0% found this document useful (0 votes)
21 views

EMC Security Assignment

Uploaded by

sp21-bscs-008
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views

EMC Security Assignment

Uploaded by

sp21-bscs-008
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

Assignment 1

Subject Title: Information Security

Assignment Number: 1

Instructor Name: Muhammad Arslan Tariq

Submission Date: Before MID (Date will be Informed)


Activity 1

1.1 Types of Security Risks and Their Impacts

1. Data Breaches:
- Risk: Unauthorized access to sensitive data, including client information or business-
critical data.
- Impact: Breaches can lead to financial penalties, loss of customer trust, and legal
consequences due to non-compliance with data protection regulations.

2. Malware Attacks:
- Risk: Malware, such as ransomware, can encrypt files or disrupt operations.
- Impact: Downtime, data loss, and high costs for recovery or ransom payments.

3. Insider Threats:
- Risk: Employees or contractors might intentionally or unintentionally expose or damage
data.
- Impact: Loss of intellectual property, data leaks, or operational disruptions.

4. Physical Security Risks:


- Risk: Unrestricted access to the data center may result in hardware theft or sabotage.
- Impact: Damage to infrastructure, data loss, and extended downtime.

5. DDoS Attacks:
- Risk: Attackers flood the system with traffic, rendering services inaccessible.
- Impact: Service outages lead to loss of revenue and customer dissatisfaction.

6. Misconfigured Systems:
- Risk: Improper firewall rules or VPN setups expose the network to attackers.
- Impact: Unauthorized access to systems, making them vulnerable to exploitation.

1.2 Security Procedures

1. Access Control Policies:


- Implement Role-Based Access Control (RBAC): Restrict user access based on their roles.
- Use Multi-Factor Authentication (MFA): Add an extra layer of security for sensitive
systems.

2. Network Security Enhancements:


- Regularly update firewall configurations and review access logs.
- Deploy Intrusion Detection and Prevention Systems (IDS/IPS) to monitor and block
suspicious activities.

3. Data Protection Measures:


- Encrypt data both at rest (using AES-256) and in transit (using SSL/TLS protocols).
- Establish offsite backup routines to protect against data loss.

4. Physical Security Upgrades:


- Install surveillance cameras and biometric access systems for the data center.
- Use physical barriers, such as locked server rooms, for additional safety.

5. Employee Awareness and Training:


- Conduct regular training programs on phishing, social engineering, and security best
practices.
- Establish a security incident reporting procedure.

6. Incident Response Framework:


- Create and test a detailed incident response plan.
- Include steps for detection, containment, eradication, recovery, and post-incident
analysis.

Activity 2

2.1 Impact of Incorrect Configurations

1. Firewalls:
- Issue: Allowing open ports or unfiltered traffic exposes the network to external attacks.
- Impact: Unauthorized access, data breaches, or infiltration of malware.

2. VPNs:
- Issue: Poorly configured VPNs may use weak encryption protocols or expose IP
addresses.
- Impact: Eavesdropping on communications, unauthorized access, and compromised
client data.

2.2 Benefits of Technologies

1. DMZ (Demilitarized Zone):


- Description: A DMZ is a network segment that isolates public-facing services (e.g., web
and email servers) from the internal network.
- Benefits:
- Prevents attackers from directly accessing internal systems.
- Contains breaches within the DMZ, minimizing damage.
- Illustration:
[Internet] --> [Firewall] --> [DMZ with public servers] --> [Internal Network]

2. Static IP Addresses:
- Description: A fixed IP address assigned to servers.
- Benefits:
- Simplifies firewall rule configuration and ensures consistent server identification.
- Enhances traceability in logging and auditing processes.

3. NAT (Network Address Translation):


- Description: A process that translates private IP addresses to a public IP and vice versa.
- Benefits:
- Hides internal network details from external entities.
- Reduces the risk of direct attacks on internal systems.

2.3 Network Monitoring Systems

- Real-time alerts for suspicious activities or traffic anomalies.


- Ensures compliance with regulatory requirements through detailed logs.
- Facilitates proactive threat detection, enabling faster mitigation of potential breaches.
- Improves network performance by identifying bottlenecks and resource misuse.

Activity 3

3.1 Risk Assessment Procedure

1. Risk Identification:
- Identify assets (e.g., servers, client data) and potential threats (e.g., cyberattacks, natural
disasters).

2. Risk Analysis:
- Evaluate risks based on their likelihood and impact (e.g., High, Medium, Low).

3. Risk Prioritization:
- Focus on high-priority risks, like data breaches, to allocate resources effectively.

4. Risk Mitigation:
- Implement safeguards (e.g., firewalls, encryption) to reduce vulnerabilities.

5. Monitoring and Review:


- Continuously assess the effectiveness of implemented measures.
- Update risk assessments to account for emerging threats.

3.2 Data Protection Laws and Procedures

1. Mandatory Laws:
- GDPR: Requires secure handling of EU-based clients’ data.
- Sri Lankan Laws: Comply with the Computer Crimes Act and privacy regulations.

2. Data Protection Procedures:


- Perform regular data encryption.
- Ensure data retention policies align with legal requirements.
- Provide transparency to clients about how their data is stored and used.

3.3 Risk Management Methodology

1. Framework: Adopt a standard like ISO/IEC 27005 for structured risk management.
2. Steps:
- Identify risks, analyze their impact, implement controls, and monitor continuously.

3.4 IT Security and Organizational Policy

- Alignment with Business Goals:


- Ensure security policies do not hinder business processes but enhance reliability and
trust.

- Components of a Security Policy:


- Password management, acceptable use, incident response, and compliance requirements.

- Policy Review:
- Conduct regular audits and updates to align with evolving technologies and threats.

You might also like