Unit 05 Security Assignment
Unit 05 Security Assignment
Higher Nationals
Oshada Lokuhetty
Assessor Internal Verifier
Unit 05: Security
Unit(s)
Providing a suitable security solution for METROPOLIS CAPITAL Bank
Assignment title
M H S K Jayasara / E181987
Student’s name
List which assessment Pass Merit Distinction
criteria the Assessor has
awarded.
INTERNAL VERIFIER CHECKLIST
• Constructive?
Y/N
• Linked to relevant assessment
criteria? Y/N
Give details:
Internal Verifier
Date
signature
Programme Leader
Date
signature (if required)
Resubmission Feedback:
Pearson
Higher Nationals in
Computing
Unit 5: Security
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as your cover
sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page Number on each
page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory information. eg: Figures,
tables of comparison etc. Adding text boxes in the body except for the before mentioned compulsory information will result
in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing) for
an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then be asked to complete
an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD referencing system
to avoid plagiarism. You have to provide both in-text citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A REFERRAL
or at worst you could be expelled from the course
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without
attributing the sources in the correct way. I further understand what it means to copy another’s work.
[email protected] 2023/12/03
Student’s Signature: Date:
(Provide E-mail ID) (Provide Submission Date)
Assignment Brief
Student Name /ID Number M H S K Jayasara / E181987
Unit Tutor
Issue Date
Submission Date
Submission Format:
The submission is in the form of an individual written report. This should be written in a concise, formal
business style using single spacing and font size 12. You are required to make use of headings, paragraphs
and subsections as appropriate, and all work must be supported with research and referenced using the
Harvard referencing system. Please also provide an end list of references using the Harvard referencing
system.
METROPOLIS CAPITAL Bank is one of the leading private banking service providers in Sri Lanka. It
operates over 100 branches and 500 ATM machines across the island as well as 8 Branches overseas. In
order to provide their services, METROPOLIS CAPITAL Bank has a primary datacenter located in
Colombo and a Secondary datacenter located in Galle. Each branch and ATM must have connectivity to
the core banking system to be able to operate normally. In order to establish the connectivity between
datacenters, branches and ATM machines, each location has a single ISP link. This link provides VPN
services between branches, ATMs and datacenters as well as MPLS services for the bank and it
establishes connectivity between datacenters, ATMs, and branches.
METROPOLIS CAPITAL Banks Head Office is a 5 Story Building in Kollupitiya with the Ground
Floor allocated for Customer Services, the First Floor allocated for HR, the Second Floor allocated for
Meeting Rooms and Senior Executive Staff, the Third Floor is allocated for the Technical Support Team
and the Fourth Floor hosts High Performance Servers running core banking systems. Fifth Floor is for
some other outside companies that are not related with the METROPOLIS CAPITAL Bank. Other than
this, METROPOLIS CAPITAL bank provides a lot of services to customers including online and mobile
banking facilities. Therefore, their core banking system must communicate with several outside systems
and all communication between outside systems, Data centers and the Head Office is protected by a
single firewall. In Addition, METROPOLIS CAPITAL Bank has recently implemented a bring your
own device (BYOD) concept for Senior Executive Staff and HR Departments and to facilitate this, they
are providing employee WiFi as well as a guest WiFi Hotspot.
The bank has signed agreements, AMCs, contracts and NDAs with several Local and foreign IT service
vendors. Some local vendors provide services and supports to foreign companies. METROPOLIS
CAPITAL Banks Technical Support Team is a local third-party vendor, contracted by METROPOLIS
CAPITAL Bank and managed by their Supply chain management officer. The Technical Support Team
provides onsite and remote support for their customers.
METROPOLIS CAPITAL bank strictly follows the rules and regulations enforced by the government
and the Central Bank. Therefore, they have obtained the ISO 31000:2009 certification. In addition to
this, the areas of datacenters, branches, ATM and HQ is covered by CCTV and 24x7 monitoring is
happening. Other security functions like VA scanning, internal auditing, and security operation done by
the bank employees. They have purchased a VA scanning tool, Privilege access management (PAM)
system, Endpoint detection and respond (EDR) system, Data loss prevention (DLP) tool, Web
application firewall (WAF) and Secure mail gateway which are managed by the Technical Support
Team.
It has been reported that an emergency is likely to occur where a work from home situation may be
initiated. Therefore, you have been employed by METROPOLIS CAPITAL Bank as a Network Security
Analyst to recommend and implement a suitable Security solution to facilitate this situation.
Activity 01
Discuss and assess the security procedures and types of security risks METROPOLIS CAPITAL
Bank may face under its current status and evaluate a range of physical and virtual security measures
that can be employed to ensure the integrity of organizational IT security. You also need to analyze
the benefits of implementing network monitoring systems for METROPOLIS CAPITAL Bank with
valid reasons in order to minimize security risks identified and enhance the organizational security.
Activity 02
2.1 Discuss how an incorrect/improper configuration for network infrastructure such as firewall and VPN
could impact METROPOLIS CAPITAL Bank. Assess IT security risks that may face by the employees of
METROPOLIS CAPITAL Bank and propose how the organization can facilitate their employees with a
“Secure remote working environment”.
2.2. Discuss how following technologies would benefit METROPOLIS CAPITAL Bank and its Clients to
increase network performance. (Support your answer with suitable illustrations).
i) Static IP,
ii) NAT
iii)DMZ
Activity 03
Review risk assessment procedures for METROPOLIS CAPITAL Bank to protect itself and its clients.
Explain the mandatory data protection laws and procedures which will be applied to data storage solutions
provided by METROPOLIS CAPITAL Bank. Explain the topic "ISO 31000 risk management
methodology" and summarize the ISO 31000 risk management methodology and its application in IT
security. Analyze possible impacts to organizational security resulting from an IT security audit.
Recommend how IT security can be aligned with organizational Policy, detailing the security impact of
any misalignment.
Activity 04
4.1 Design and Implement suitable security policy to prevent misuse and exploitations in line with
METROPOLIS CAPITAL Bank using the Organizational policy tools for the given scenario,
While evaluating and justifying the suitability of the tools used in an organizational policy to meet
business needs. Identify the stakeholders who are subject to the METROPOLIS CAPITAL Bank and
describe the role of these stakeholders to build security audit recommendations for the organization.
4.2 Discuss and present a disaster recovery plan for METROPOLIS CAPITAL Bank for all their sites to
guarantee maximum reliability to their clients. (Student must develop a PowerPoint-based presentation
which illustrates the recovery plan within 15 minutes of time including justifications and reasons for
decisions and options used).
Grading Rubric
Grading Criteria Achieved Feedback
Contents
Activity 01 ................................................................................................................. 16
1.1. What is IT Security................................................................................................................................. 16
1.1.1. Vulnerability ................................................................................................................................... 16
1.2. Assets of Metropolis Bank as of now. ................................................................................................... 16
1.3. Types of Security Risks for METROPOLIS CAPITAL Bank's Assets: .................................................... 18
1.4. Assеssmеnt of Sеcurity Procеdurеs: ................................................................................................. 19
1.5. The potential impacts of the identified security risks on METROPOLIS CAPITAL Bank. ................... 20
1.6. Physical and virtual security measures suggested to Metropolis Bank to mitigate the above risks 22
1.7. How do the above security measures contribute to the integrity of organizational IT security by
addressing the identified risks? ................................................................................................................... 23
Activity 02 ................................................................................................................24
2.1. Discuss about the potential effects on METROPOLIS CAPITAL Bank of an incorrect or poor
configuration for network infrastructure, such as a firewall or VPN. ......................................................... 24
2.1.1. Importance of Firewall and VPN for METROPOLIS CAPITAL Bank. ................................................ 24
2.1.2. Potential Impact of Incorrect Configuration of Firewall Policies and VPNs at METROPOLIS
CAPITAL Bank. .............................................................................................................................................. 26
2.2. Discuss how following technologies would benefit METROPOLIS CAPITAL Bank and ......................... 28
its clients to increase network performance. .............................................................................................. 28
Activity 03................................................................................................................. 32
Review risk assessment procedures for METROPOLIS CAPITAL Bank to protect itself and its clients. ....... 32
3.1. Risk Assessment............................................................................................................................. 32
3.1.2. How is Metropolis Capital Bank's risk calculated? .................................................................... 33
3.1.3. Probability – Impact matrix for Metropolis Capital Bank. ............................................................. 33
3.1.4. Risk Assessment Table for Metropolis Capital Bank. ..................................................................... 34
3.2. Navigating the Data Protection at METROPOLIS CAPITAL Bank. ...................................................... 36
3.2.1. Data Protection Laws and Procedures. ...................................................................................... 37
3.2.2. Consequences of Non-Compliance................................................................................................ 38
Activity 04 ................................................................................................................ 39
4.1. Designing and implementing a comprehensive security policy for METROPOLIS CAPITAL Bank is
crucial to prevent misuse and exploitations of sensitive data. The security policy should align with the
organizational goals and the specific challenges faced by the bank. Below is a framework for creating an
effective security policy using organizational policy tools: ......................................................................... 39
4.1.1. Security policy for Metropolis Capital Bank............................................................................... 39
4.1.2. Password Guidelines for Metropolis Capital Bank. ................................................................... 41
Activity 01
1.1. What is IT Security
Cybersecurity, also known as information technology (IT) security, is a general name for a collection of
methods, policies, and technologies used to protect digital data and technology assets against attacks,
problems, and online threats. Protecting data and system availability, confidentiality, and integrity is the
main goal of IT security.
1.1.1. Vulnerability
• Physical Assets
The Head Office of METROPOLIS CAPITAL Bank stands tall as a 5-story building located in
Kollupitiya. This strategically designed structure optimizes its space to efficiently cater to various
functions crucial for the bank's operations.
At the ground floor, a dedicated area is allocated for Customer Services, emphasizing accessibility and
convenience for clients engaging with the bank. Moving up to the first floor, this space is designated for
Human Resources (HR), focusing on the management and support of the bank's workforce.
Key workers collaborate and make decisions together as a result of the second floor's central location for
meeting rooms and senior executive staff. The Technical Support Team is based on the third level,
providing a proactive approach for the maintenance and development of the bank's IT infrastructure.
The fourth floor is a critical space housing High-Performance Servers that run the core banking systems
METROPOLIS CAPITAL Bank operates an extensive network of over 500 ATMs and over 100 branches
around the island, showing its wide reach. In addition, the bank now has eight locations abroad, extending
its reach throughout the world.
3. Data Centers
The Bank’s has a two data Centers. Primary data center located in Colombo. Secondary Data center Located
in Galle.
4. Employee Devices:
As senior executive staff and HR departments have been implementing a "bring your own device" (BYOD)
policy, employee devices—such as laptops and smartphones—have become important for remote work and
daily operations.
• Digital Assets
1.Communication Systems - To maintain connectivity bеtwееn thе bank's various locations and еxtеrnal
systems, digital assets encompass communication infrastructure, including еmail, mеssaging, and sеcurе
data transmission systems.
2.Agreements, Contracts, and NDAs: The bank's confidentiality agreements (NDAs), contracts, and annual
maintenance contracts (AMCs) with both local and global IT suppliers are essential digital records that
regulate the bank's relations with its technology partners.
3. Sеcurity Tools: Thе bank has invеstеd in various sеcurity tools, including Vulnеrability Assеssmеnt (VA)
scanning tools, Privilеgе Accеss Managеmеnt (PAM) systеms, Endpoint Dеtеction and Rеsponsе (EDR)
systеms, Data Loss Prеvеntion (DLP) tools, Wеb Application Firеwalls (WAFs), and Sеcurе Mail Gatеways
to protеct digital assеts.
4. Platforms for Online and Mobile Banking: The bank's digital assets include its online and mobile banking
platforms, which let users access their accounts and easily complete transactions.
Incidents related to health and safety in the bank's operations have the potential to cause disruptions and
even disasters that affect customers and employees.
• Natural Disasters
Natural Disasters: The bank is at risk of natural disasters like earthquakes, floods, or fires, which could
cause infrastructure damage and data loss at its branches, data centers, and headquarters.
• Equipmеnt Failurе
Hardware failures can affect the bank's physical assets, such as servers and ATMs, which might disrupt
services.
• Physical Intrusion
Physical assets, like servers and customer records, may be compromised by unauthorized access or theft at
branches, data centers, or head offices.
• Cybеr Attacks
Digital assets are particularly vulnerable to cyberattacks, including ransomware, phishing, and malware,
which can result in financial losses and data breaches.
• Data Brеachеs
Unauthorized access to customer data or digital communication systems may lead to data breaches, which
could harm the bank's reputation and subject it to fines from regulators.
• Compliancе Violations
Non-compliance with data protection regulations or cybersecurity standards may result in non-banking
entities' reputation and legal status being negatively impacted.
• Insider Threats
Employees having access to digital assets may misuse them deliberately or accidentally, which could
potentially result in data loss or disruptions to services.
The sеcurity procеdurеs at METROPOLIS CAPITAL Bank havе notablе strеngths but also somе arеas that
rеquirе improvеmеnt:
Strеngths
Sеcurity Tools: Thе bank's invеstmеnt in various sеcurity tools, including Vulnеrability Assеssmеnt (VA)
scanning tools, Privilеgе Accеss Managеmеnt (PAM) systеms, Endpoint Dеtеction and Rеsponsе (EDR)
systеms, Data Loss Prеvеntion (DLP) tools, Wеb Application Firеwalls (WAFs), and Sеcurе Mail
Gatеways, rеflеcts a proactivе approach to digital assеt sеcurity.
ISO 31000 Certification: The bank's compliance with ISO 31000:2009 standards shows its dedication to
systemic risk management and improves its capacity to identify and reduce a range of risks.
CCTV and round-the-clock monitoring: Robust physical security is provided by wide CCTV coverage
and 24/7 monitoring of vital areas, such as data centers and branches.
Security Awarеnеss Training: Increasing employee security awareness and training programs may help in
reducing the risk of security breaches, especially with regard to social engineering attacks.
Insider Threat Detection: Improving intrusion detection systems is essential for actively reducing external
security risks. Detecting suspicious activities can be made easier by implementing user behavior analytics
and monitoring.
Third-party Vendor Managеmеnt: Given how much the bank depends on these third-party vendors, a
greater control and assessment of them is required. This involves evaluating the security protocols to make
sure they meet the bank's requirements.
Disastеr Rеcovеry Planning: The disaster recovery plan needs to be thoroughly reviewed, updated, and
tested on a regular basis to ensure that it is effective in protecting digital and physical assets during
emergencies.
1.5. The potential impacts of the identified security risks on METROPOLIS CAPITAL Bank.
a. Equipment Failure:
• Service Disruptions: Hardware failures in servers and ATMs have the potential to disrupt banking
services, affecting customer transactions and causing inconvenience. Extended downtime may lead to
financial losses and customer dissatisfaction.
b. Natural Disasters:
• Infrastructure Damage: In the event of natural disasters such as earthquakes, floods, or fires,
significant infrastructure damage can occur at the bank's branches, data centers, and the head office. This
leads to prolonged service disruptions and financial losses.
d. Physical Intrusion:
• Data and Asset Compromise: Physical assets, such as servers and customer records, can be affected by
theft or unauthorized entry at branch offices, data centers, or the head office. This might lead to financial
theft, illegal access to private information, and brand harm to the bank.
e. Insider Threats:
• Illegal Access: External attackers could lead to data loss, which would impact the privacy of the data.
This may result in financial losses and damage to customer confidence, particularly if private customer
data is compromised.
f. Data Breach:
• Damage to Reputation: Illegal access to customer information or digital communication systems may
result in data breaches, damaging the bank's reputation and possibly having legal effects.
1.6. Physical and virtual security measures suggested to Metropolis Bank to mitigate the above
risks
Implementing a firewall: A firewall is an essential component of every network defense system. That
controls traffic flow, acts as a strong barrier against unauthorized access, and offers strong protection against
malware. A firewall reinforces your network's overall security posture by carefully monitoring and filtering
all incoming and outgoing data to ensure that only secure communications are allowed.
By using encryption: Data is effectively protected by encryption, that maintains it safe when it's in use as
well as when it's inactive. Encryption converts data into an unreadable format, making it much harder for
unwanted parties to access or translate, whether it is being transferred across networks or kept on devices.
Because of its dual role, sensitive information remains private and confidential for the duration of its
lifecycle, that improves the security infrastructure as a whole.
Setting up permissions and user accounts: Enhancing network security needs careful control over user
access, which is done by creating unique user accounts and carefully allocating rights. This logical technique
gives administrators the ability to control and specify exactly which network segments each user is allowed
to access. Organizations can create a customized control mechanism that strengthens network security
overall and lowers the risk of unwanted access by modifying permissions based on roles and responsibilities.
Monitoring activity: Maintaining a close eye on everything going on in your network is a proactive way to
recognize unusual activity and respond to security risks quickly and efficiently.
(Clancy, October 4, 2022)
1.7. How do the above security measures contribute to the integrity of organizational IT security
by addressing the identified risks?
Taking Benefit of Vulnerabilities: Integrity testing and vulnerability scanning actively identify and
address weaknesses in the system, reducing the possibility of online attacks and data breaches.
Physical Intrusion and Unauthorized Access: Biometric access control, advanced monitoring, and
intrusion detection reduce the risk of unwanted physical access and intrusion while safeguarding physical
assets from theft and damage.
Data breaches and unauthorized access: End-to-end encryption protects digital assets, making it
extremely difficult for attackers to access sensitive data without authorization. Financial losses and data
breaches are less likely to happen as a result.
Data Leakage: Data loss prevention (DLP) and methods of encryption minimize the risk of insider attacks
and unauthorized access to data by monitoring and controlling data flows.
METROPOLIS CAPITAL Bank may considerably improve its security position, lower the chance of
security incidents, and ensure the reliability of organizational IT security by implementing and upholding
these security measures, safeguarding both physical and digital assets from multiple dangers.
Activity 02
2.1. Discuss about the potential effects on METROPOLIS CAPITAL Bank of an incorrect or poor
configuration for network infrastructure, such as a firewall or VPN.
1. Firewall:
▪ Prevents Hacking
Thieves and other bad actors are encouraged to start digital operations by the trend of businesses moving
more toward them. Firewalls are even more crucial now that data theft and computer hostage-taking are on
the rise because they keep hackers from accessing your emails, systems, data, and more. A firewall has the
ability to totally thwart an attacker or discourage them from choosing a difficult target.
▪ Promotes Privacy
The promotion of privacy is one main advantage. You establish a safe haven for your clients by taking
proactive steps to protect both your and their data. Everyone enjoys having their data stolen, particularly
when it is obvious that steps might have been taken to stop the hack.
It is also common for some business websites to limit how you can use their public work services based on
where you are, such as getting quotes or accessing more specific information about their services. If you use
a VPN, you can make it look like you are using the internet from a location that is acceptable to the service
you are trying to access.
If your employees need to have full access to all safe information and services offered by websites, a VPN
can make it easier.
Misconfigured firewall policies and unconnected virtual private networks (VPNs) may significantly impact
the safety and smooth operation of METROPOLIS CAPITAL Bank. It is imperative to comprehend the
diverse ways in which these misconfigurations may potentially affect the bank in order to mitigate related
IT security threats.
a) Data Interception:
• Impact: Misconfigured VPNs may create opportunities for data interception, especially during data
transmission between the bank's locations or remote employees.
• IT Security Risks: Intercepted data can be exploited by threat actors for unauthorized access, leading to
potential data breaches and compromising the confidentiality of financial transactions.
• Impact: Inadequate configuration of VPN encryption protocols may result in weak or outdated security
measures.
• IT Security Risks: Weak encryption exposes the transmitted data to interception and decryption by
attackers, undermining the confidentiality and integrity of sensitive information.
• Impact: Misconfigured VPN access controls may grant inappropriate permissions, allowing unauthorized
individuals to access confidential financial systems and data.
• IT Security Risks: Unauthorized access increases the risk of data breaches, financial fraud, and
compromises the bank's compliance with regulatory standards.
Figure 1 (VPN)
i. Unauthorized Accеss:
• Impact: Misconfigurations in firеwall policies may inadvеrtеntly allow unauthorizеd accеss to thе bank's
intеrnal nеtwork. This could lеad to unauthorizеd individuals gaining еntry to sеnsitivе financial data,
customеr information, and critical systеms.
• IT Sеcurity Risks: Unauthorizеd accеss posеs a significant sеcurity risk, potеntially lеading to data
brеachеs, financial thеft, and rеputational damagе for thе bank.
• Impact: Impropеrly configurеd firеwalls may disrupt thе normal flow of nеtwork traffic, lеading to sеrvicе
intеrruptions and dеlays in customеr transactions.
• IT Sеcurity Risks: Whеnеvеr sеrvicеs go down, attackеrs might takе advantagе of thе situation. Thеy could
do things likе launch attacks to stop sеrvicеs or try to gеt into systеms without pеrmission, еspеcially whеn
thе nеtwork is not stablе.
• Impact: Failurе to configurе firеwalls to control and monitor spеcific applications may еxposе thе bank to
risks associatеd with unrеgulatеd application usagе.
• IT Sеcurity Risks: Malicious applications or unauthorizеd sеrvicеs could еxploit this misconfiguration,
potеntially lеading to thе introduction of malwarе or thе compromisе of sеnsitivе financial applications.
2.2. Discuss how following technologies would benefit METROPOLIS CAPITAL Bank and
its clients to increase network performance.
A Demilitarized Zone (DMZ) is a network segment that is placed strategically to act as a buffer between
the internal network of METROPOLIS CAPITAL Bank and the external, untrusted network, which is
usually represented by the internet. A complex network architectural technique that greatly improves
overall network security is the installation of a demilitarized zone (DMZ). This is accomplished by
properly separating the organization's internal resources from its external-facing services, adding a strong
extra layer of defense against potential cyber threats.
✓ Benefits
1. Enabling access control: Through the public internet, businesses can give users access to services
that are located outside of their network's boundaries. While providing network segmentation to
make it more difficult for an unauthorized user to enter the private network, the DMZ permits
access to these services. A proxy server, which centralizes internal traffic flow and makes
monitoring and recording of that traffic easier, may also be included in a demilitarized zone
(DMZ).
2. Blocking Internet Protocol (IP) spoofing: Attackers try to mimic authorized devices logged into
networks and spoof IP addresses in an effort to obtain access to systems. Such spoofing attempts
can be detected by a DMZ and stopped until another service confirms the validity of the IP address.
Network segmentation is another feature of the DMZ that allows traffic to be arranged and public
services to be accessed outside of the internal private network.
3. Stopping reconnaissance on networks: A DMZ stops attackers from carrying out the reconnaissance
task by putting up a barrier between the internet and a private network, which helps them find
possible targets. Although servers in the demilitarized zone are open to the public, a firewall adds
an extra degree of protection by preventing an intruder from seeing inside the internal network. The
internal firewall keeps the private network safe and hinders external reconnaissance even in the
event that a DMZ system is compromised. (Barracuda, 2020)
2)Static IP
A Static IP address is a stalwart and unchanging identifier meticulously assigned to a device within a
network. This unyielding characteristic stands in stark contrast to dynamic IP addresses, offering a fixed
point of reference for devices. In the context of network configurations, the utilization of static IPs is a
robust strategy that significantly bolsters security. The stability provided by static IPs simplifies the
monitoring of network activity, contributing to a more secure and easily managed network environment.
✓ Benefits
i. Supports name resolution across Wide Area Networks (WANs), which enables devices to be
reached by their host-names reliably.
ii. Provides better protection against network security problems on home networks.
iii. Using static IP addresses on your home networks avoids any IP address conflicts.
iv. More accurate geolocation than a dynamic IP address.
v. Download and upload speeds are generally faster than dynamic IPs.
(Walsh, September 15, 2023)
Network address translation (NAT) is a technique commonly used by internet service providers (ISPs) and
organizations to enable multiple devices to share a single public IP address. By using NAT, devices on a
private network can communicate with devices on a public network without the need for each device to
have its own unique IP address.
✓ Benefit
i. IP address conservation: By enabling multiple devices to share a single IP address, NAT helps
conserve IP address space. This is especially important for organizations that have been assigned a
limited number of IP addresses by their ISP.
ii. Improved security: NAT can provide a measure of security by hiding the internal network from
the outside world. This can be useful for preventing attacks that target specific IP addresses or for
preventing devices on the internal network from being accessed directly from the internet. NAT can
also help prevent devices on the internal network from accessing malicious or unwanted websites.
iii. Better speed: NAT can improve communication speed by reducing the number of packets that
need to be routed through the network. This is because NAT eliminates the need for each device on
the internal network to have its own unique IP address.
iv. Flexibility: NAT can also be used to provide flexibility in network design, which is particularly
useful for organizations that want to change their network configuration without changing their IP
addresses. Organizations may want to change their network configuration to improve security or
performance or to add new devices to the network.
v. Multi-homing: NAT can be used to allow devices on a private network to connect to multiple
public networks, a network configuration practice called multi-homing. This can be valuable for
organizations that want to connect to multiple ISPs or that want to provide failover in case one of
the ISPs goes down. Multi-homing with NAT provides connection redundancy and increases
uptime by allowing traffic to be routed through multiple ISPs.
vi. Cost savings: NAT reduces the number of IP addresses an organization needs, which can save
them money on IP address licenses and other associated costs.
vii. Easier network administration: NAT makes it easier to manage a network by reducing the
number of IP addresses that need to be assigned. This benefits organizations with a large fleet of
devices and those that want to reduce the amount of time and effort required to manage their
networks.
(Fortinet home, 2021)
Conclusion.
Demilitarized zones (DMZs), static IP addresses, and network address translation (NAT) have all been
skillfully combined by the METROPOLIS CAPITAL Bank to create a robust and intelligent network
architecture. This establishes a strong base that demonstrates their commitment to maintaining the
network's extreme security. The DMZ serves as a physical barrier, separating and safeguarding internal
data from external services. Static IP keeps everything consistent, which makes it simpler to monitor the
network and identify any anomalies immediately. By protecting public IP space, masking internal IP
addresses, and enhancing security, NAT provides an additional degree of protection. When combined,
these technological solutions ensure that the bank's network is extremely secure, reduces risks, performs
effectively, and offers significant advantages in addressing the cybersecurity issues of today. In order to
ensure that operations run smoothly and safely for the bank and its customers, METROPOLIS CAPITAL
Bank is not only robust but also equipped to handle any challenge that the field of network security may
present.
Activity 03
Review risk assessment procedures for METROPOLIS CAPITAL Bank to protect itself and its
clients.
Thе risk assеssmеnt at Mеtropolis Capital Bank is conductеd using a matrix that considеrs both thе
likеlihood and thе impacts of diffеrеnt scеnarios. (Probability-impact matrix)
▪ Table Template
Action to
# Risk Description Probability Impact Risk Level Minimize
Risk
▪ Background Information.
Security Risks of
Company Name: Metropolis Capital Bank Tittle of Assessment: Metropolis
Capital Bank
Date of Risk
Assessor Signature: 2023/12/02
Assessment:
Action to
Risk
# Risk Description Probability Impact Minimize
Level
Risk
01 Natural The possibility of fires Medium Medium Install disaster
disasters and floods endangers the recovery plans,
physical infrastructure, make investments
with buildings and in sturdy building
equipment suffering infrastructure,
possible damage. and secure off-
site backups.
02 Hеalth and Operational Disruptions: Low High This includes
Safеty Health and safety conducting
Incidents incidents have the regular safety
potential to cause mishaps drills,
that could endanger the maintaining up-
lives of customers and to-date safety
employees. Liabilities protocols, and
may arise from this, and providing
Within METROPOLIS CAPITAL Bank's intricate operations, ensuring the security of data stands as a
paramount focus. The bank meticulously adheres to the regulations and statutes governing this aspect, with a
pivotal role played by the Data Protection Act of 1998. This legislation delineates the bank's responsibilities
in safeguarding crucial information and establishes stringent guidelines for the collection, processing, and
storage of personal data. Serving as the foundation of the bank's data security practices, this law outlines the
core principles that govern METROPOLIS CAPITAL's commitment to maintaining the confidentiality and
integrity of information.
The pivotal role of the Computer Misuse Act of 1990 in bolstering data protection measures cannot be
overstated, as it criminalizes unauthorized access to computer systems. Essentially serving as a legal
deterrent against cyber threats, this legislation underscores METROPOLIS CAPITAL Bank's unwavering
commitment to preserving the confidentiality and security of client information.
This Act assumes a crucial role by explicitly defining unauthorized access to computer systems as a
criminal offense. It acts as a legal bulwark, imposing consequences for individuals or entities attempting to
compromise the security of METROPOLIS CAPITAL Bank's computer systems. The legal penalties
prescribed by the Act act as a robust deterrent, discouraging malicious actors from engaging in activities
that could compromise the bank's data integrity.
Recognizing the evolving landscape of cyber threats, METROPOLIS CAPITAL Bank utilizes the
Computer Misuse Act as a proactive shield. The emphasis on criminalizing unauthorized access
underscores the bank's dedication to maintaining the highest standards of data protection. By integrating
the provisions of this Act into its cybersecurity strategy, METROPOLIS CAPITAL Bank sends a clear
message: any attempt to breach the sanctity of its computer systems will be met with legal consequences,
reinforcing the institution's commitment to safeguarding client information against cyber threats.
(McCallion, November 21, 2023)
METROPOLIS CAPITAL Bank's commitment to compliance is evident through deliberate actions. The
bank ensures transparency in its data handling processes, providing clear information to individuals about
how their data will be used. Robust measures are in place to prevent any unauthorized access to sensitive
information, bolstering the overall security infrastructure. This commitment extends throughout the data
lifecycle, from the initial point of collection, where individuals' data rights are respected, to the secure
storage within the bank's infrastructure, ensuring the integrity and confidentiality of the data are preserved
in accordance with the stipulations set forth by the Data Protection Act of 1998.
In essence, every facet of METROPOLIS CAPITAL Bank's data management aligns with the principles
and requirements mandated by this pivotal legislation, solidifying a commitment to responsible, lawful,
and ethical data processing practices. (Guide, 2015)
This unwavering dedication establishes a robust environment where the bank's reputation and client
relationships are fortified through a steadfast focus on confidentiality, integrity, and availability. The
commitment to data protection becomes a cornerstone in building and reinforcing trust, essential elements
in the financial world where the security of sensitive information is paramount.
I. Non-compliance with the Data Protection Act of 1998 carries substantial consequences for
METROPOLIS CAPITAL Bank. Breaches of this legislation can result in severe financial
penalties, legal actions, and reputational damage. Individuals have the right to seek compensation
for damages caused by breaches of their data rights. Furthermore, the Information Commissioner's
Office (ICO) has the authority to issue enforcement notices, compel changes in data processing
practices, and impose fines for non-compliance. The regulatory landscape underscores the
importance of rigorous adherence to data protection laws, emphasizing the potential impact on both
the financial viability and standing of METROPOLIS CAPITAL Bank within the industry.
Activity 04
4.1. Designing and implementing a comprehensive security policy for METROPOLIS CAPITAL
Bank is crucial to prevent misuse and exploitations of sensitive data. The security policy
should align with the organizational goals and the specific challenges faced by the bank.
Below is a framework for creating an effective security policy using organizational policy
tools:
In formulating a comprehensive security policy for METROPOLIS CAPITAL Bank, it is crucial to address
specific elements that are paramount to safeguarding the organization's digital assets, ensuring regulatory
compliance, and fostering a resilient security posture. The security policy serves as a living document,
dynamically adapting to evolving threats and technologies to maintain its effectiveness over time.
Overview:
Electronic email serves as a vital communication tool within Metropolis Capital Bank, facilitating seamless
information exchange. However, it's essential to recognize the potential legal, privacy, and security risks
associated with email misuse. This email policy outlines the acceptable and unacceptable use of Metropolis
Capital Bank's email system to ensure responsible and secure communication practices.
Purpose:
The primary purpose of this email policy is to establish guidelines for the proper use of Metropolis Capital
Bank's email system. Users are expected to adhere to the outlined principles, promoting ethical conduct,
compliance with laws, and proper business practices.
Scope:
This policy encompasses all email communication originating from a Metropolis Capital Bank email address
and applies to all employees, vendors, and agents acting on behalf of the bank.
Policy:
4.1 Ethical Use:
All email usage must align with Metropolis Capital Bank policies, adhering to ethical conduct, safety
protocols, legal compliance, and proper business practices.
4.2 Business-related Purpose:
Metropolis Capital Bank email accounts are designated for business-related purposes. While personal
communication is allowed on a limited basis, non-Metropolis Capital Bank commercial uses are strictly
prohibited.
4.3 Data Protection:
All Metropolis Capital Bank data within emails or attachments must be handled according to the Data
Protection Standard, ensuring its security.
4.4 Record Retention:
Emails qualify as Metropolis Capital Bank business records and should only be retained if there is a
legitimate and ongoing business reason. Retention must follow the Metropolis Capital Bank Record
Retention Schedule.
4.5 Offensive Content:
The email system must not be used for creating or distributing disruptive or offensive messages. Employees
encountering such content should report it promptly.
4.6 No Automatic Forwarding:
Users are prohibited from automatically forwarding Metropolis Capital Bank email to third-party systems,
and forwarded messages must not contain confidential information.
Reasonable personal use of Metropolis Capital Bank resources for emails is acceptable. Non-work related
emails should be stored separately, and the distribution of chain letters or joke emails is prohibited.
4.9 Privacy Expectations:
Employees should have no expectation of privacy for anything stored, sent, or received on the company's
email system.
4.10 Monitoring:
Metropolis Capital Bank may monitor messages without prior notice. Users should be aware that the
company is not obligated to monitor email messages.
Policy Compliance:
5.2 Exceptions:
Any exception to the policy must be approved by the Infosec team in advance.
5.3 Non-Compliance
Violations may result in disciplinary action, including termination of employment.
This policy is a dynamic document that may evolve to address emerging threats and technologies. Your
adherence to these guidelines is crucial for maintaining the security and integrity of Metropolis Capital
Bank's digital assets.
Overview:
Passwords are a critical aspect of our information security at Metropolis Capital Bank. A well-constructed
password is essential for safeguarding individual systems, data, and our network. This guideline outlines
best practices for creating and maintaining secure passwords to enhance our overall cybersecurity posture.
Purpose:
The purpose of these guidelines is to provide best practices for the creation of strong and secure passwords,
emphasizing the importance of password strength in ensuring the integrity of our information security.
Scope:
This guideline applies to all personnel associated with Metropolis Capital Bank, including employees,
contractors, consultants, temporary workers, and individuals affiliated with third parties. It covers all types
of passwords, including user-level accounts, system-level accounts, web accounts, email accounts, screen
saver protection, voicemail, and local router logins.
Statement of Guidelines:
3. Best Practices:
- Avoid writing down passwords.
- Create passwords based on phrases, affirmations, or song titles.
- Example: The phrase "This May Be One Way To Remember" could become the password TmB1w2R!
or another variation. (Note: Do not use these examples as actual passwords.)
4. Passphrases:
- Passphrases are generally used for public/private key authentication.
- They should follow general password construction guidelines, including upper and lowercase letters,
numbers, and special characters.
Policy Compliance:
5.2 Exceptions:
- Any exception to the policy must be approved by the Infosec team in advance.
5.3 Non-Compliance:
- Employees found in violation of this policy may be subject to disciplinary action, up to and including
termination of employment.
Your commitment to adhering to these password guidelines is crucial in maintaining a robust information
security environment at Metropolis Capital Bank.
Overview:
Metropolis Capital Bank is dedicated to upholding a culture of integrity, trust, and ethical conduct among its
employees, partners, vendors, and affiliates. Demonstrating ethical behavior is crucial to setting us apart
from competitors, and any breaches of ethical standards will be promptly addressed to maintain the
company's reputation.
Purpose:
The purpose of this policy is to establish a foundation of openness and trust, emphasizing the expectations
for fair business practices. By adhering to this policy, we aim to guide business behavior and foster a
workplace where ethical conduct is a collective effort involving every member of the Metropolis Capital
Bank team.
Scope:
This policy applies to all individuals associated with Metropolis Capital Bank, including employees,
contractors, consultants, temporary workers, and those affiliated with third parties.
Policy:
Executives must disclose any conflict of interests related to their position within Metropolis Capital
Bank.
Policy Compliance:
5.2 Exceptions:
- None.
5.3 Non-Compliance:
- Employees found to have violated this policy may be subject to disciplinary action, up to and including
termination of employment.
Your commitment to upholding ethical standards is vital in maintaining the trust and integrity of Metropolis
Capital Bank.
Overview:
Remote access to Metropolis Capital Bank's corporate network is essential for maintaining productivity;
however, it comes with inherent security risks. This policy aims to define rules and requirements for
connecting to our network remotely. The goal is to minimize potential exposure to damages resulting from
unauthorized use, including the loss of sensitive data, intellectual property, damage to our image, internal
system disruption, and financial liabilities.
Purpose:
The purpose of this policy is to establish guidelines for remote access connections, ensuring the secure and
authorized use of Metropolis Capital Bank resources. It applies to all individuals with remote access
privileges, whether using a Metropolis Capital Bank-owned or personally-owned computer.
Scope:
This policy applies to all Metropolis Capital Bank employees, contractors, vendors, and agents utilizing
remote access connections for work purposes. It covers technical implementations of remote access
connecting to Metropolis Capital Bank networks.
Policy:
4.1 Requirements:
- 4.1.1 Secure Remote Access:
- Control remote access with encryption (e.g., Virtual Private Networks (VPNs)) and strong passphrases.
- 4.1.2 Login and Password Protection:
- Authorized Users must protect their login and password, even from family members.
- 4.1.3 Network Connectivity:
- When using a Metropolis Capital Bank-owned computer, ensure the remote host is not connected to any
other network simultaneously.
- 4.1.4 Approval for External Resources:
- Approval from InfoSec and the relevant business unit manager is required for using external resources
to conduct Metropolis Capital Bank business.
- 4.1.5 Anti-virus Software:
- All hosts connected to Metropolis Capital Bank internal networks via remote access must use up-to-date
anti-virus software.
- 4.1.6 Equipment Requirements:
- Personal equipment used for remote access must meet Metropolis Capital Bank-owned equipment
standards.
5. Policy Compliance:
- 5.1 Compliance Measurement:
- The InfoSec Team will verify compliance through various methods, including walk-throughs,
monitoring, tool reports, internal and external audits, and inspections.
- 5.2 Exceptions:
- Any exceptions must be approved by Remote Access Services and the InfoSec Team in advance.
- 5.3 Non-Compliance:
- Violations of this policy may result in disciplinary action, up to and including termination of
employment.
Thank you for your commitment to ensuring the security of Metropolis Capital Bank's remote access
connections.
• Preparedness Measures.
Preparedness is a cornerstone of Metropolis Capital Bank's disaster recovery approach. The bank invests in
ongoing training and awareness programs to ensure that all employees are well-versed in their roles and
responsibilities during a disaster. Regular drills and simulations are conducted to test the effectiveness of the
DRP and enhance the organization's preparedness to respond swiftly and decisively in the face of adversity.
• Collaborative Partnerships.
Metropolis Capital Bank recognizes the importance of collaborative partnerships with external entities,
including emergency responders, regulatory bodies, and industry peers. By fostering these relationships, the
bank enhances its ability to coordinate responses, share best practices, and stay informed about emerging
threats and regulatory updates.
• Recovery Procedures.
Metropolis Capital Bank's recovery procedures are designed to minimize downtime and restore normal
operations efficiently. These procedures encompass data restoration, system recovery, and the gradual
resumption of critical business functions. The bank places a premium on ensuring that the recovery process
is methodical, thorough, and aligned with the overarching goal of restoring normalcy.
In conclusion, Metropolis Capital Bank's Disaster Recovery Plan reflects a holistic and dynamic approach to
safeguarding operational continuity in the face of diverse threats. The plan's iterative nature, coupled with a
commitment to proactive risk management, positions the bank to navigate challenges with resilience and
uphold the trust of clients and stakeholders.
Communication Plan
Title Name Job Role Contact No
Mr Saman Jayathunga Disaster Recovery Coordinator 071-2358789
Mrs Shanika Hasini Deputy Disaster Recovery Coordinator 076-6547892
Mr Janith Liyanage Data Backup and Recovery Specialist 071-7896325
Mr Thusitha Kaldera Communication Coordinator 075-8523689
Mrs Hasanthika Madumali Communication Coordinator 072-3625789
Mr Sajith madushanka Facility Recovery Manager 074-2314231
Lighting Potential fire hazard, Evacuate affected Inspect and repair damaged
equipment damage areas,ensure equipment, implement lightning
Natural Disaster
• Investors:
- Contribution to the Organization: Investors play a pivotal role by providing essential capital for the
organization's operations and expansion, contributing to financial stability and growth
- Role in Security Audits: Due to their vested interest, investors actively participate in security audits,
advocating for robust security measures to protect their investments and ensure the organization's
resilience against potential threats
• Managers:
- Contribution to the Organization: Managers bring valuable skills and expertise to decision-making
processes and oversee day-to-day operations, contributing to the overall success of the organization.
- Role in Security Audits: Managers are integral to implementing security policies and procedures. During
security audits, their focus is on aligning security measures with business objectives and ensuring
operational efficiency.
• Employees:
- Contribution to the Organization: Employees contribute their skills and expertise, playing a crucial role
in driving the organization's success.
- Role in Security Audits: As end-users of security measures, employees are vital in adhering to security
protocols. Security audits assess employee awareness, training, and adherence to established security
practices.
• Customers:
- Contribution to the Organization: Customers contribute revenue through the purchase of goods and
services, sustaining the organization's financial health.
- Role in Security Audits: Customers, highly concerned about the security of their data, become a focal
point in security audits. The assessment ensures that measures are in place to protect customer information,
fostering trust and loyalty.
In summary, each stakeholder group - investors, managers, employees, and customers - plays a distinct role
in both contributing to the organization's success and influencing the outcomes of security audits. Their
collective involvement is crucial for maintaining a secure and resilient organizational environment.
• Government:
- Contribution to the Organization: Government entities contribute by establishing rules governing good
business practices and may also act as customers for specific services.
- Role in Security Audits: Compliance with government regulations is a central focus in security audits.
Stakeholders ensure that security measures align with legal requirements set forth by regulatory bodies.
• Owners:
-Contribution to the Organization: Owners bring skills, expertise, and contribute to the overall strategic
direction of the organization.
- Role in Security Audits: Owners, with a vested interest in the organization's long-term success, play a
critical role in approving security budgets, policies, and overarching security strategies.
In essence, the government's role involves both rule-setting and potential engagement as customers, while
owners significantly contribute to strategic decisions and are pivotal in shaping the organization's security
landscape during audits. Their involvement ensures alignment with legal requirements and long-term
success.
- Customers:
- Security breaches can lead to the compromise of customer data, resulting in legal consequences and a
loss of trust.
- Employees:
- Inadequate security measures may jeopardize job security if business decisions negatively impact the
organization's stability.
- Investors:
- Security is a critical factor for investors; insufficient security measures may deter investments.
- Managers:
- The security of sensitive business plans and data directly affects managerial decision-making and
strategic planning.
- Owners:
- Security lapses can lead to the departure of employees, refusal of investments, and a decline in customer
trust, impacting the overall viability of the business.
Ensuring robust security measures is not just a technical necessity but a strategic imperative that safeguards
the interests of customers, employees, investors, managers, and owners alike. It is integral to maintaining
trust, stability, and the long-term viability of the business.
4.3. Discuss and present a disaster recovery plan for METROPOLIS CAPITAL Bank for all
their sites to guarantee maximum reliability to their clients.
References
2023 British Safety Council., 2023. What is a risk assessment?. [Online]
Available at: https://www.britsafe.org/training-and-learning/informational-resources/risk-assessments-
what-they-are-why-they-re-important-and-how-to-complete-
them#:~:text=It%20is%20a%20legal%20requirement,or%20more%20people%20are%20employed.&text=
The%20main%20purpose%2
[Accessed 02 12 2013].
Barracuda, 2020. What is a DMZ network?. [Online]
Available at: https://www.barracuda.com/support/glossary/dmz-network
[Accessed 02 12 2023].
Clancy, R., October 4, 2022. What Is Virtual Network Security, and How Can It Help Thwart Threats?.
[Online]
Available at: https://www.eccouncil.org/cybersecurity-exchange/network-security/what-is-virtual-
network-security/
[Accessed 2 12 2023].
Fortinet home, 2021. Benefits of a VPN. [Online]
Available at: https://www.fortinet.com/resources/cyberglossary/benefits-of-
vpn#:~:text=Without%20a%20VPN%2C%20you%20may,and%20receive%20secure%20and%20anonymou
s.
[Accessed 2 12 2023].
Fortinet home, 2021. Firewall Benefits: The Importance of Firewall Security. [Online]
Available at: https://www.fortinet.com/resources/cyberglossary/benefits-of-firewall
[Accessed 02 12 2023].
Fortinet home, 2021. What is Network Address Translation (NAT)?. [Online]
Available at: https://www.fortinet.com/lat/resources/cyberglossary/network-address-translation
[Accessed 02 12 2023].
Guide, H. S., 2015. Data Protection Act. [Online]
Available at: https://www.sciencedirect.com/topics/computer-science/data-protection-
act#:~:text=British%20Information%2C%202012-
,Data%20Protection%20Act%201998,be%20collected%2C%20stored%20and%20processed.
[Accessed 03 12 2023].
McCallion, J., November 21, 2023. What is the Computer Misuse Act?. [Online]
Available at: https://www.itpro.com/it-legislation/28174/what-is-the-computer-misuse-act
[Accessed 03 12 2023].
Walsh, B., September 15, 2023. What Is a Static IP Address and Why Do You Need One?. [Online]
Available at: https://www.wizcase.com/blog/what-is-a-static-ip-address-and-do-you-need-
one/?gad_source=1&gclid=Cj0KCQiAyKurBhD5ARIsALamXaHIeq8FthlK0CO3y8HbdJrJZtn5e4HLfeIy7wWsd
bueeofL6fmJd2kaAtP6EALw_wcB
[Accessed 2 12 2023].