisational IT security.

LO4 Manage organisational security.


Assignment Brief and Guidance:

Scenario

‘EMC Cyber’ is a reputed cyber security company based in Colombo Sri Lanka that is delivering
security products and services across the entire information technology infrastructure. The company
has a number of clients both in Sri Lanka and abroad, which includes some of the top-level companies
of the world serving in multitude of industries. The company develops cyber security software
including firewalls, anti-virus, intrusion detection and protection, and endpoint security. EMC Cyber is
tasked with protecting companies’ networks, clouds, web applications and emails. They also offer
advanced threat protection, secure unified access, and endpoint security. Further they also play the
role of consulting clients on security threats and how to solve them. Additionally the company follows
different risk management standards depending on the company, with the ISO 31000 being the most
prominent.

One of the clients of EMC Cyber, Lockhead Aerospace manufacturing which is a reputed aircraft
manufacturer based in the US, has tasked the company to investigate the security implications of
developing IOT based automation applications in their manufacturing process. The client has
requested EMC to further audit security risks of implementing web based IOT applications in their
manufacturing process and to propose solutions. Further, Lockhead uses ISO standards and has
instructed EMC to use the ISO risk management standards when proposing the solution.

The director of the company understands such a system would be the target for cyber-attacks. As you
are following a BTEC course which includes a unit in security, the director has asked you to
investigate and report on potential cyber security threats to their web site, applications and
infrastructure. After the investigation you need to plan a solution and how to implement it according
standard software engineering principles.
Activity 01

Assuming the role of External Security Analyst, you need to compile a report focusing on following
elements to the board of EMC Cyber’;

1.1 Identify the CIA Triad concept and evaluate why and how the CIA Triad could be utilize to EMC
Cyber in order to improve the organization’s security.

1.2 Identify types of security risks EMC Cyber is subject to its present setup and the impact that they
would make on the business itself. Evaluate at least three physical and virtual security risks identified
and suggest the security measures that can be implemented in order to improve the organization’s
security.

1.3 Develop and describe security procedures for EMC Cyber to minimize the impact of issues
discussed in section (1.1) by assessing and rectifying the risks.

Activity 02

2.1 Identify how EMC Cyber and its clients will be impacted by improper/ incorrect configurations
that are applicable to firewalls and VPN solutions. IT security can include a network monitoring
system. Discuss how EMC cyber can benefit by implementing a network monitoring system with
supporting reasons.

2.2 Explain how the following technologies would benefit EMC Cyber and its Clients by facilitating a
‘trusted network’. (Support your answer with suitable examples).

i) DMZ

ii) Static IP

iii)NAT

2.3 Identify and evaluate the tools that can be utilized by EMC cyber to improve the network and
security performance without compromising each other. Evaluate at least three virtual and physical
security measures that can be implemented by EMC to uphold the integrity of organization’s IT
policy.
Activity 03

3.1 Discuss suitable risk assessment integrated enterprise risk management procedures for EMC
Cyber solutions and the impact an IT security audit will have on safeguarding organization and its
clients. Furthermore, your discussion should include how IT security can be aligned with an
organizational IT policy and how misalignment of such a policy can impact on organization’s security.

(This can include one or more of the following: network change management, audit control, business
continuance/disaster recovery plans, potential loss of data/business, intellectual property, Data
Protection Act; Computer Misuse Act; ISO 31000 standards.)

3.2 Explain the mandatory data protection laws and procedures which will be applied to data storage
solutions provided by EMC Cyber. You should also summarize ISO 31000 risk management
methodology.

Activity 04

4.1 Design an organizational security policy for EMC Cyber to minimize exploitations and misuses
while evaluating the suitability of the tools used in an organizational policy.

4.2 Develop and present a disaster recovery plan for EMC Cyber according to the ISO/IEC 17799:2005
or similar standard which should include the main components of an organizational disaster recovery
plan with justifications. Discuss how critical the roles of the stakeholders in the organization to
successfully implement the security policy and the disaster recovery plan you recommended as a part
of the security audit.

(Students should produce a 15 minutes PowerPoint presentation which illustrates the answer for
this section including justifications and reason for decisions and options used).
Grading Rubric

Grading Criteria Achieved Feedback

LO1 Assess risks to IT security

P1 Identify types of security risks to organisations.


P2 Describe organizational security procedures.

M1 Propose a method to assess and treat IT security risks.

LO2 Describe IT security solutions

P3 Identify the potential impact to IT security of incorrect


configuration of firewall policies and thirparty VPNs.

P4 Show, using an example for each, how implementing a DMZ,


static IP and NAT in a network can improve Network Security.
M2 Discuss three benefits to implement network monitoring
systems with supporting reasons.
D1 Evaluate a minimum of three of physical and virtual security
measures that can be employed to ensure the integrity of
organisational IT security.
LO3 Review mechanisms to control organisational IT
security

P5 Discuss risk assessment procedures.

P6 Explain data protection processes and regulations as applicable


to an organisation.
M3 Summarise the ISO 31000 risk management methodology and its
application in IT security.
M4 Discuss possible impacts to organizational security resulting
from an IT security audit.
D2 Consider how IT security can be aligned with organisational
policy, detailing the security impact of any misalignment.
LO4 Manage organizational security

P7 Design and implement a security policy for an organisation.

P8 List the main components of an organisational disaster recovery


plan, justifying the reasons for inclusion.
M5 Discuss the roles of stakeholders in the organisation to
implement security audit recommendations.
D3 Evaluate the suitability of the tools used in an organisational
policy.
2021/2022

HND 78 BATCH
N.M.Udesh Ishanka (Student ID :Kan-00142214)
Contents

Table of tables ............................................................................................................................ 4


Table of figures .......................................................................................................................... 4
Executive Summary. .................................................................................................................. 5
Activity 01 - Assuming the role of External Security Analyst, you need to compile a report
focusing on following elements to the board of EMC Cyber’; .................................................. 5

1.1 Identify the CIA Triad concept and evaluate why and how the CIA Triad could be
utilize to EMC Cyber in order to improve the organization’s security. ................................. 5

1.1.1 Introduction. ......................................................................................................... 5


1.1.2 Relationship between Vulnerabilities, Threats, Assets and Risks. ...................... 6

1.2 Identify types of security risks EMC Cyber is subject to its present setup and the
impact that they would make on the business itself. Evaluate at least three physical and
virtual security risks identified and suggest the security measures that can be implemented
in order to improve the organization’s security. .................................................................... 8

1.2.1 Identification of security risks that EMC company will be faced. ...................... 8
1.2.2 List of Risks ............................................................................................................. 8

1.3 Develop and describe security procedures for EMC Cyber to minimize the impact of
issues discussed in section (1.1) by assessing and rectifying the risks. ............................... 11

1.3.1 Security procedures that developed to avoid the risks. ......................................... 11


1.3.2 List of Security procedures. ................................................................................... 11
1.3.3 Purpose of the Risk treatment . ............................................................................... 13
1.3.4 Used methods of the Physical security. ............................................................. 13
1.3.5 Hardware and software risk Assessment . ......................................................... 15
1.3.6 Risk treatment related to scenario. ..................................................................... 15

Activity 02 ............................................................................................................................... 17

2.1 Identify how EMC Cyber and its clients will be impacted by improper/ incorrect
configurations that are applicable to firewalls and VPN solutions. IT security can include a
network monitoring system. Discuss how EMC cyber can benefit by implementing a
network monitoring system with supporting reasons. .......................................................... 17

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 1
2.1 Potential impact to the organization when there is an improper firewall system
and VPNs. ........................................................................................................................ 17

2.2 Explain how the following technologies would benefit EMC Cyber and its Clients
by facilitating a ‘trusted network’. (Support your answer with suitable examples). ........... 21

2.2 Static IPs, DMZ and NAT. ........................................................................................ 21


2.2.1 Static IPs. ................................................................................................................ 21
2.2.2 DMZ. ....................................................................................................................... 22
2.2.3 Real function of the DMZ. ...................................................................................... 23
2.2.4 Architecture of DMZs network. .............................................................................. 23
2.2.5 NAT (Network Address Translation). .................................................................... 24
2.2.6 Static IPs, DMZ, NAT helps to the EMC company. .............................................. 25
2.2.7 Trusteed Network system. ...................................................................................... 26

2.3 Identify and evaluate the tools that can be utilized by EMC cyber to improve the
network and security performance without compromising each other. Evaluate at least
three virtual and physical security measures that can be implemented by EMC to uphold
the integrity of organization’s IT policy. ............................................................................. 27

2.3.1 Network Monitoring System. ................................................................................. 27

Activity 03 ............................................................................................................................... 29

3.1 Discuss suitable risk assessment integrated enterprise risk management procedures for
EMC Cyber solutions and the impact an IT security audit will have on safeguarding
organization and its clients. Furthermore, your discussion should include how IT security
can be aligned with an organizational IT policy and how misalignment of such a policy can
impact on organization’s security. ....................................................................................... 29

3.1 Risk Assessment Procedures...................................................................................... 29


3.1.1 A Risk. .................................................................................................................... 29
3.1.2 Data protection process that applicable to an organization. .................................. 30
3.1 .3 (I.O.T.) Internet of things. ..................................................................................... 33

3.2 Explain the mandatory data protection laws and procedures which will be applied to
data storage solutions provided by EMC Cyber. You should also summarize ISO 31000
risk management methodology. ........................................................................................... 34

3.2 Summarization of ISO 31000 risk management law. ............................................... 34

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 2
3.2.1 The Law. ................................................................................................................. 34
3.2.2 Summarization of ISO 31000: 2018 / ISO 17799: 2005 related to EMC company.
.......................................................................................................................................... 34
3.2.3 ISO 31000: 2018 Risk Management. ...................................................................... 35
3.2.4 Audit. ...................................................................................................................... 36
3.2.5 IT security Audit. ................................................................................................... 36
3.2.6 IT security Audit does for the company. ............................................................... 36
3.2.7 IT security Audits can identify the Vulnerable points and problem areas in the
company. .......................................................................................................................... 37
3.2.8 IT security aligned with organization policy. ......................................................... 37

Activity 04 ............................................................................................................................... 38

4.1 Design an organizational security policy for EMC Cyber to minimize exploitations and
misuses while evaluating the suitability of the tools used in an organizational policy. ....... 38

4.1.1 suitability of the tools used in the polices. .............................................................. 38


4..1.2 DRP ........................................................................................................................ 38

4.2 Develop and present a disaster recovery plan for EMC Cyber according to the ISO/IEC
17799:2005 or similar standard which should include the main components of an
organizational disaster recovery plan with justifications. Discuss how critical the roles of
the stakeholders in the organization to successfully implement the security policy and the
disaster recovery plan you recommended as a part of the security audit ............................. 44

4.2.1 Disaster recovery plan............................................................................................. 44


4.2.2 Role of the stake holders related to the security of the EMC company. ................. 45
4.2.3 Role of a security stake holder related to the company. ......................................... 45
4.2.4 Categorized two types of stakeholders . ................................................................. 46

References ................................................................................................................................ 65

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 3
Table of tables

Table 1 : Main categorization of the Risks ............................................................................... 9


Table 2 - Access Control List .................................................................................................. 15
Table 3 - Advantages & Disadvantages of Static IPs .............................................................. 22
Table 4 - Advantages & Disadvantages of DHCP IPs ............................................................. 22
Table 5 - Risk assessment purpose. ......................................................................................... 31
Table 6 - Security Policy......................................................................................................... 39
Table 7 - Discuss the roles of stakeholders plan. ..................................................................... 41
Table 8 - EMC Cyber during a disaster. .................................................................................. 48
Table 9 - EMC organizational policy...................................................................................... 49
Table 10 - EMC organizational policy..................................................................................... 50

Table of figures

Figure 1 - The vulnerability management cycle. ....................................................................... 7


Figure 2 - Access Control List ................................................................................................. 14
Figure 3 - Firewall ................................................................................................................... 18
Figure 4 – VPN ........................................................................................................................ 20
Figure 5 - Architecture of DMZs network ............................................................................... 24
Figure 6 – IP............................................................................................................................. 25
Figure 7 - Disaster recovery plan for EMC Cyber ................................................................... 52
Figure 8 - Disaster recovery plan for EMC Cyber ................................................................... 53
Figure 9 - Disaster recovery plan for EMC Cyber . ................................................................. 54
Figure 10 - Disaster recovery plan for EMC Cyber ................................................................. 55
Figure 11 - Disaster recovery plan for EMC Cyber . ............................................................... 56
Figure 12 - Disaster recovery plan for EMC Cyber ................................................................. 57
Figure 13 - Disaster recovery plan for EMC Cyber ................................................................. 58
Figure 14 - Disaster recovery plan for EMC Cyber ................................................................. 59
Figure 15 - Disaster recovery plan for EMC Cyber . ............................................................... 60
Figure 16 - Disaster recovery plan for EMC Cyber ................................................................. 61
Figure 17 - Disaster recovery plan for EMC Cyber . ............................................................... 62

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 4
Figure 18 - Disaster recovery plan for EMC Cyber . ............................................................... 63
Figure 19 - Disaster recovery plan for EMC Cyber ................................................................. 64

Executive Summary.

Users of this system should have a basic idea of how to manage network security
infrastructure. This report provides an overview of network security systems in use in this
world. Some public network security systems show it integrated. This report involves
designing a network security system for the Colombo EMC wherever it operates on a day-to-
day basis. They needed this network security system for good local and international
cooperation in services.

Activity 01 - Assuming the role of External Security Analyst, you


need to compile a report focusing on following elements to the
board of EMC Cyber’;

1.1 Identify the CIA Triad concept and evaluate why and how the CIA
Triad could be utilize to EMC Cyber in order to improve the
organization’s security.

1.1.1 Introduction.

EMC is one of the most reputed cyber security companies in Sri Lanka. EMC typically
provides its services to Lockheed Aerospace Manufacturing Company, a reputed small and
medium scale business in Sri Lanka and overseas business and US based aircraft
manufacturer. EMC Cybersecurity develops cybersecurity software for its customers
including SAAS, PAAS, LAAS, IOT and firewalls, anti-virus, intrusion detection and
security and endpoint security. EMC Cyber is also responsible for protecting corporate
networks, cloud, web applications and email. They also offer advanced threat protection,
secure integrated access and endpoint security. They also play the role of seeking advice from

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 5
clients on security threats and how to resolve them. In addition, it adopts various risk
management standards depending on the company and ISO 31000 is the most prominent.
Their client rate is approximately 5 percent. EMC's top workplace is based in Colombo, Sri
Lanka.

CIA Triad.

The Cia Triad is a security model that highlights core information security objectives and is a
guide for organizations to stay their sensitive information shielded from unauthorized access
and data exfiltration.

The three principles of the CIA triad.

A simple but widely applied security model is the CIA triangle; Advocating confidentiality,
integrity and availability; Here are three key pointers in moving your security system forward.

Important CIA triad.

The CIA triad is important to data security since it enhances security posture, helps
organizations keep compliant with complicated laws and ensures business continuity.

CIA certification of the Trinity.

The CIA triad is important to data security since it enhances security posture, helps
organizations keep compliant with complicated laws and ensures business continuity.

1.1.2 Relationship between Vulnerabilities, Threats, Assets and Risks.

Vulnerabilities area unit the explanations that's serving to begin risk. Vulnerability could be a
operate that everyone the corporate could face attributable to that a lot of users and network
personals making an attempt to guard their pc systems from vulnerabilities by keeping code
security patches up to now.

Threats are caused to the company from inside the company and will be from the skin the
corporate. Ordinarily most of the threats are affected from the outside the company. Threats

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 6
are potentials for vulnerability to show into attacks on PC systems, network and additional.
They'll place individual’s computer system, and business computers at risks. Per the
Getcybersafe.gc.ca a number of the common threats are Hacking, Ransomware, Malware,
Spam, Phishing, Botnets etc...

Assets are a measure of a company's physical resources. The company usually measures the
exploitation of the remaining assets. An asset is an asset that has economic value and is a
person, corporation or value in the hope of making a future profit. Risks are the dark things
that can happen to that business in the near future. Basically, the risks are outweighed by the
external and internal risks that occur in the negative. Liability, loss, or any other negative
event caused by an external or internal risk is considered a risk.

The vulnerability management cycle.

Figure 1 - The vulnerability management cycle.

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 7
1.2 Identify types of security risks EMC Cyber is subject to its present
setup and the impact that they would make on the business itself.
Evaluate at least three physical and virtual security risks identified and
suggest the security measures that can be implemented in order to
improve the organization’s security.

1.2.1 Identification of security risks that EMC company will be faced.

Dark things that are about to happen within the future during a business risk unit. Basically,
the chance is outweighed by the chance of damaging the business, the inflated liability, and
also the proven fact that the loss is somewhat risky for the business, as an example, the
negative risk to the business. thanks to the shortage of a correct security system, the native
unit of the EMC company there might face variety of risks to the corporation.

1.2.2 List of Risks

Physical damages.

Physical damage is basically the damage that can be done to physical properties. The risk of
security damage to the corporation is high as EMC loses a physical security system. When an
organization suffers physical damage, it will incur a huge loss to the organization as a result
of the breakdown of the property used by the organization. (stakeholdermap).

Equipment malfunction.

Equipment malfunction suggests that once there aren't any virus guards to the computers or
the other physical science it’s get accomplished by viruses and it step by step get awry
therefore with none security, instrumentation malfunction is additionally sure variety of risk
to the EMC company.

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 8
Misuse of data.

Misuse of information may be a results of loss of security system. Misusing knowledge is


badly Couse to the corporate. By this rate of assets can get low within the company. generally,
the corporate can get bankrupt because of this reason. So, misusing of information is very
affected to the corporate.

Loss of data.

Loss of data could be a part of risks that may be affected to company. once there's no security.
Of the folks might doing frauds to the business. These knowledge loss is any method or event
that leads to knowledge being corrupted or deleted and badly undecipherable by the user.
(stakeholdermap).

List of Risks ( physical and virtual risks examples ) .

 Natural disaster.
 Phishing cloud provider.
 Social engineering attacks.
 Unauthorized access
 Server failure.
 Distributed denial of service attacks.
 VM – level attacks.
 Cloud service providers vulnerabilities.
 Date lost and inadequate date backups.
 System vulnerabilities.
 Malicious code.

Table 1 : Main categorization of the Risks

First category Second category Third category Fourth category


Internet outages Network errors Power supply Earthquakes
failures
Computer viruses Software errors Air conditioning Terrorist Attacks

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 9
malfunctions
Hackers Data corruptions Wiring faults Fires
Test and update Hardware errors Electricity outages Flood
process errors

EMC company organizational risks.

Building risks square measure, the foremost common variety of physical risk. assume fires or
explosions. To manage building risk, and therefore the risk to mechanism, it's vital that
organizations.

EMC company organizational risks examples.

 Fraud risk.
 Marketing and reputation risk.
 Legal and regulation risk.
 Technology risk.
 Operational risk.
 Financial risk.

Security instructions

 Firewall.
 Date backups.
 Anti – virus.
 Physical access control.
 Cryptography.

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 10
1.3 Develop and describe security procedures for EMC Cyber to minimize
the impact of issues discussed in section (1.1) by assessing and rectifying
the risks.

1.3.1 Security procedures that developed to avoid the risks.

Procedures and policies square measure the foundations and regulation that enforced by each
company to its security, avoid numerous styles of frauds etc. So, these procedures and
policies ought to adapt by each staff and employers. and therefore, the alternative reason to
implement rules and regulation is to continue the business for future. That EMC company
additionally enforced numerous procedures to reduce their risks. As told within the higher
than that are a number of the risk that was long-faced by the EMC company.

1.3.2 List of Security procedures.

Property damage claim procedure.

The first risk within the list of risks, to cut back the physical harms that may happen to the
physical properties use a decent security system however essentially the most effective
methodology is to keep up a property damage claim procedure. this suggests once one thing
sadly happens to property, claim loss in line with the loss gain by victimization this property
harm claim procedure.

Regular inspection procedure.

As on the risk list, EMC will perform a replacement procedure known as the regular review
procedure by cutting off the regular equipment malfunctions once it has set out to implement
the second risk of equipment malfunction. The company has created a review schedule in line
with the routine equipment testing, which will reduce equipment performance and
malfunctions.

Monitor user action procedure.

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 11
It is important to watch the activities of users who are working with sensitive information,
which is one of the most effective ways to avoid the third risk faced by EMC for misusing
knowledge to prevent the development of a new procedure called Monitor User Procedure.
Misuse of such knowledge will expose the organization to huge losses and even potential
lawsuits. The combination of higher privileges poses an additional threat.

Create backup procedures.

Make a backup of each information we tend to enter into the pc to attenuate information risk
loss. This reduces the chance of information loss. once a particular company reduces the
chance of information loss, the corporate will expand its business space and gain insight into
the company's past things.

EMC Company risk management process.

To continue a corporation to an extended kind amount to keep up EMC company in a very


sensible manner. defend EMC company from security breaches, knowledge losses, cyber-
attacks, system failures and natural disasters. To manage those risks there's a risk
management method. Risk management method means that observation and managing
potential risks so as to reduce the negative impact they'll wear a corporation. From the safety
breaches, knowledge losses, cyberattacks, system failures and natural disasters the effective
risk management method can facilitate establish that risks create the largest threat to a
corporation and supply pointers for handling them. To possess the chance management
method effectively there are 3 steps.

Risk Assessment and Analysis.


The primary step of the chance management method is named because the risk assessment
and analysis stage. A risk assessment a corporation expertise to unsure events would might
impact its day-to-day actions and estimates the injury those events could wear a corporation
financial gain and standing.

Risk Evaluation.
After the chance assessment or analysis has been completed, a risk analysis ought to present
itself. A risk analysis compares valued risk against the chance principles that the organization

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 12
has already recognized. Risk criteria will embrace associated value and edges, socio
economic factors, legal demand and system malfunctions.

Risk Treatment and Response.


The last step within the risk management method is risk treatment and response. Risk
treatment is that the Implementation of policies and procedures which will facilitate avoid or
minimize risks. Risk treatment conjointly extends to risk transfer and risk funding.

1.3.3 Purpose of the Risk treatment .

The purpose of the danger treatment is to cut back, take away or transfer risk from the EMC
company. it's usually higher for an organization to set up ahead and stop a risk from
occurring than it's for them to require the possibility and face that risk. designing ahead will
facilitate to save lots of an organization tons of time and cash as a result of some risks might
encourage be terribly damaging to a business.

Avoidance strategies.
These ways obtain to completely stop a possible risk from happening or impacting on an
organization in the slightest degree. Main subdivisions of the turning away ways cluster
contain transfer and changings.

Minimize strategies.
These methods require a recalculation of the risk to a product or organization. Avoidance
Methods Trimming methods do not seem to be feasible, or mitigation techniques are often
used when they have already failed.

1.2.4 Used methods of the Physical security.

 Access control.
 Physical barriers.
 Fingerprint lock doors.
 Electronic ID card system.
 Security lights and speaker.

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 13
 Signing book.
 Alarm system and security sensor.
 Security guards and dogs.
 CCTV cameras.
 Physical locks.
 alligator pons.

ACL (Access control list).


Access management lists are often approached in regard to 2 main categories.

Standard ACL.
An access-list that's developed entirely mistreatment the supply scientific discipline address.
These access management lists enable or block the whole protocol suite. They don’t
differentiate between scientific discipline traffic like UDP, TCP, and HTTPS. They use
numbers 1-99 or 1300-1999 therefore the router will acknowledge the address because the
supply scientific discipline address.

Extended (Access control list ) ACL. An access-list that's wide used because it will
differentiate scientific discipline traffic. It uses each supply and destination scientific
discipline addresses and port numbers to create sense of scientific discipline traffic. you'll
additionally specify that scientific discipline traffic ought to be allowed or denied. They use
the numbers 100-199 and 2000-2699.

Figure 2 - Access Control List

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 14
Table 2 - Access Control List

Requirement Permission Protocol Source Destination Port1


1 Allow IP ANY 192.168.1.23 80
2 Allow IP ANY 192.168.1.23 80
2 Allow IP ANY 192.168.1.23 443
3 Allow UDP ANY 192.168.1.10 52
4 Deny TCP ANY ANY 52
5 Deny IP ANY ANY 52

1.2.5 Hardware and software risk Assessment .

According to this assessment that specialize in the hardware and computer code resources
that used on EMC cloud service supplier for that contemplate the chance that face specific
hardware and computer code element in EMC fail. As a security professional contemplate
following steps to tackle to cut back risk and increase security.

Hardware risk assessment.

 Update drivers an encryption methods.


 Upgrade older PCs, Laptops and notebooks to new ones.
 Remove old router from EMC network.

Software risk assessment.

 Patched wed browsers.


 Patched or up – date operating system.
 Patched or up – date productivity software.

1.2.6 Risk treatment related to scenario.

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 15
By victimization methods, the avoiding of risks are often called the risk’s treatments. To the
EMC company additionally there square measure several risks which will be affected they're
physical damages which will be occurred to the EMC company, instrumentation defective,
knowledge misusing and knowledge losing for these forms of risks there square measure
several treatment or procedures which will enforced to beat those risks they're property injury
claim procedure, regular examination procedure, Monitor user action procedure, making
backup procedures by victimization these forms of methods EMC company will treat the
chance and might overcome those risks.

Operational Risk.

Risk of loss ensuing from inadequate or unsuccessful internal processes, people, and systems,
or from external events, however is best viewed because the risk arising from the execution
of Associate in Nursing institution’s business functions. Operational risk exists in each
organization, no matter size or complexness from the biggest establishments to regional and
community banks.

Date loss risk.

EMC company would like backup and inscribe sensitive date. Use associate degree opposing
– virus software package and keep it updated. defend against power surges with associate
degree UPS.

Infrastructure risk.
IT infrastructure associate degreed operations will generally represent a major spent of the
entire IT allow an organization. In times of budget constraints, it's imperative that
organizations reevaluate and contour their IT infrastructure and operations, building
leadership in digitization at an equivalent time.

Data Quality.

measure of the condition of knowledge supported factors like accuracy, completeness,


consistency, dependability and whether or not it's up to now. activity knowledge quality

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 16
levels will facilitate organizations establish knowledge errors that require to be resolved and
assess whether or not the info in their IT systems is fit serve its supposed purpose.

Activity 02

2.1 Identify how EMC Cyber and its clients will be impacted by improper/
incorrect configurations that are applicable to firewalls and VPN
solutions. IT security can include a network monitoring system. Discuss
how EMC cyber can benefit by implementing a network monitoring
system with supporting reasons.

2.1 Potential impact to the organization when there is an improper


firewall system and VPNs.

2.1.1 . Firewalls.

Many of the putative It firms is employed to put in a firewall system to the servers as a result
of it like security system that mistreatment to guard the necessary information’s. once broadly
speaking cite the firewall it’s a software package program that used prevents unauthorized
access to or from a non-public network. once there's associate access from associate
unauthorized network or from another non-public network it’s a risks to the corporate as a
result of they'll take all the inner data through that therefore to forestall those stuffs most
firms area unit mistreatment firewall system. Firewalls area unit the tools that may be
accustomed enhance the protection of the computers connected to a network. By putting in a
firewall system, it makes laptop the pc distinctive in different words the firewall completely
isolates computer from net employing a Wall of cod. Firewalls has varied skills the most
ability it's was it will enhance the protection by sanctioning granular management over what
variety of system functions. Some folks suppose that the firewall could be a system that's

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 17
accustomed controls the traffic that passes through the network system however it’s truly
software package that's accustomed forestall unauthorized access of network systems.
unremarkably these area unit the items that's done by the firewall system. (field engineer).

 Manage and control network traffic.


 Validate access.
 Act as an intermediary.
 Record and report on events.

2.1.2 firewall Policy.

Firewall policy could be a set of rules that has a way to use this package therefore it’s simple
to handle the package. This associate degree application that's designed to regulate the flow
of net protocol (IP). and also, the firewall policy is contained the categories of firewalls and
Firewall Architectures. after remark sorts the categories of firewalls their square measure
varied kinds types.

 Application gateways
 Packet filters
 Proxy servers

Figure 3 - Firewall

Application Gateways.
An application entryway may be a proxy server that gives access management at the
appliance layer. It performs as application-layer entryway between the protected network and
therefore the untrusted network. as a result of it works at the appliance layer, it's proficient to

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 18
look at traffic well and, therefore, is taken into account the foremost secure form of firewall.
It will stop sure applications, like FTP, from incoming the protected network. It may log all
network actions in step with applications for each accounting and security audit functions.

Packet Filters .
A packet filter may be a firewall that reviews every packet for user-defined filtering rules to
regulate whether or not to pass or block it. for instance, the filtering rule may would like all
Telnet requests to be born. victimization this info, the firewall can block all packets that have
a port range twenty-three (the default port range for Telnet) in their header. Filtering rules is
engineered on supply information science address, destination information science address,
Layer four (that is, TCP/ UDP) supply port, and Layer four destination port. Thus, a packet
filter makes selections supported the network layer and therefore the transport layer.

Proxy Servers.
A proxy service is associate application that redirects users’ requests to the real services
supported associate degree organization’s security policy. All message between a user and
therefore the actual server happens through the proxy server. Thus, a proxy server performs
as a communications broker between shoppers and therefore the real application servers. as a
result of it performs as a stop wherever requests area unit valid against specific applications, a
proxy server is sometimes process intensive and might become a bottleneck below significant
traffic conditions. (Microsoft).

2.1.3 Virtual private network (VPN).

The browse one thing or search one thing from network system their net traffic from
snooping, interfaces, and censorship to avoid use VPN (Virtual non-public networks). VPN
may be a Secure tunnel between 2 or a lot of devises to stop from net traffic, snooping,
interference, and censorship. A VPN uses encoding and alternative security mechanisms to
stop unauthorized users from accessing knowledge, and to make sure that knowledge cannot
be changed while not detection because it flows through the web. It then uses the tunneling
method to move the encrypted knowledge across the web. Tunneling may be a mechanism
for encapsulating one protocol in another protocol. within the context of the web, tunneling
permits such protocols as IPX, AppleTalk, and science to be encrypted and so encapsulated in

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 19
science. Similarly, within the context of VPNs, tunneling disguises the first network layer
protocol by encrypting the packet associated intromission the encrypted packet in a science
envelope. This science envelope, that is associate science packet, will then be transported
firmly across the web. At the receiving facet, the envelope is removed and therefore the
knowledge it contains is decrypted and delivered to the suitable access device, like a router.

2.1.4 Policy.

VPN policy may be a set of rules that features a way to use this secure tunnel therefore it’s
simple to handle this tunnel. this can be AN application that's designed to regulate the net
traffic from snooping, interference and censorship. and therefore, the VPN policy is
contained the categories of VPNs and VPN Architectures. once observe sorts the categories}
of VPN there are varied kinds types.

1) Access VPNs give remote users like road warriors (or mobile users), telecommuters,
and branch offices with reliable access to company networks.
2) Computer network VPNs permit branch offices to be connected to company
headquarters in a very secure manner.

Figure 4 – VPN

Firewalls and VPNs impact to the EMC company.


EMC may be a well putative cloud resolution supplier in Sri Lankan. ordinarily EMC is
providing their services to SME bank in Sri Lankan and WEEFM company. EMC cloud
resolution Company provides SAAS, PAAS, LAAS to their customers. Not solely in
Democratic Socialist Republic of Sri Lanka EMC company is doing transactions with

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 20
external countries once doing those transactions firewalls and VPNs are the 2 code that's
important to put in. as a result of once doing dealing through networks some unauthorized
accesses may be attacked to the network system, not solely that another non-public networks
can also attack to the network system. once it gets attacked by alternative accesses, they'll get
vital data of EMC company, specially by the competitors. If the competitors EMC company
get the small print concerning the corporate it’s an enormous risk to the corporate to forestall
these types of risks the firewalls are important to put in. And if there are improper firewalls
conjointly, we've got to face these risks. The other reason was the prevailing of improper
VPNs it’s the opposite downside that arise once doing on-line transactions as a result of after
we doing on-line transactions while not employing a correct VPNs generally there may need
net traffic, snooping and interference by these webs traffics dealing can’t do properly it's
going to buffer. From the improper VPNs the name of the EMC company would possibly get
broken attributable to that we've got to put in correct VPNs.

2.2Explain how the following technologies would benefit EMC Cyber and
its Clients by facilitating a ‘trusted network’. (Support your answer
with suitable examples).

i) Static IP
ii) DMZ
iii) NAT

2.2 Static IPs, DMZ and NAT.


2.2.1 Static IPs.

A static net Protocol (IP) address (static scientific discipline address) may be a permanent
range assigned to a pc by an online service supplier (ISP). scientific discipline addresses are
helpful for recreation services, web site hosting or Protocol (VoIP). Speed and liableness are
key blessings. per a static address is constant, systems with static scientific discipline
addresses are at risk of knowledge extraction and better security risks.

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 21
Table 3 - Advantages & Disadvantages of Static IPs

Advantages of Static IPs Disadvantages of static IPs


It’s good for creating Computer servers Static IPs are preferred for hosting servers
It makes it easier for geolocation The process to set a static IP is complex
It makes it easier for geolocation Static IP address could be security risk

DHCP IPs.

A DHCP server is employed to import different informatics addresses and mechanically tack
together another network info. In most homes and little businesses, the router works because
the DHCP server. In giant networks, one laptop might act because the DHCP server. In short,
the method goes like this: a tool (the client) requests informatics address from a router (the
host), when that the host assigns AN out their informatics address to permit the consumer to
speak on the network.

Table 4 - Advantages & Disadvantages of DHCP IPs

Advantages of DHCP IPs Disadvantages of DHCP IPs


Easy to manages DHCP IPs There are many security issues in DHCP IPs
Clients can use DHCPs to obtain the It’s gets failure when there is single DHCP
information needed. server.
User can create a tailored configuration for There are problems in DHCP server if users
clients. are using older Microsoft Servers.
2.2.2 DMZ.

DMS, abbreviated for a militarized zone, is a limited network in which organizations can
protect their internal networks. It allows organizations to secure private networks (LANs) and
provide access to unreliable networks such as networks. The militarized region typically uses
an external interface to store resources, servers, and services. DMZ will be a logical sub-
network, or a physical network substitute as a secure bridge between an enclosed and exterior
network. A DMZ network has restricted access to the inner network, and all of its
communication is scanned on a firewall before being transported internally. If AN aggressor
plans to breach or attack an organization’s network, a winning attempt can solely end in the

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 22
compromise of the zone network - not the core network behind it. zone is taken into account
safer, safer than a firewall, and might also work as a proxy server.

Services of a DMZ include.


1. DNS servers.
2. FTP servers.
3. Mail servers.
4. Proxy servers.
5. Web servers.

2.2.3 Real function of the DMZ.

The over-all plan place public long-faced servers within the "DMZ network" so will separate
them from personal, trustworthy network. The uses case is that as a result of server
encompasses a public face, it may be greatly unmoving. If that happens, and a hateful party
gains access to server ought to be lonely within the zone network and not have direct access
to the personal hosts.

2.2.4 Architecture of DMZs network.

There are some ways to set up a network with a zone. The basic approaches are to use either
one or two firewalls, although most electronic equipment DMZs are planned with 2 firewalls.
the essential technique may be prolonged on to form advanced constructions, looking on the
network necessities. A solo firewall with a minimum of 3 network interfaces may be
accustomed build a specification containing a zone. the surface network is created by
connection the general public web. totally different sets of firewalls rules for traffic among
the net and also the zone, the local area network and also the zone, and also the LAN are
network PC network and also the web firmly management that ports and kinds of traffic are
permissible into the zone from the net, limit property to specific hosts within the within
network and forestall unasked connections either to the net or the within local area network
from the zone.

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 23
Figure 5 - Architecture of DMZs network

2.2.5 NAT (Network Address Translation).

Network Address Translation (NAT) Type Measurement Internet requirements occur very
quickly and the top user is unaware that it has occurred however to access resources outside
the network just like the web these computers got to have a public address so as for replies to
their requests to come to them. this is often wherever ( NAT) comes into play. A digital PC
within a network makes an invitation to a computer on the web. Routers at intervals the
network determine that the request isn't for a resource within the network, so that they send
the request to the firewall. The firewall sees the request from the pc with the interior
scientific discipline. IT then makes a similar request to the web mistreatment its own public
address, and returns the response from the web resource to the pc within the personal network.
From outlook of the digital computer, it seems that communication is directly with the
positioning on the web. once NAT is employed during this approach, all users within the
personal network access the web have a similar public scientific discipline address once they
use the web. There are several advantages we will get from the Network Address Translation
(NAT).

 Reuse of private IP addresses.


 Enhance security for private networks by keeping internal address private from the
external network.

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 24
 Connecting a large number of hosts to the global internet using a smaller number of
public (external) IP address, there by conserving IP address space.

2.2.6 Static IPs, DMZ, NAT helps to the EMC company.

Static IPs.

It is a permanent range assigned to a PC through net service supplier. Static IPs are helpful to
net hosting or vocalization net protocol (VOIP). the most advantage of exploitation static IPs
is speed and reliability. So, once EMC company is doing dealings with external countries it
wants a quick net affiliation for these varieties of activities the static IPs are extremely
facilitate full to the EMC company.

Figure 6 – IP

DMZ.
This refers to a host or other network that exists as a secure and intermediate network, in
alternative terms it refers to a network between two organizations or an organization's
internal network. Once the EMC company has managed its buyers, some external network
system may attack the EMC network work system. EMC will use regional network systems
to prevent such attacks.

NAT. Network address conversion is to limit the public IP address that EMC may use for
security and economic purposes. When a public IP address is available, EMS's NAT system
is used to answer incoming requests over an unknown IP address. The NAT system is very
helpful to EMC to prevent these activities.

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 25
2.2.7 Trusteed Network system.

A trustworthy network system could be a network of plans that are joined to every different,
and it will expose solely to official users, and permits for less than protected knowledge to be
transmitted. A trustworthy Network System design uses current standards, protocols and
hardware plans to implement “trust.” trustworthy Network System deliver very important
security services like user authentication, complete network device admission management,
end-device standing checks, policy-based access management, traffic filtering, machine-
driven rectification of noncompliant devices and auditing. The trustworthy Computing cluster
has broadcast trade standards for trustworthy Network System. many profitable trustworthy
Network System technologies are advanced, as well as Cisco Trust Sec, Cisco Clean Access
formerly referred to as Cisco Network Admission management, and Microsoft Network
Access Protection.

Components of the trusted network system.

 Network access device: All network systems on a permanent network system operate
through a network access device, which applies to the policy. Devices such as
switches, routers, VPN concentrators, and wireless access points may have NAD
practicality.

 Posture Correction Servers: These clients provide correction decisions to a customer


device in the event of non-compliance. For example, a client may have the latest virus
signature, and a non-compliant customer device will need to sign up before
connecting to a certified network system.

 Assesses client compliance before clients connect to TN. PVS is usually a


specialization for a single client feature.

 Directory Server: This server validates their identities or roles.

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 26
Ex:- OS version and patch or virus signature release.

 Other Servers :- These contain trusted versions of Audit, VPN, DHCP and DNS
servers.
 Client Device :- Every server device must be evaluated before entering a trusted
network system.
 Authorization and Access Control Server :- The authorization and access management
server upholds the policy and provides rules to NADs supported the results of
authentication and posture validation.

2.3 Identify and evaluate the tools that can be utilized by EMC cyber to
improve the network and security performance without compromising
each other. Evaluate at least three virtual and physical security measures
that can be implemented by EMC to uphold the integrity of organization’s
IT policy.

2.3.1 Network Monitoring System.

Network browsing can be a systematic attempt by the PC network to find slow or failed
network mechanisms, such as full or stopped / frozen servers, failed routers, and failed
devices. Network frustration or similar downtime is a subset. If this happens, the network
viewing system alerts the network administrator. Network viewing the network management
subsection is a subsection. Network observance is mostly applied through package
applications and tools. Network observance services area unit loosely want to find whether or
not a given internet server is operative and connected properly to networks worldwide.
several servers that create this job offer an additional complete visual image of each the web
and networks.

Network monitoring system the main three benefits.


Protecting your network against attackers :- Network watching system is in a position to spot
distrustful traffic, there by authorizing homeowners to act quick. A network watching service

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 27
is in a position to supply a broad summary of associate SMB’s entire IT infrastructure, so
nothing is exploited. Today, exploits area unit additional refined and advanced, and area unit
able to target a system in a very diversity of the way. watching antivirus and firewall
solutions singly firewalls solutions singly could leave security gaps

Keeping Informed without inhouse staff :- A network observation service can send warnings
and data to SMB owner as problems arise. Otherwise, SMB might have to either effort to
observation their network security themselves or rent a full-time IT employee- that may well
be terribly expensive. information breaches are additional harmful and dearer the longer they
are going while not being noticed .

Optimizing and monitoring the network :- Many small business homeowners expect the unit
to rise. This growth cannot be achieved if the components of their IT infrastructure area unit
are overloaded or slowed down. Network viewing services can set up the infrastructure of a
minimal business, showing the development space of the associated SMB owner and any
issues that currently need to be addressed. (indesignsecrets).

Benefits of using different network monitoring tools.


Nagios XI
Nagios XI is a aimed at a wide range of users including freelancers, small and medium
businesses and major enterprises. Easy to set up and take some time to adjust to user needs at
first. Keep an eye on the network, the infrastructure, and the database.

PRTG Monitor.
Monitoring and alerting uptimes and downtimes or slow servers. system health monitoring of
various hardware devices network device monitoring and bandwidth accounting. application
monitoring virtual servers service level agreement (SLA) monitoring. System usage
monitoring ( CPU load, free memory, or free disk space). Email server monitoring and
reviewing various backup solutions.
DataDog.
Designed specifically for hybrid cloud setups. Extensibility is possible because to a large
number of APIs (Application Programming Interfaces) with extensive documentation.
Monitor the network's, apps', tools', and services' performance. Agents are available for a

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 28
variety of platforms, including Windows, Mac OS, a variety of Linux distributions, Docker,
Chef, Puppet, and others.

Activity 03

3.1 Discuss suitable risk assessment integrated enterprise risk


management procedures for EMC Cyber solutions and the impact an IT
security audit will have on safeguarding organization and its clients.
Furthermore, your discussion should include how IT security can be
aligned with an organizational IT policy and how misalignment of such
a policy can impact on organization’s security.

(This can include one or more of the following: network change management, audit control,
business continuance/disaster recovery plans, potential loss of data/business, intellectual
property, Data Protection Act; Computer Misuse Act; ISO 31000 standards.)

3.1 Risk Assessment Procedures.


3.1.1 A Risk.

Risk is a dark environment will face in the future. Information technology happens during a
relatively short period of time . These risks can occur as a result of grouping. There will be
many risks to the organization due to the mistakes of the staff of the organization. Therefore,
the owner as an associate owner of the organization should assess the risk.

Risk Assessment.
A risks area unit common factor to numerous massive organization communities,
corporations ETC. So, risk assessment suggests that the term wont to the general method for
establish and analysis the hazards and risk that planning to occur to the corporate or

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 29
organization, Analysis and measure the chance related to that hazard. So, by establish and
analysis the chance got to see the suitable or management the chance once the hazards can't
be eliminated. will establish sure varieties of risks through trying work place by establish the
items, situation, method etc. which will Couse hurt to the individuals. once establish the
chance to avoid this risk from the organization once this determination is mad, a next decide
what measures ought to be there or within the organization to effectively eliminate or
management the hurt happening to the organization.

3.1.2 Data protection process that applicable to an organization.

Risk is a common factor for large organizational communities, with companies using ETC.
Therefore, Risk Assessment is information security that is extremely useful for a corporation
to attempt as a result of any organization or large company that has a useful knowledge of the
data leaked. Their competitors can get the bank rap they want for the organization or
corporation. These include a number of utility complete information that companies are said
to have.
Ex:- Number of costumers they have.
Information about the assets.
The type of the customers they have.
Banking information.
There are many ways to protect the required knowledge in the form of information leakage
from a business or organization that is at high risk from the organization.

Ex:- Fixing Employee monitoring system.


Fixing new update CCTV cameras.
Fixing sensor security systems.

Employee monitoring.
This is additionally a technique of knowledge protection as a result of a number of the
employees or staff could do Froud activities to the corporate thus as associate owner got
aware of that thus oft watching the employees the employees the staff or workers is a vital
task to try and do. However, there are limits to watch the staff. as a result of their privacy
things that worker additionally protective thus watching of the staff is permissible wherever

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 30
the watching of the employees builds a transparent speech act relating to the sort of the scope
of the watching during which it.

Fixing of CCTV cameras.


As associate owner in huge organization Fixing of CCTV cameras is knowledgeable call that
taking by him a result of use of CCTV cameras should suits state criminal’s eave dropping
standing that need posting signs wherever video observation is happening and another helpful
that we have a tendency to get from the CCTV cameras area unit once some stealers or
robbers attacked to the organization, will are able to monitor it from the cameras and that can
take necessary selections.

Fixing sensor security systems.


Protect the perimeter with fences, buried cables and microwave sensors. Smart solutions for
physical perimeter security in data centers. Leading technology. Integration without
interruption. Custom system design. Ease of deployment and it from the sensors and that can
take necessary selections. (techtarget).

Table 5 - Risk assessment purpose.

Risk assessment purpose.


Purpose: Identifying the risks faced by the EMC Cyber and its clients.
Organization: EMC CYBER company.
Risk About Risk Current Risk Steps for Responsible person
type solution level increase person Date.
security
Operatio The possible Maintain Low Develop a Managemen 2023/4/
nal Risk losses because good solid plan. t 2
of uncertain records.
circumstances. Keep low
Includes dept
reputational, accounts.
legal and Casualty
regulatory. purchase

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 31
insurance.

Infrastru Potential Create Mediu Make a Managemen 2023/4/


cture structural and awareness m proper plan. t, Network 3
Risk basic structural training for Administrat
failures. businesses. or
Create a
system for
managing
human
resources.
Strategy The EMC could Review the Mediu Obtain an Managemen 2023/4/
Risk be exposed to current m insurance. t 4
the risk of internal
failure of EMC control
business system.
decision. Review
Always
practice
security
Natural An unexpected Keep High Network Keep all 2023/4/
Risk event that backups Administrato necessary 7
happens beyond and store r, Database databases
control. data in off- administrator separately
side
location
Data Data loss is a EMC Low Network Keeps 2023/4/
Loss fault condition Cyber administrator backup 5
that can be keeps daily.
damaged by backups
failure or failing and encrypt
to store, sensitive
transmit, or data

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 32
process the data.

Data Good Centralized Mediu Network Precise 2023/4/


Quality information manageme m administrator collection of 6
reduces the risk nt and data , Database data needs.
and makes modeling Administrato
decision making of data r, Quality
more confident. assets that assures
are
frequently
examined
and audited

3.1 .3 (I.O.T.) Internet of things.

The Internet of Things (IoT) refers to a system of reticulated, internet-connected objects that
are ready to collect and transfer information over a wireless network while not human
intervention. A thing in the web of things will be an individual with a heart monitor implant,
a farm animal with a biochip electrical device, an automobile that has built-in sensors to alert
the motive force when tire pressure is low or any other natural or man-made object which
will be assigned an online Protocol (IP) address and is ready to transfer information over a
network. more and more, organizations in a variety of industries are mistreatment IoT to
work a lot of expeditiously, higher perceive clients to deliver enhanced customer service,
improve decision-making and increase the worth of the business. an IoT scheme consists of
web-enabled good devices that use embedded systems, like processors, sensors and
communication hardware, to collect, send and act on information they acquire from their
environments. IoT devices share the sensing element information they collect by connecting
to an IoT entree or different edge device wherever information is either sent to the cloud to be
analyzed or analyzed domestically. Sometimes, these devices communicate with other related
devices and act on the data they get from one another. The devices do most of the work while
not human intervention, though folks will move with the devices -- for example, to line them
up, provide them directions or access the information. 5G Network Direct Connect (IoT), for

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 33
example, Mobile Internet Dialog. If EMC (IoT) wants 5G internet, then direct access is
essential.

3.2 Explain the mandatory data protection laws and procedures which will
be applied to data storage solutions provided by EMC Cyber. You
should also summarize ISO 31000 risk management methodology.

3.2 Summarization of ISO 31000 risk management law.


3.2.1 The Law.

For everything there should be lows and rules that must always fallow. If not that EMC
company can’t do it for unendingly. First, company to check what's the meaning of law. Low
means that an explicit kind of order that's implemented by the pinnacle of the organization to
minimize the mistakes, frauds, federations among the employees who are operating in the
organization Implementing lows may be a is a task that's done by the CEO of the company as
a result of he ought to knowledge to implement the appropriate laws for the employees. once
the low gets high some worker won't work properly or once there are square measure less
laws conjointly the employee won't properly. Forget the work done by the employees the
chief executive officer should assume from his perspective, the corporate’s perspective and
employee’s perspective then will continue organization or the company peacefully with none
mistakes, frauds and foveations. Every chief executive officer is trying to find scale back the
risks that returning towards his organization for that ought to implement lows and rules
unendingly however there are square measure tips once implementing lows for the risks, that
tips once square measure in ISO 31000 – 2018 / ISO 17799: 2005.

3.2.2 Summarization of ISO 31000: 2018 / ISO 17799: 2005 related to EMC
company.

The ISO 31000: 2018 / ISO 17799: 2005 this is often consisting of risk management tips,
providing principles and frame works to manage risks in EMC company. once the CEO of the
EMC company is following those ISO 31000: 2018 / ISO 17799: 2005 low it simple to

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 34
handle the EMC company. as a result of all the rules and frameworks area unit in it. Any
business-like little scale and largescale business or corporations will use this ISO 31000:
2018 / ISO 17799: 2005 low. By exploitation this ISO 31000: 2018 low it will facilitate the
EMC company to increase the possible hood of achieving objectives. and can simply identify
the strength and weakness of the EMC company. these items are concerned to the vision and
mission of the EMC company. However, ISO 31000: 2018 act can’t be used for certification
functions. however, it provides steering for internal and external audit programs by maintain
or following this ISO 31000: 2018 / ISO 17799: 2005 low the owner of the EMC company
will compare the risks, Threats that comes towards the EMC company.

In different words, the chief operating officer of the EMC company will compare the threats
that he long-faced within the past with the new threats that comes towards. And different
profit the owner of the EMC company has was it will compare their risk management
practices with associate degree internationally recognized Benchmark providing sound
principals for effective management and company governance. Another profit it's was the
Owner of the EMC company will establish the risks before it established to the corporate.
From these advantages EMC company will move forward with none threats and risks. And
owner of the EMC company will take choices before there's risks attack or threat attack.

3.2.3 ISO 31000: 2018 Risk Management.

If the EMC company is affected with the risks the EMC company will have consequences in
terms of economic performance and skilled name still because the setting safely and social
out comes. If the threats or risks get settled to the economic performance of the EMC
company it an enormous loss for the corporate as a result of customers can reject the
corporate and also the banks UN agency giving loans to the corporate might rejected and also
the finally the workers UN agency area unit rely from the EMC company get affected. when
the economic performances it gets affected to the skilled name. If the EMC company is
dealing or doing group action with the foreign countries the skilled name is very necessary. If
it gets broken thanks to the threats or risks attacks those countries conjointly beginning to
reject the corporate. thanks to these reasons managing risks effectively helps the EMC
company to perform well in AN setting packed with uncertainty.

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 35
3.2.4 Audit.

In each immense scale company, there's Audit firm to look at this scenario of the corporate. If
the workers did any frauds, felonious business they get caught during this scenario. that's the
advantage of associate audit firm. If there no any department known as audit firm the
corporate should get bank rapt as a result of nobody is there to seek out the frauds and
different wrong things that's happening within the company. In some corporations there are
unit security audits, which means this audit is there to visualize weather security system is
functioning in correct manner. If there's no audit system to look at the protection system the
protection system additionally may get corrupted by the higher than things and points, will
tell that there's a large impact to the organization security from the IT security audits.

3.2.5 IT security Audit.

An IT security Audit involves associate degree IT specialist examining a corporation existing


IT infrastructure to spot the strength of its current arrangements and any potential
vulnerabilities. IT security is incredibly necessary to the EMC company as a result of by
handling or maintain IT security audits it ensures the cyber defenses area unit up to now as
they'll be effectively sleuthing or giving response to any reasonably threats possess by the
hackers and different criminals United Nations agency manipulate IT systems for his or her
own ends. once the EMC company is addressing external countries cyber defenses area unit
vital, if it fails, terribly dangerous hackers attacked to the servers and take all the necessary
info however if the cyber defenses area unit up to now there's no risk.

3.2.6 IT security Audit does for the company.

The IT services connected with the IT security audit the organization will have a lot of
formidable IT system in situ. There square measure several departments within the company
once the IT security audit connect with every department the perform of the IT security audit
could vary from management to resource designing as a sequence network. For an
organization knowledge is that the one in all the key assets that needs high security
management. If the info gets discharged or hacked by the competitors or different firm it's a
main reason to the corporate get bank rapt or the corporate get a nasty name, as a result of

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 36
these reasons we've to guard our knowledge. IT security auditors verify the kind of
knowledge we've. however it flows in and out of organization and World Health
Organization has access to the data.

3.2.7 IT security Audits can identify the Vulnerable points and problem
areas in the company.

The special feature of IT security audits system has, it will determine the vulnerable points
and drawback areas simply. The IT system could be a large one with many elements together
with hardware, software, knowledge and procedures however the IT security system will
determine the vulnerable areas simply. From the IT security system, are able to} check
weather our hardware or software package tools are designed properly and dealing properly.
And security audits square measure retracing the safety incidents or the harmful state of
affairs that company round-faced within the past from the previous which may have exposed
our security weak points. the opposite main factor that's done by the audit was the main focus
on the finishing up tests in terms of network weaknesses, software package, access
management and security applications.

3.2.8 IT security aligned with organization policy.

Security functions aligned with the company’s goals and documented in company policies
and procedures. company policies and procedures don't seem to be simply paperwork—they
are the idea of a powerful security arrange. Once the corporate policies and procedures are
advanced or updated with the corporate staffs facilitate, organization’s security basis are
going to be a lot of current, sound and in compliance.

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 37
Activity 04

4.1 Design an organizational security policy for EMC Cyber to minimize


exploitations and misuses while evaluating the suitability of the tools
used in an organizational policy.

4.1.1 suitability of the tools used in the polices.

Organizational style is measured in policy works as a forceful policy tool to place policy to
action. However, earlier analysis has not examined the project organization as a definite
variety of structure style and, hence, has not given a lot of care to such organizations as a
planned alternative once selecting policy tools. the aim of the article is to look at the project
as a policy tool however do such impermanent organizations operate as a selected variety of
organization once public policy is applied? The article relies on a framework of policy
operation and is incontestable with 2 welfare reforms within the Swedish public sector, that
were ready and applied as project organizations. The case studies and also the examination
show that it's important that a project organization fits into the governance structure once
used as a policy tool. If not, the project can stay summarized and cannot have sufficient
influence on the permanent structure. The thought of encapsulation indicates a desire to
defend the project from a possible hostile atmosphere. The implication of this can be that
structure style as a policy tool could be a matter that rates a lot of attention within the planned
discussion on implementing public policies and on the quality of mistreatment bound policy
tools.

4..1.2 DRP

A disaster recovery set up (DRP) may be a documented, structured methodology with


commands for replying to accidental incidents. This gradual set up consists of the defenses to
reduce the results of a disaster that the organization will still operate or quickly restart
mission-critical functions. Classically, disaster recovery coming up with includes an analysis
of business processes and continuity wants. Before creating a close set up, a company usually
performs a business influence examination and risk analysis, and it establishes the recovery
time objective and recovery purpose objective. In different words, disaster recovery set up

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 38
mean Disaster recovery coming up with is simply a part of business steadiness coming up
with and applied to aspects of a company that trust on an IT infrastructure to perform. The
overall plan is to develop an idea which will permit the IT department to recover enough
information and system practicality to permit a business or organization to control.

Table 6 - Security Policy.

Policy. Purpose of Policy. Element of policy.


Network Policy. Network policies are a set of  The network can only be
constraints and parameters accessed by authorized
that apply to a network who users.
is allowed to join to the
network is defined by  For any reason, the user
network policies. must not reveal their
password with anyone.

 All modifications must be


recorded.

 Operating systems and


application software must
be kept in good working
order.

 The user refuses to


authorize the installation
of network components.
Wireless The policy's goal is to  Unauthorized device
Access Policy. provide access is not permitted.
wireless Internet connection  Set up the logging
to passwords.
just customers and  Use a MAC address that
salespeople may be traced and

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 39
on the first floor. registered.
 All access must be
granted via a secure
access point.
Mobile security Policy. To secure data in transit and A strong password must be
corporate data on mobile set on all devices.
devices On the EMC Cyber, All stolen or lost devices
protect critical data from must be reported to the user.
threats and unwanted access. Security patches must be
installed on the user's
computer.
For their devices, users must
use the most recent operating
systems.
On their devices, users must
not install cracked software.
Software To safeguard sensitive data  Software should only be
Security Policy. on  installed and uninstalled
the EMC Cyber from attacks by the
and hackers.  IT department.
 EMC installs Windows
 operating systems using
WDS
 (Windows Deployment
 Server).
 For their devices, EMC
 employed proprietary
software.
Backup and recovery policy. A backup retention policy  Encrypted backup files
not only satisfies explorer should be saved.
user expectations, but it also  Backup files should be
gives a more thorough kept in several locations,

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 40
understanding of data as well as in a secure
reconstruction and backup location.
methods.  Set the failover clustering
method for each backup
system.
 Create a backup schedule
for each process.

Table 7 - Discuss the roles of stakeholders plan.

Component Purpose. Procedure. Justification. Priority


.. Level..
Clustering..  Availability of  Set up a  Improved Medium
resources has distributed Performance: More
increased. file system processing power is
to allow provided by
 Obtain failover multiple multiple machines.
servers to
 Support. access data.  Retailing the load.
If a node fails, the
 Load balancing is  Load task it performs is
a term that refers balancing directed at an
to the process of should be additional node or
balancing the set up. node set.

 Project  Application for


distribution and Recovery. If a node
failover are two fails, the system
important aspects tries to reconnect

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 41
of project users to another
management. node with queued or
processed queries.
To be authenticated
on a new node,
users must login
again.

 Enhancing the
availability of
resources: If an
 Intelligence server
in a cluster is not
available, it can be
recovered by the
other intelligence
servers in the
cluster. This
prevents time and
information from
losing valuable time
if a server fails.
Backup.  Fast file access.  Installation  to accelerate the High
Natural catastrophe of a backup process of
protection. solution catastrophe
 Failed hard drive based on recovery and
security. cloud. preserve your data.
 Recovery if OS
fails  If backup sites are
implemented a few
miles away from
the main operation

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 42
hub. Both locations
would disintegrate
under the same
threat when a
natural calamity
happens. As a
security expert, the
writer advocates
setting up backup
sites and redundant
servers that are
placed within
miles, but can
readily reach via
other paths at the
same time.
Cloud  Natural catastrophes  Process data  To ensure data Medium.
computing. Failure to for disasters in access even in the
communicate. the event of the
Terrorism. management destruction of
hierarchy. infrastructure
Issuing an resources, because
alert message data is backed up
on the cloud
servers.

 Improving
emergency
management by
delivering
real time
information

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 43
Disaster  Breakdown of  Establish and  Recover and Low
recovery communication. maintain an re establish the
site. internal infrastructures and
 Malwares recovery services of the EMC
facility for Primary Data
disasters Centre.

 As the security
expert, the author
suggests setting up
disaster recovery
sites and redundant
servers that are
situated a distance,
but can be accessed
easily via different
methods.

4.2 Develop and present a disaster recovery plan for EMC Cyber according
to the ISO/IEC 17799:2005 or similar standard which should include
the main components of an organizational disaster recovery plan with
justifications. Discuss how critical the roles of the stakeholders in the
organization to successfully implement the security policy and the
disaster recovery plan you recommended as a part of the security audit

4.2.1 Disaster recovery plan.

An organization will begin its DRP arrangement with a list of immediate important action
steps and important contacts, so that the most important information comes out quickly and
simply. This provision should describe the roles and functions of the members of the disaster
relief team and describe the factors that make the provision work. This provision specifies
event response and recovery activity in detail.

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 44
4.2.2 Role of the stake holders related to the security of the EMC company.

Stake holder.

Definition of the term "partner": "An individual, group, or organization that has a focus or
concern on an organization. The activities (objectives, and policies' of the organization may
influence or influence the parties, the government (and its agencies), the owners
(shareholders), The community in which suppliers, unions and the company attract its
resources. Should be treated equally as employees of the company. Stakeholders in a
corporation

Types of shareholders.

are individuals and constituencies who voluntarily or unwillingly contribute to the volume
and activities that create wealth and are therefore the event response and recovery activists.
St Primary Stakeholders - Usually stakeholders are those who deal with the business
financially. For example, shareholders, customers, suppliers, creditors and employees).St
excluded stakeholders - people like children or the impartial public, because initially they do
not have a financial impact on the corporation. Nowadays the concept is taken from a related
partisan point of view and some groups, like the general public, are documented as
stakeholders while others stand apart. From such a point of view, plants, animals, or perhaps
geology do not present as stakeholders and voices, however full of life to refer to human
groups or individuals alone. Secondary stakeholders - usually external stakeholders, even if
they do so without direct financial involvement with the business - are individuals who
influence its activities. For example, the final public, communities, action groups, business
support groups and the media.

4.2.3 Role of a security stake holder related to the company.

Can read Security’s customers from 2 viewpoints: the roles and tasks that they need, and also
the security assistances they acquire. The roles and tasks side area unit very important as a
result of it controls however ought to interconnect to varied security customers, supported
permitting and swaying them to perform their roles in security, though that role could be a
humble one, like victimization Associate in Nursing access card to realize admission to the

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 45
power. it's additionally very important as a result of fulfilling their roles and tasks as workers,
managers, contractors or partners is that the method that security’s customers “pay for” the
protection that they acquire. If they are doing not see or perceive the worth of security or
don't seem to be joyful regarding what proportion they need to acquire it (i.e. what proportion
bother they need to travel through for security), they'll choose to bypass security, like by
following to enter the flexibility.
While some people in EMC company or organization acquire security by assignment or
approving security project funding, the favored of people acquire security by fulfilling their
roles and tasks, which is dangerous to establishing sound security throughout the organization
or company. thanks to the importance of the roles that EMC employees play in security
moreover because the assistances security provides to them, we tend to talk to the security’s
customers as stakeholders.

Security Stakeholders Exercise.


In last month’s column to started with creating of a private Lean , and a primary exercise of
distinctive the protection stakeholders. There are several assistances for staff and majors
similarly as for security managers and administrators WHO perform it. It helps to begin with
a little cluster 1st and so enlarge out exploitation the results of the primary exertion to refine
your efforts. Begin at the top level of security and work down, like the headquarters or native
level for big organizations, and security manager, staff, managers and officers at the
positioning level. Here are a number of the advantages of this exercise:-

 Provides a check on the effectiveness and scope of security personnel training.


 Expands security personnel awareness of the value of their jobs.
 Increases sensitivity of security personnel to security stakeholders’ concerns.
 Transfers knowledge and insights from more experienced personnel.
 Shares knowledge between shifts and functions.
 Helps to reinforce the common purpose and build camaraderie.

4.2.4 Categorized two types of stakeholders .

 Internal stakeholder.

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 46
 External stakeholder.

4.2.4.1 Internal stakeholder.

According to Nilson (2006: p170), internal stakeholders are those within the management,
selling consultants, designers, purchasing, producing, assembly and sales, whereas external
stakeholders are the users/customers, distributors, governments, suppliers, communities, laws
and laws. (Karim, et al., 2007, pp.8).

1) Project manager.
The project manager is answerable of guaranteeing that the project team finishes the project.
The project manager creates the project arrange and oversees the team's execution of project
operations.
2) Investors.
Investors raise or decrease their holdings in a firm based on its financial performance.

3) Directors.
Directors participate within the business's decision-making method. once it involves EMC,
principally administrators area unit concerned in adopting EMC security policies. The author
outlines the duties that EMC administrators should fulfil.

 The company's stock is control by the company's shareowner. Highlight the roles of
the shareholders within the EMC as follows.
 Provide a supply of funding for the EMC.
 Using their option privileges, they'll inquire into and approve the EMC's security
policy.
 Assistance with the EMC's decision-making method.

Employees.
An worker may be an employee or a manager for an organization. The EMC worker plays the
important role in implementing EMC security policies and procedures to secure the data
security of the EMC cloud.

External Stakeholders.

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 47
External stakeholders square measure those that don't have any direct relationship with the
corporate. they're not employees members and don't have any direct monetary interest within
the company's profit or loss. they're interested instead in however the business affects the
community or a section of the community. External stakeholders embody governmental
entities within the space during which the corporate operates, as well as municipal councils,
native faculties, different corporations and native inhabitants.

Government organizations.
Governmental agencies for various areas of administration are established by the government.
Refer to the duties of government agencies as follows.

 The government's responsibility.


 Provide rules and rules for corporations.
 Contributes to understanding fashionable government economic trends.

Team roles of the stakeholders in EMC during a disaster.


The author made a list of roles for the EMC Cyber during a disaster.

Table 8 - EMC Cyber during a disaster.

Role Title
Responsible for data backup system Backup Admin
Coordinator of the recovery team Network specialist
Responsible for server system System engineer
Team lead Head of IT
Responsible for security system Security admin
Responsible for data storage system Storage Admin
Team lead Head of IT

The suitability tools used in an organizational policy.

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 48
Table 9 - EMC organizational policy.

Fingerprint. Biometric security.


Fingerprint used for identification of the Biometric measurements or physical
individual owing to the distinctive characteristics square measure used for the
fingerprints. Fingerprint scanners live the identification of people, for the definition of
finger's loop, whorl and arc patterns. the a fast biometric. Fingerprint mapping, face-
simple implementation and cost-effectiveness to face recognition, and retinal scans, as an
of fingerprint scanners. In terms of access example, square measure all kinds of
management, fingerprint recognition is biometric technology. Researchers have
employed within the business. declared to be associate ear, to be ready to sit
and walk, to be distinctive in bodily
excretions, in one's hand veins and even face
contortions square measure different
distinctive indicators. This defines statistics
any.
Facial recognition. Theft prevention keep track of important
data.
Facial recognition is a technology way to Monitoring is the cornerstones of success.
acknowledge a person's face. A face The EMC company owner simply can't know
recognition system uses biometrics to map what works and does not work without
photographic or video facial features. It tracking. The inefficiencies are also hard to
compares the information with a database of they can be enhanced.
familiar faces to find matches. Facial
reconnaissance will facilitate to check the
identity of an individual
Use physical lock
The EMC company requirements, the
company should use a physical lock if it is
using a laptop and mobile devices. Today,
Kensington supports locks which can prevent
user steps from beginning.

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 49
Table 10 - EMC organizational policy

Justification Cost. Expected Technique. Recommended


Installing Maintenance. level. or not
recommended.
Physical security
Signature Data such as the Medium. Recognize a Low.
dynamics. direction, pressure, person's
stroke and form of behavioural
individual signature that features when
were dynamically signing the
recorded. name.
Permeant Security guards will High.  Assistance in Low.
security staff. respond immediately deterring
with EMC's corporate crimes at the
approval to any premises of
situation. However, the the EMC.
costs are more than other
approaches of physical  Enhance the
safety. The author perception of
advises the following security.
areas as a Security Enhance
Expert to provide this client
service. Customer service.
consent and sales.
 Efficient
handling of.
Key card When the door control Low.  Reduce Medium.
entry system. system in the EMC is unauthorize
implemented, the rules d access.
for access for employees  Reduce the
to certain areas are risk of

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 50
precisely defined. hardware.
Avoid When double-glazed or Medium  Reduce Medium.
windows. crash resistant windows unauthorize
are used, the risk of d access.
unwanted access to
valuable information is  Increase
reduced and the security security.
of office areas increases.
Biometric security.
Fingerprint Low.  To compute Medium. The greatest
recognition. staff hours approach to
automaticall authenticate
y. one's
identification is
 Secure area the fingerprint
and systems recognition
access method.
control.
Facial High To employ Medium. Using this
recognition. real time procedure, an
identification individual's
or verification identity with
of his face is
individuals, identified or
photographs verified. Also
and videos. used to identify
persons at
scenes of
crime.
Signature Medium. Recognize a High Data such as
dynamics. person's the direction,
behavioral pressure, stroke

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 51
features when and form of
signing the individual
name. signature that
were
dynamically
recorded.

Figure 7 - Disaster recovery plan for EMC Cyber

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 52
Figure 8 - Disaster recovery plan for EMC Cyber

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 53
Figure 9 - Disaster recovery plan for EMC Cyber .

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 54
Figure 10 - Disaster recovery plan for EMC Cyber

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 55
Figure 11 - Disaster recovery plan for EMC Cyber .

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 56
Figure 12 - Disaster recovery plan for EMC Cyber

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 57
Figure 13 - Disaster recovery plan for EMC Cyber

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 58
Figure 14 - Disaster recovery plan for EMC Cyber

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 59
Figure 15 - Disaster recovery plan for EMC Cyber .

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 60
Figure 16 - Disaster recovery plan for EMC Cyber

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 61
Figure 17 - Disaster recovery plan for EMC Cyber .

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 62
Figure 18 - Disaster recovery plan for EMC Cyber .

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 63
Figure 19 - Disaster recovery plan for EMC Cyber

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 64
References

Cheeky Munkey. Available at: https://cheekymunkey.co.uk/what-is-an-it-security-audit/


[Accessed 15 Feb. 2023].

Fieldengineer.com. Available at: https://www.fieldengineer.com/blogs/what-is-firewall-


important-network security [Accessed 15 Feb. 2023]

Nokitel.im. Available at: http://nokitel.im/index.php/interview-questions/ [Accessed 15 Feb.


2023].

BusinessDictionary.com. Available at:


http://www.businessdictionary.com/definition/stakeholder.html [Accessed 15 Feb. 2023].

Hq.nasa.gov. Available at: https://www.hq.nasa.gov [Accessed 13 Feb. 2023].

Docs.microsoft.com Available at: https://docs.microsoft.com/en-


us/powershell/module/netsecurity/set-netfirewallrule [Accessed 15 Feb. 2023].

BusinessDictionary.com. Available at: http://www.businessdictionary.com/article/601/the-


role-of-stakeholders-in-your-business/ [Accessed 15 Feb. 2023]

https://www.researchgate.net/publication/266686928_Classification_of_Security_Threats_in
_Inf ormation_Systems [Accessed 13 Feb. 2023].

Fixcleanerpc2019.com. Available at: http://fixcleanerpc2017.com /Fixcleaner


Softpedia=p9619/ [Accessed 13 Feb. 2023]

InDesign Secrets Available at: https://indesignsecrets.com/topic/network-monitoring


[Accessed 15 Feb. 2023].
InfoSec Resources. Available at: https://resources.infosecinstitute.com/improving-Scada-
system-security/ [Accessed 15 Feb. 2023].

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 65
Infosectoday.com. Available at:
http://infosectoday.com/Articles/Security_Awareness_Training.htm [Accessed 15 Feb. 2023].

Docs.oracle.com. Available at: https://docs.oracle.com/cd/


B19306_01/appdev.102/b14258/d_monitor.htm [Accessed 15 Feb. 2023]

Cascade Strategy. Available at: https://www.executestrategy.net/blog/stakeholder-theory/


[Accessed 15 Feb. 2023].

Osha.gov Available at: https://www.osha.gov/Firm_osha_data/100006.html [Accessed 15


Feb. 2023].

Paperdue.com. Available at: https://www.paperdue.com /topic/business-risk-essays/11


[Accessed 13 Feb. 2023].

Blog.ssa.gov. Available at: https://blog.ssa.gov/social-security-takes-fraud-seriously/


[Accessed 13 Feb. 2023].

Pmi.org. Available at: https://www.pmi.org/ earning/library/risk-analysis-project-


management-7070 [Accessed 15 Feb. 2023]

Search Security. Available at: https://searchsecurity.techtarget.com/definition/DMZ


[Accessed 15 Feb. 2023].

SearchDataBackup. Available at: https://searchdatabackup.techtarget.com/definition/data-


protection [Accessed 15 Feb. 2023]
www.thesaurus.com. Available at: https://www.thesaurus.com/browse/risk [Accessed 15 Feb.
2023].

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 66
Security Intelligence. Available at: https://securityintelligence.com/10-takeaways-from-the-
iso 310002019-risk-management-guidelines/ [Accessed 15 Feb. 2023].

Support.norton.com. Available at:


https://support.norton.com/sp/en/us/home/current/solutions/v9802264_ns_retail_en_us
[Accessed 15 Feb. 2023].

Techopedia.com. Available at: https://www.techopedia.com/definition/9544/static-internet-


protocol-ip-address static-ip-address [Accessed 15 Feb. 2023].

VPNSecure.me. Available at: https://www.vpnsecure.me/ how-vpn-works/ [Accessed 15 Feb.


2023].

Name : N.M Udesh Ishanka |Subject : Unit_05:SEC - Security |Assignment No : 01 | Student


ID :Kan-00142214| Page 67

You might also like