Establish and Install Security Measures
Establish and Install Security Measures
Risk assessment often produces an important side benefit in depth knowledge about
system and an organization as risk analyst tries to figure out how system and functions
are interrelated. Risk assessment, the process of analyzing and interpreting risk, is
comprised of three basic activities:
Risk mitigation involves the selection and implementation of security controls to reduce
risk to a level acceptable to management, within applicable constraints.
Assess
Risk
Risjk
Identify Management Control
Risk Risk
Process
Review
Controls
Source: www.123rf.com
Figure 62: Risk Management Process
Interdependencies: Risk management touches on every control it is, however, most closely
related to life cycle management and the security planning process. The requirement to
perform risk management is often discussed in organizational policy and is an issue for
organizational oversight.
Secure Sockets Layer (SSL) is a standard protocol used for the secure transmission of
documents over a network. Developed by Netscape, SSL technology creates a secure
link between a Web server and browser to ensure private and integral data transmission.
SSL uses Transport Control Protocol (TCP) for communication.
Cloud
IaaS
Cloud
VPN apps
MFA
Chared
On- resource
premises
s
Server
login BYOD
Malware detection focuses on detecting intrusions by monitoring the activity of systems and
classifying it as normal or anomalous.
• Strange emails
• Files wont open
Source: www.centrify.com
• Programs acting weird
• Pop-up
Source: thelatesttechnews.com
Figure 64: Malware infection symptoms
Watch: Prevention and detection of malware: https://youtu.be/Ces7UeMQ7ic
Site monitoring is the process of testing and verifying that end-users can interact with a
website or web application as expected. Website monitoring is often used by businesses
to ensure website uptime, performance, and functionality is as expected.
Some common backup frequencies you'll see offered include continuous, once per
minute, every x minutes (e.g. every 11 minutes), hourly, daily, weekly, monthly, and
manually. Continuous backup means that the software is constantly backing up data.
1.3.3.3 Self-Assessment
i. What is meant by risk assessment of an organization’s ICT department?
ii. What is SSL?
A. Source socket layer
B. Secure socket lay
C. Socket secure layer
D. Secure socket layer iii. What is Multi-factor authentication? iv.
What is site monitoring?
v. Evaluation of security control measures is done as per the ICT Security policy in
the lab
vi. Installation of Security control measures is done as per the ICT Security policy
in the lab.
vii. Case situation: How can you help an organization to set multi-factor
authentication when making any changes on their system administration settings?
viii. _____________ is an authentication method in which a computer user is granted
access only after successfully presenting two or more pieces of evidence to
support credibility.
A. Multi-factor authentication
B. Cost
C. Monitoring
1.3.3.1 References
• http://www.davidsalomon.name/CompSec/auxiliary/handbook.pdf
• https://www.keycdn.com/blog/website-monitoring-tools
• Cyber Security, authored by John G. Voeller published by Wiley 2014