ACS Assignment1
ACS Assignment1
CyberSecurity
University of Sunderland
Faculty of Computer Science
Submitted to:
Faculty of Computer Science
University of Sunderland
Submitted by:
Saroj Neupane
239756985
Table of Contents
Report on the Establishment of a Cyber Clinic at the University of Sunderland.......................3
Introduction............................................................................................................................. 3
Types of Activities and Services for Stakeholders.....................................................................3
Students:.............................................................................................................................. 3
Employees:........................................................................................................................... 3
Individuals:........................................................................................................................... 4
Organizations:.......................................................................................................................4
Benefits of Activities.................................................................................................................4
For Students:........................................................................................................................ 4
For Employees:.....................................................................................................................5
For Individuals:..................................................................................................................... 5
For Organizations:................................................................................................................ 5
Concerns.................................................................................................................................. 6
Liabilities and Legal Concerns...................................................................................................6
Conclusion................................................................................................................................ 6
Enhancing Cybersecurity Before and After a Cyber-Attack.......................................................7
Introduction............................................................................................................................. 7
Steps for Individuals................................................................................................................. 7
Before a Cyber-Attack...........................................................................................................7
After a Cyber-Attack............................................................................................................. 8
Steps for Organizations.............................................................................................................8
Before a Cyber-Attack...........................................................................................................8
After a Cyber-Attack............................................................................................................. 9
Benefits of Enhancing Cybersecurity........................................................................................9
Ethical and Professional Issues in Cybersecurity......................................................................9
Conclusion................................................................................................................................ 9
References.............................................................................................................................. 10
1
Advanced Cybersecurity
Introduction
In the rapidly evolving digital landscape, the establishment of a cyber clinic at the University
of Sunderland is a strategic initiative to bolster cybersecurity awareness and support. This
clinic aims to provide comprehensive services to students, staff, individuals, and external
organizations, focusing on education, incident response, and expert consultation.
Students:
Interactive Training Sessions: Interactive sessions will teach students practical skills to
protect personal and academic data from threats like malware and social engineering.
Employees:
Remote Work Security: Best practices for secure remote work, including VPN usage
and securing home networks. Ensures safe access to university systems from home.
2
Advanced Cybersecurity
Individuals:
Public Workshops: Local community sessions cover cybersecurity basics, fraud
prevention, and online safety to enhance public understanding of cyber threats.
Educational Resources: Access to guides, articles, and tools for enhancing personal
cybersecurity. Provides valuable information for safe online behavior.
Organizations:
Corporate Training: Tailored training programs on risk management, cybersecurity
policies, and best practices to enhance organizational security posture.
Benefits of Activities
For Students:
Educational Programs: Testing response plans ensures organizations handle cyber
incidents efficiently.
Practical Training: Hands-on training in safe browsing and phishing detection helps
students protect themselves and reduce cyber-attack risk. (Witsenboer & Sijtsma,
2022).
Targeted Programs: Tailored programs increase student awareness and proactive
behavior, reducing cyber-attacks. (Witsenboer & Sijtsma, 2022).
3
Advanced Cybersecurity
For Employees:
Comprehensive Training: Remote employees will receive training on secure
communication and remote access protocols, reducing security vulnerabilities by
preventing common mistakes. (Amankwa, 2021).
Remote Work Security: Training on securing remote work environments helps
prevent data breaches that can occur due to insecure home networks or improper
handling of sensitive information.
Policy Adherence: Training will ensure employees follow security policies and best
practices, reducing lapses and enhancing data protection. (Amankwa, 2021).
For Individuals:
Public Education: Public workshops and awareness campaigns will help individuals
recognize and avoid online threats, significantly reducing the risk of online fraud. (Li
& Liu, 2021).
Practical Advice: The clinic will provide actionable advice on securing personal
devices and managing digital privacy, helping individuals better protect their personal
and financial information.
1. Preventative Measures: By offering resources and guidance on best practices for
online security, individuals can implement preventative measures that decrease their
vulnerability to cyber-attacks (Li & Liu, 2021).
For Organizations:
2. Corporate Training: Organizations will receive tailored training on risk
management, secure data handling, and incident response to meet their specific
cybersecurity needs. (Aslan & Akin, 2023).
3. Consultation Services: Expert consultation will help organizations develop and
refine their cybersecurity policies, leading to fewer data breaches and a stronger
overall security posture.
Risk Mitigation: Comprehensive risk management, including employee training and
regular assessments, minimizes cyber threats and protects organizational information
by reducing data breaches. (Aslan & Akin, 2023).
4
Advanced Cybersecurity
Concerns
The cyber clinic must adhere to data protection laws, such as the GDPR, to avoid legal
repercussions, ensuring that all data handling practices meet regulatory standards. To protect
against potential claims related to the services or advice provided, the clinic should have
liability disclaimers and professional indemnity insurance in place. Additionally, maintaining
trust and credibility requires that all advice and support offered by the clinic are both ethical
and professional.
Conclusion
Establishing a cyber clinic at the University of Sunderland will significantly benefit students,
employees, individuals, and organizations by enhancing cybersecurity knowledge and
practices. By addressing the associated concerns and legal considerations, the clinic can
effectively support its stakeholders and contribute to a more secure digital environment.
5
Advanced Cybersecurity
Introduction
Before a Cyber-Attack
1. Data Backup (3-2-1 Rule):
Implementing a robust data backup strategy is fundamental to protecting against data
loss. The 3-2-1 rule advises maintaining three copies of data: two on different types of
storage media (such as hard drives and cloud storage) and one off-site (such as in a
remote data center). This approach ensures data can be recovered in various scenarios,
including hardware failures or ransomware attacks.
2. Penetration Testing:
Regular vulnerability assessments, including penetration testing, help identify and
mitigate potential security gaps before they are exploited by malicious actors. By
simulating cyber-attacks, individuals can uncover weaknesses in their systems and
address them proactively.
3. Network Security:
Securing home networks is essential for protecting personal data. This involves using
encryption to safeguard data in transit, configuring firewalls to block unauthorized
access, and keeping router firmware up-to-date to patch known vulnerabilities.
4. Legal Compliance:
Adhering to data protection regulations such as the General Data Protection Regulation
(GDPR) is critical for safeguarding personal information. Compliance ensures that data is
handled according to legal standards, which can help prevent legal issues and enhance
overall security.
6
Advanced Cybersecurity
After a Cyber-Attack
1. Data Recovery:
Following a cyber-attack, recovering data from backups is crucial. It is important to
ensure that backup files are free from malware and have not been compromised. A well-
implemented backup strategy facilitates swift recovery and minimizes data loss.
2. Analyze Security Breaches:
Conducting a thorough investigation into the attack helps understand its cause and scope.
This analysis allows individuals to identify and reinforce vulnerabilities, thereby
preventing future incidents. Understanding the attack's nature also helps in refining
security measures.
3. Report the Incident:
Reporting cyber-attacks to relevant authorities or consumer protection agencies is vital.
This step not only assists in preventing further attacks but also contributes to broader
cybersecurity awareness and prevention efforts.
Before a Cyber-Attack
1. Network Defense:
Implementing robust perimeter defenses is essential for safeguarding organizational
networks. This includes deploying firewalls, intrusion detection systems (IDS), and
intrusion prevention systems (IPS) to defend against external threats and unauthorized
access.
2. Password Policies:
Enforcing strong password policies and multi-factor authentication (MFA) enhances
access security. Strong, unique passwords combined with MFA add layers of protection,
making it more challenging for attackers to gain unauthorized access.
3. Continuous Monitoring:
Regularly monitoring network traffic and system activity is crucial for early detection of
suspicious activities. Continuous monitoring helps identify and respond to potential
threats before they can escalate into significant security incidents.
7
Advanced Cybersecurity
8
Advanced Cybersecurity
After a Cyber-Attack
1. Patch Management:
Applying security patches and updates promptly addresses vulnerabilities that may have
been exploited during an attack. Effective patch management helps prevent reoccurrence
and strengthens overall system security.
2. Access Review:
Reassessing and adjusting user access controls post-attack is essential. Limiting access to
critical systems and data ensures that unauthorized users cannot exploit the breach
further, protecting against additional damage.
3. Ongoing Monitoring:
Maintaining vigilant monitoring after an attack is necessary to detect any new threats or
vulnerabilities. Continuous oversight ensures that systems remain secure and any residual
risks are promptly addressed.
Conclusion
9
Advanced Cybersecurity
addressing both the technical and ethical aspects of cybersecurity, individuals and
organizations can better protect their data, maintain operational integrity, and uphold trust in
their security practices.
References
Li, Y., & Liu, Q. (2021). A Comprehensive Review Study of Cyber-Attacks and Cyber
Security; Emerging Trends and Recent Developments. Energy Reports, 7(7), 8176–
8186. doi:https://doi.org/10.1016/j.egyr.2021.08.126.
10