EMC Security Assignment
EMC Security Assignment
Assignment Number: 1
1. Data Breaches:
- Risk: Unauthorized access to sensitive data, including client information or business-
critical data.
- Impact: Breaches can lead to financial penalties, loss of customer trust, and legal
consequences due to non-compliance with data protection regulations.
2. Malware Attacks:
- Risk: Malware, such as ransomware, can encrypt files or disrupt operations.
- Impact: Downtime, data loss, and high costs for recovery or ransom payments.
3. Insider Threats:
- Risk: Employees or contractors might intentionally or unintentionally expose or damage
data.
- Impact: Loss of intellectual property, data leaks, or operational disruptions.
5. DDoS Attacks:
- Risk: Attackers flood the system with traffic, rendering services inaccessible.
- Impact: Service outages lead to loss of revenue and customer dissatisfaction.
6. Misconfigured Systems:
- Risk: Improper firewall rules or VPN setups expose the network to attackers.
- Impact: Unauthorized access to systems, making them vulnerable to exploitation.
Activity 2
1. Firewalls:
- Issue: Allowing open ports or unfiltered traffic exposes the network to external attacks.
- Impact: Unauthorized access, data breaches, or infiltration of malware.
2. VPNs:
- Issue: Poorly configured VPNs may use weak encryption protocols or expose IP
addresses.
- Impact: Eavesdropping on communications, unauthorized access, and compromised
client data.
2. Static IP Addresses:
- Description: A fixed IP address assigned to servers.
- Benefits:
- Simplifies firewall rule configuration and ensures consistent server identification.
- Enhances traceability in logging and auditing processes.
Activity 3
1. Risk Identification:
- Identify assets (e.g., servers, client data) and potential threats (e.g., cyberattacks, natural
disasters).
2. Risk Analysis:
- Evaluate risks based on their likelihood and impact (e.g., High, Medium, Low).
3. Risk Prioritization:
- Focus on high-priority risks, like data breaches, to allocate resources effectively.
4. Risk Mitigation:
- Implement safeguards (e.g., firewalls, encryption) to reduce vulnerabilities.
1. Mandatory Laws:
- GDPR: Requires secure handling of EU-based clients’ data.
- Sri Lankan Laws: Comply with the Computer Crimes Act and privacy regulations.
1. Framework: Adopt a standard like ISO/IEC 27005 for structured risk management.
2. Steps:
- Identify risks, analyze their impact, implement controls, and monitor continuously.
- Policy Review:
- Conduct regular audits and updates to align with evolving technologies and threats.