Assignment 2
Assignment 2
Assignment-2
GUSTO University
Table of Contents
Introduction.......................................................................................................................................................
Task-1...............................................................................................................................
What is a Risk?.............................................................................................................
What is Risk Assessment?............................................................................................
Guideline of doing a risk assessment in organisation..................................................
Review of Risk Assessment Procedures.......................................................................
Task-2...............................................................................................................................
What is Data Protection?..............................................................................................
Data Protection Process and Regulation in an UAB bank (GDPR, DPA)........................
Why are data protection and security regulation important?......................................
Task 2.1 - (Summarising an appropriate risk management approach in
IT security)...................................................................................................................
A brief about risk management approach...............................................................
Summarization of ISO 31000: 2018 / ISO 17799: 2005 related to UAB
Bank........................................................................................................................
Task-2.2.......................................................................................................................
Definition of IT Security Audit......................................................................................
Possible Impacts to UAB Bank Security Resulting from an IT Security
Audit.............................................................................................................................
Task-2.2.1................................................................................................................
Definition of an Organisational Policy and Its Purposes...........................................
Impacts of a UAB Bank Policy on IT Security...........................................................
Impacts of Misalignment Between UAB Bank Policy and IT Security........................
Recommendations for Aligning IT Security with UAB Bank Policy............................
Task-3..............................................................................................................................
What is a security policy?.............................................................................................
Designing a Proper Security Policy...............................................................................
Main elements of Security Policy.................................................................................
Organisational Disaster Recovery Plan........................................................................
Task-4..............................................................................................................................
What is Stakeholder?...................................................................................................
What are their roles in an organisation?..................................................................
Security Audit...............................................................................................................
Task 4.1........................................................................................................................
Steps required in the disaster recovery process..........................................................
Evaluation of tools can be used in a UBA Bank’s policy to meet
business needs........................................................................................................
Conclusion........................................................................................................................................................
References.......................................................................................................................
1
HND-53 Aung Myat Min
2
HND-53 Aung Myat Min
Introduction
As a Junior Security Engineer at BIM Cybersecurity, Myanmar's
largest cybersecurity solutions provider, I am responsible for a critical
project for UAB Bank, one of the country's leading financial institutions.
Our company offers comprehensive services, including information
security consulting, assessment, monitoring, and enhancement of
application and network infrastructure protection. My current assignment
involves identifying and assessing IT security risks associated with UAB
Bank’s critical data and infrastructure. This requires using advanced
equipment, tools, and techniques to conduct thorough risk analysis and
security assessments. The goal is to create a detailed report
recommending robust technology solutions and management strategies
aligned with security policies and procedures. Additionally, I will evaluate
various tools and software to ensure effective IT security measures are in
place, managing risks related to access authorization, regulatory
compliance, and contingency planning. This project is crucial for
safeguarding the bank's operations and strengthening its cybersecurity
framework.
Task-1
What is a Risk?
Risk refers to the potential for loss, damage, harm, or negative
impacts on objectives. It can arise from various sources including
uncertainty in financial markets, threats from project failures, legal
liabilities, accidents, natural disasters, and deliberate attacks from
adversaries.
(Times, 2024)
3
HND-53 Aung Myat Min
4
HND-53 Aung Myat Min
5
HND-53 Aung Myat Min
(Content, 2024)
6
HND-53 Aung Myat Min
Task-2
What is Data Protection?
Data protection is the process of protecting sensitive information
from damage, loss, or corruption. As the amount of data being created
and stored has increased at an unprecedented rate, making data
protection increasingly important.
(imperva, 2024)
7
HND-53 Aung Myat Min
8
HND-53 Aung Myat Min
Data protection and security regulations are essential for UAB Bank
due to several reasons:
1. Legal Compliance: It is mandatory for UAB Bank to comply with
regulations such as GDPR and DPA. Failure to comply can result in
severe penalties, including hefty fines, legal action, and reputational
damage.
2. Customer Trust and Reputation: Implementing effective data
protection measures enhances customer trust and confidence in
UAB Bank's ability to safeguard their sensitive information. A
reputation for robust data protection practices can differentiate the
bank in a competitive market and attract and retain customers.
3. Risk Mitigation: Data breaches and security incidents can have
significant financial and reputational consequences for UAB Bank.
Compliance with data protection regulations helps mitigate the risk
of data breaches by establishing security protocols, implementing
safeguards, and conducting regular audits and assessments.
4. Global Business Operations: Compliance with regulations like
GDPR becomes imperative as UAB Bank expands its operations
globally or engages with international partners. Ensuring alignment
with global standards facilitates smooth business transactions and
partnerships while avoiding regulatory conflicts and legal
challenges.
9
HND-53 Aung Myat Min
10
HND-53 Aung Myat Min
ISO 17799:2005:
UAB Bank uses ISO 31000:2018 and ISO 17799:2005 to establish
best practices for information security management. These standards help
the bank maintain the confidentiality, integrity, and availability of its
information assets. By implementing ISO 17799:2005, UAB Bank develops
strong security management practices that protect sensitive data and
systems from unauthorised access, disclosure, alteration, or destruction.
Compliance with ISO 17799:2005 demonstrates UAB Bank's commitment
to upholding the highest standards of information security and meeting
regulatory requirements. This approach ensures that UAB Bank protects
the interests of its customers, stakeholders, and the integrity of its
operations in the ever-evolving landscape of cybersecurity threats.
Overall, by incorporating ISO 31000:2018 and ISO 17799:2005 into its risk
management and information security practices, UAB Bank demonstrates
its dedication to managing risks effectively and maintaining a secure
operational environment.
Task-2.2
11
HND-53 Aung Myat Min
12
HND-53 Aung Myat Min
13
HND-53 Aung Myat Min
Task-2.2.1
14
HND-53 Aung Myat Min
15
HND-53 Aung Myat Min
16
HND-53 Aung Myat Min
17
HND-53 Aung Myat Min
Task-3
What is a security policy?
A security policy is a document that states in writing how a
company plans to protect its physical and information technology (IT)
assets. Security policies are living documents that are continuously
updated and changing as technologies, vulnerabilities and security
requirements change.
18
HND-53 Aung Myat Min
19
HND-53 Aung Myat Min
20
HND-53 Aung Myat Min
21
HND-53 Aung Myat Min
22
HND-53 Aung Myat Min
Task-4
What is Stakeholder?
A stakeholder is a person, a group, or an organisation that has an
interest in a business, project, or organisation, and can be influenced by
or affect its activities and decision-making. Stakeholders can be members
of the organisation or have no official affiliation, and they can have a
direct or indirect impact on its activities.
(FERNANDO, 2024)
23
HND-53 Aung Myat Min
24
HND-53 Aung Myat Min
Security Audit
In a security audit, various stakeholders play crucial roles to ensure
a comprehensive and effective review. Top management sets the audit
objectives, reviews findings, and allocates necessary resources. The IT
department provides technical data and assists auditors in understanding
the system's intricacies. The HR department supplies records on
employee training and enforces security policies. Legal and compliance
teams ensure that the organisation adheres to regulatory standards, while
the finance department manages budgets and reviews financial aspects.
The operations team demonstrates daily security practices, and external
auditors or consultants offer independent evaluations. Employees
participate by engaging in surveys and providing feedback, offering
valuable insights into the security culture and practices within the
organisation. Each stakeholder's involvement is essential for identifying
25
HND-53 Aung Myat Min
26
HND-53 Aung Myat Min
Task 4.1
Creating plans to make sure that essential company activities continue
both during and after disruptions is known as business continuity
planning. This includes assessing risks, spotting potential threats like
pandemics, cyberattacks, and natural disasters, and putting procedures in
place to mitigate those risks. This entails describing the processes for data
backup and recovery, alternate work locations, and methods of
communication for UAB Bank. The effectiveness of the plan is ensured by
regular tests and updates. UAB Bank maintains regulatory compliance and
client trust by guaranteeing continuous service.
27
HND-53 Aung Myat Min
28
HND-53 Aung Myat Min
risks as soon as any hazards are detected. This could entail putting
in place protections against cyberattacks, creating emergency
response plans for natural catastrophes, or creating backup plans in
case of a pandemic. Through the use of mitigation techniques, UAB
Bank can lessen the probability and consequences of operational
disruptions.
on its critical data, so UAB Bank recognises the need to keep it safe
and accessible even in the case of an emergency. The bank has
protocols in place for promptly recovering its vital data in the case
of data loss or corruption, as well as for routinely backing up this
data. This guarantees that clients and bank employees may always
access critical financial information.
30
HND-53 Aung Myat Min
31
HND-53 Aung Myat Min
32
HND-53 Aung Myat Min
33
HND-53 Aung Myat Min
34
HND-53 Aung Myat Min
35
HND-53 Aung Myat Min
36
HND-53 Aung Myat Min
37
HND-53 Aung Myat Min
Conclusion
In conclusion, this report emphasises the vital importance of data
protection and security regulations for UAB Bank. It underscores the
necessity of adhering to ISO standards, especially ISO 31000 for risk
management. The report outlines UAB Bank's adoption of these standards
and IT security audits, showing their effectiveness in bolstering the bank's
security measures. Additionally, it evaluates the bank's data security
policy, its objectives, and its success, highlighting the need for alignment
with practical security practices. By including sample security policies, a
disaster recovery plan framework, and identifying key stakeholders, the
report provides UAB Bank with a comprehensive guide for improving its
data protection, security, and risk management strategies.
References
Content, L., 2024. A complete guide to the risk assessment process.
[Online]
Available at: https://www.lucidchart.com/blog/risk-assessment-process
[Accessed 10 May 2024].
FERNANDO, J., 2024. What Are Stakeholders: Definition, Types, and
Examples. [Online]
Available at:
https://www.investopedia.com/terms/s/stakeholder.asp#:~:text=A
%20stakeholder%20has%20a%20vested,%2C%20governments%2C%20or
%20trade%20associations.
[Accessed 14 May 2024].
Gillis, A. S., 2022. security audit. [Online]
Available at: https://www.techtarget.com/searchcio/definition/security-
audit
[Accessed 12 May 2024].
38
HND-53 Aung Myat Min
39