Unit - 4 (CS)
Unit - 4 (CS)
4 PRIVACY
UNIT
Data privacy, also called information privacy, is an aspect of data protection that
addresses the proper storage, access, retention, immutability and security of
sensitive data.
Data privacy is typically associated with the proper handling of personal data or
personally identifiable information (PII), such as names, addresses, Social
Security numbers and credit card numbers. However, the idea also extends to
other valuable or confidential data, including financial data, intellectual property
and personal health information. Vertical industry guidelines often govern data
privacy and data protection initiatives, as well as regulatory requirements of
various governing bodies and jurisdictions.
UNIT - IV 1
[CYBER SECURITY]
There are three key elements to keeping data safe: Data security, access control
and data protection.
Why is data privacy important?
The importance of data privacy is directly related to the business value of data.
The evolving data economy is driving businesses of all sizes to collect and store
UNIT - IV 2
[CYBER SECURITY]
more data from more sources than ever before. Data is used for a range of
business reasons, including the following:
Data privacy is a discipline intended to keep data safe against improper access,
theft or loss. It's vital to keep data confidential and secure by exercising
sound data management and preventing unauthorized access that might result
in data loss, alteration or theft.
For individuals, the exposure of personal data might lead to improper account
charges, privacy intrusion or identity theft. For businesses, unauthorized access
to sensitive data can expose intellectual property, trade secrets and confidential
communications; it can also adversely affect the outcome of data analytics.
Data privacy lapses, also referred to as data breaches, can have a serious effect
on all parties involved. Individuals affected by a data breach may find improper
financial and credit activity in their name, compromised social media accounts
and other issues. A business may face significant regulatory consequences, such
as fines, lawsuits, and irreparable damage to their brand and reputation. With
the integrity of its data compromised, a business may not be able to trust its
data and need a response plan.
UNIT - IV 3
[CYBER SECURITY]
In the U.S., laws and regulations concerning data privacy have been enacted in
response to the needs of a particular industry or section of the population.
Examples include:
UNIT - IV 4
[CYBER SECURITY]
While some U.S. data protection laws are enacted at the federal level, states
may also ratify and enact data privacy laws. Examples of state-level data privacy
laws include the following:
The EU has the General Data Protection Regulation (GDPR), which governs the
collection, use, transmission and security of data collected from residents of its
27-member countries. GDPR regulates areas such an individual's ability to
consent to provide data, how organizations must notify data subjects of
breaches and individual's rights over the use of their data.
UNIT - IV 5
[CYBER SECURITY]
Data privacy is a subset of data security. That is, data privacy can't exist without
data security.
UNIT - IV 7
[CYBER SECURITY]
New controls appear regularly, and they can change over time. This
presents a vast, complex and fluid regulatory landscape.
What are the benefits of data privacy compliance?
Proper data privacy compliance can yield four major benefits for a business,
including:
Lower storage costs. Storing all data forever can be costly and risky.
Companies that make rational decisions about what data to collect
and store, and implement the minimum retention time for that data,
reduce costs for primary and backup data storage.
Better data use. Data is time-sensitive. A business making better data
collection and retention decisions can benefit from timely and better-
quality data -- which translates into more accurate and relevant
analytical results.
Better business reputation and brand. The reputation of a business
can be as important as its product or service. A business that
successfully adopts and adheres to data privacy practices can
demonstrate care for customer data and data privacy, leading to a
better reputation and a stronger brand. Conversely, a business that
experiences a major data breach can suffer irreparable damage to its
reputation and brand.
Regulatory compliance. Proper data privacy compliance can protect a
business from the litigation and fines that come with data privacy
breaches.
DATA MINING
The data mining tutorial provides basic and advanced concepts of data mining.
Our data mining tutorial is designed for learners and experts.
Data mining is one of the most useful techniques that help entrepreneurs,
researchers, and individuals to extract valuable information from huge sets of
data. Data mining is also called Knowledge Discovery in Database (KDD). The
knowledge discovery process includes Data cleaning, Data integration, Data
UNIT - IV 8
[CYBER SECURITY]
Our Data mining tutorial includes all topics of Data mining such as applications,
Data mining vs Machine learning, Data mining tools, Social Media Data mining,
Data mining techniques, Clustering in data mining, Challenges in Data mining,
etc.
In other words, we can say that Data Mining is the process of investigating
hidden patterns of information to various perspectives for categorization into
useful data, which is collected and assembled in particular areas such as data
warehouses, efficient analysis, data mining algorithm, helping decision making
and other data requirement to eventually cost-cutting and generating revenue.
Data mining is the act of automatically searching for large stores of information
to find trends and patterns that go beyond simple analysis procedures. Data
mining utilizes complex mathematical algorithms for data segments and
evaluates the probability of future events. Data Mining is also called Knowledge
Discovery of Data (KDD).
Data Mining is a process used by organizations to extract specific data from huge
databases to solve business problems. It primarily turns raw data into useful
information.
UNIT - IV 9
[CYBER SECURITY]
There are many powerful instruments and techniques available to mine data
and find better insight from it.
Relational Database:
Data warehouses:
A Data Warehouse is the technology that collects the data from various sources
within the organization to provide meaningful business insights. The huge
amount of data comes from multiple places such as Marketing and Finance. The
extracted data is utilized for analytical purposes and helps in decision- making
for a business organization. The data warehouse is designed for the analysis of
data rather than transaction processing.
UNIT - IV 10
[CYBER SECURITY]
Data Repositories:
The Data Repository generally refers to a destination for data storage. However,
many IT professionals utilize the term more clearly to refer to a specific kind of
setup within an IT structure. For example, a group of databases, where an
organization has kept various kinds of information.
Object-Relational Database:
One of the primary objectives of the Object-relational data model is to close the
gap between the Relational database and the object-oriented model practices
frequently utilized in many programming languages, for example, C++, Java, C#,
and so on.
Transactional Database:
UNIT - IV 11
[CYBER SECURITY]
o It is a quick process that makes it easy for new users to analyze enormous
amounts of data in a short time.
UNIT - IV 12
[CYBER SECURITY]
These are the following areas where data mining is widely used:
Data mining in healthcare has excellent potential to improve the health system.
It uses data and analytics for better insights and to identify best practices that
will enhance health care services and reduce costs. Analysts use data mining
approaches such as Machine learning, Multi-dimensional database, Data
visualization, Soft computing, and statistics. Data Mining can be used to forecast
patients in each category. The procedures ensure that the patients get intensive
care at the right place and at the right time. Data mining also enables healthcare
insurers to recognize fraud and abuse.
UNIT - IV 13
[CYBER SECURITY]
Billions of dollars are lost to the action of frauds. Traditional methods of fraud
detection are a little bit time consuming and sophisticated. Data mining provides
meaningful patterns and turning data into information. An ideal fraud detection
system should protect the data of all the users. Supervised methods consist of a
collection of sample records, and these records are classified as fraudulent or
non-fraudulent. A model is constructed using this data, and the technique is
made to identify whether the document is fraudulent or not.
Apprehending a criminal is not a big deal, but bringing out the truth from him is
a very challenging task. Law enforcement may use data mining techniques to
investigate offenses, monitor suspected terrorist communications, etc. This
technique includes text mining also, and it seeks meaningful patterns in data,
which is usually unstructured text. The information collected from the previous
investigations is compared, and a model for lie detection is constructed.
Although data mining is very powerful, it faces many challenges during its
execution. Various challenges could be related to performance, data, methods,
UNIT - IV 14
[CYBER SECURITY]
and techniques, etc. The process of data mining becomes effective when the
challenges or problems are correctly recognized and adequately resolved.
The process of extracting useful data from large volumes of data is data mining.
The data in the real-world is heterogeneous, incomplete, and noisy. Data in huge
quantities will usually be inaccurate or unreliable. These problems may occur
due to data measuring instrument or because of human errors. Suppose a retail
chain collects phone numbers of customers who spend more than $ 500, and
the accounting employees put the information into their system. The person
may make a digit mistake when entering the phone number, which results in
incorrect data. Even some customers may not be willing to disclose their phone
numbers, which results in incomplete data. The data could get changed due to
human or system error. All these consequences (noisy and incomplete
data)makes data mining challenging.
Data Distribution:
UNIT - IV 15
[CYBER SECURITY]
Therefore, data mining requires the development of tools and algorithms that
allow the mining of distributed data.
Complex Data:
Performance:
Data mining usually leads to serious issues in terms of data security, governance,
and privacy. For example, if a retailer analyzes the details of the purchased
items, then it reveals data about buying habits and preferences of the customers
without their permission.
Data Visualization:
EMAIL SECURITY
Email security is the process of preventing email-based cyber attacks and
unwanted communications. It spans protecting inboxes from takeover,
protecting domains from spoofing, stopping phishing attacks, preventing fraud,
UNIT - IV 16
[CYBER SECURITY]
blocking malware delivery, filtering spam, and using encryption to protect the
contents of emails from unauthorized persons.
Security and privacy were not built into email when it was first invented, and
despite email's importance as a communication method, these are still not built
into email by default. As a result, email is a major attack vector for organizations
large and small, and for individual people as well.
Fraud: Email-based fraud attacks can take a variety of forms, from the
classic advance-fee scams directed at everyday people to business
email compromise (BEC) messages that aim to trick large enterprise
accounting departments into transferring money to illegitimate
accounts. Often the attacker will use domain spoofing to make the
request for funds look like it comes from a legitimate source.
Phishing: A phishing attack tries to get the victim to give the attacker
sensitive information. Email phishing attacks may direct users to a fake
webpage that collects credentials, or simply pressure the user to send
the information to an email address secretly controlled by the
attacker. Domain spoofing is also common in attacks like these.
UNIT - IV 17
[CYBER SECURITY]
Phishing often takes place over email. Phishers either try to trick people into
emailing information directly, or link to a webpage they control that is designed
to look legitimate (for instance, a fake login page where the user enters their
password).
UNIT - IV 18
[CYBER SECURITY]
An email security strategy can include several approaches for blocking phishing
attacks. Email security solutions can filter out emails from known bad IP
addresses. They can block or remove links embedded within emails to stop users
from navigating to phishing webpages. Or, they can use DNS filtering to block
these webpages. Data loss prevention (DLP) solutions can also block or redact
outgoing messages containing sensitive information.
Email attachments are a valuable feature, but attackers use this email capability
to send malicious content to their targets, including malware.
One way they can do this is by simply attaching the malicious software as an .exe
file, then tricking the recipient into opening the attachment. A far more common
approach is to conceal malicious code within an innocent-seeming document,
like a PDF or a Word file. Both these file types support the inclusion of code —
such as macros — that attackers can use to perform some malicious action on
the recipient's computer, like downloading and opening malware.
UNIT - IV 19
[CYBER SECURITY]
What is spam?
Spam is a term for unwanted or inappropriate email messages, sent without the
recipient's permission. Almost all email providers offer some degree of spam
filtering. But inevitably, some spam messages still reach user inboxes.
Spammers gain a bad "email sender reputation"* over time, leading to more and
more of their messages getting marked as spam. For this reason they are often
motivated to take over user inboxes, steal IP address space, or spoof domains in
order to send spam that is not detected as spam.
Individuals and organizations can take several approaches to cut down on the
spam they receive. They can reduce or eliminate public listings of their email
addresses. They can implement a third-party spam filter on top of the filtering
provided by their email service. And they can be consistent about marking spam
emails as spam, in order to better train the filtering they do have.
Attackers can use a stolen inbox for a wide range of purposes, including sending
spam, initiating phishing attacks, distributing malware, harvesting contact lists,
or using the email address to steal more of the user's accounts.
UNIT - IV 20
[CYBER SECURITY]
Spyware: The attacker may have already infected the user's device
and installed spyware to track everything they type, including their
email username and password.
Encryption is the process of scrambling data so that only authorized parties can
unscramble and read it. Encryption is like putting a sealed envelope around a
letter so that only the recipient can read the letter's contents, even though any
number of parties will handle the letter as it goes from sender to recipient.
Encryption is not built into email automatically; this means sending an email is
like sending a letter with no envelope protecting its contents. Because emails
often contain personal and confidential data, this can be a big problem.
UNIT - IV 21
[CYBER SECURITY]
Just as a letter does not instantly go from one person to another, emails do not
go straight from the sender to the recipient. Instead, they traverse multiple
connected networks and are routed from mail server to mail server until they
finally reach the recipient. Anyone in the middle of this process could intercept
and read the email if it is not encrypted, including the email service provider.
However, the most likely place for an email to be intercepted is close to the
origin of the email, via a technique called packet sniffing (monitoring data
packets on a network).
The Domain Name System (DNS) stores public records about a domain,
including that domain's IP address. The DNS is essential for enabling users to
connect to websites and send emails without memorizing long alphanumeric IP
addresses.
There are specialized types of DNS records that help ensure emails are from a
legitimate source, not an impersonator: SPF records, DKIM records, and DMARC
records. Email service providers check emails against all three of these records
to see if they are from the place they claim to be from and have not been altered
in transit.
UNIT - IV 22
[CYBER SECURITY]
UNIT - IV 23
[CYBER SECURITY]
Incident management teams use several tools and technologies to help them
respond appropriately to incidents. Some of the most common tools include:
Intrusion detection systems. These systems detect and react to
security incidents. They often have features such as real-time alerts and
reporting.
Netflow analyzers. These tools help incident managers understand the
traffic flowing in and out of their network. This information can identify
malicious activity and quickly respond to incidents.
Vulnerability scanners. These scanners help identify vulnerabilities in
an organization’s systems and networks. This information can be used
to fix the vulnerabilities and prevent future incidents.
Availability monitoring. This type of monitoring helps incident
managers track the availability of critical systems and applications. This
information can be used to quickly identify and resolve incidents
affecting business operations.
Web proxies. A web proxy is a server positioned between the client
and the target server. It intercepts all requests from the client and
forwards them to the target server. This can be used to monitor traffic
and block access to specific websites.
Security information and event management (SIEM) tools. SIEM tools
collect and analyze incident security data across an organization. This
can help incident managers quickly identify and mitigate any potential
threats.
Threat intelligence. Threat intelligence is information about current or
emerging threats that can impact an organization. It can be leveraged
to help incident managers stay ahead of any potential attacks and
protect their business.
How to Create an Effective Incident Management Plan
UNIT - IV 24
[CYBER SECURITY]
UNIT - IV 25
[CYBER SECURITY]
SECURITY PLANNING
A cyber security plan is the centerpiece of any effort to defend against attacks
and mitigate risk in IT environments. Cyber security plans cover the strategy,
policy, procedures, and technologies your organization will rely on when seeking
to heighten cyber risk management and implement successful security
programs.
Data and metrics are critical to every cyber security plan. By providing greater
visibility into the attack surface and measuring the effectiveness of security
controls, data and metrics enable your security leaders to focus resources on
addressing the largest areas of risk while benchmarking performance against
competitors and peers.
BitSight provides a suite of cyber security and risk management solutions that
help organizations create, measure, and refine effective and efficient cyber
security plans. With BitSight, cyber security risk management teams have the
objective, verifiable information they need to confidently make informed
decisions and drive data-driven conversations about security and risk.
Data breach response plans are highly customized to the needs of each
organization, but there are several tasks that must be included in this kind of
cyber security plan for every business.
UNIT - IV 26
[CYBER SECURITY]
Like every other part of a cyber security plan, a data breach response plan relies
on superior metrics. When a breach is detected, BitSight metrics can help
identify where vulnerabilities are present in the network, helping to speed
remediation. After remediation, BitSight cyber risk monitoring tools can help to
see if problems in systems have been truly addressed or if vulnerabilities are still
present in your network.
BitSight is the most widely adopted Security Ratings solution in the world.
BitSight ratings offer a data-driven, dynamic measurement of the cybersecurity
performance of an organization and its third-party vendors. BitSight analyzes
vast amounts of externally observable data to produce daily security ratings that
range from 250 to 900. The higher the rating, the more effective the company’s
security practices the lower the likelihood of a breach.
UNIT - IV 27
[CYBER SECURITY]
BitSight Security Ratings provide the data and metrics security leaders need
when crafting a cyber security plan or cyber risk management framework.
BitSight’s data can help to identify risk throughout an organization’s attack
surface or vendor ecosystem. Additionally, BitSight can measure the
effectiveness of controls selected to mitigate risk and improve security, and
benchmark an organization’s performance against peers and competitors.
Ultimately, BitSight provides the clear, objective, and continuous data that
security leaders need to refine their cyber security risk management process.
The BitSight Security Ratings platform offers a suite of solutions that security
leaders can take advantage of when crafting cyber security plans.
UNIT - IV 28
[CYBER SECURITY]
UNIT - IV 29
[CYBER SECURITY]
outline the actions that should be taken to minimise business disruption during
a cyber emergency.
For example in the case of a cyber attack, a Business Continuity plan may focus
on ensuring essential computer systems remain usable and securing important
data to allow employees to continue working. A Disaster Recovery plan may
include instructions for recovering data or making a website accessible following
a Distributed Denial of Service attack.
Business continuity and disaster recovery in cyber security should follow the
same principles as any business continuity or disaster recovery plan, but with an
awareness of the specific risks of a cyber attack or breach. Here are the steps
you should take:
UNIT - IV 30
[CYBER SECURITY]
The first step is deciding who to include in your team. This should include
people from across the business, including your IT team and Senior
Leadership. Each member should have clearly delegated roles and
responsibilities, as this removes ambiguity and therefore downtime in a
crisis.
This is where you will outline all the possible risks to your business that
relate to a cyber-attack or breach. It’s important to consider the impact
that the different types of cyber-attacks could have, and the potential
regulatory implications of a data breach. It’s also crucial to audit all parts
of your supply chain for cyber risk, as a cyber breach from one of your
suppliers or partners could put your business at risk and vice versa.
Once you have identified all the major cyber risks to your business, you
should perform a business impact analysis. This is an opportunity to
identify each business impact that could be caused by the disruption of
business functions and processes. This analysis will help you determine
recovery strategies and which functions and processes should take
priority – typically the ones with the highest operational and financial
impacts.
Once plans are in place, it’s important to test your systems to determine
if you need to adapt or review your current plans. This will allow you to
refine your plans and systems before a cyber breach or attack occurs.
UNIT - IV 31
[CYBER SECURITY]
Cybersecurity measures
There are many measures a business can take to protect against cyber attacks
including keeping antivirus software and firewalls up to date, using VPNs for
encrypted data transfer and remote file access, enforcing secure password
policies and multifactor authentication.
UNIT - IV 32
[CYBER SECURITY]
Penetration testing can also be a useful tool to help you stay ahead of cyber
criminals. By identifying vulnerabilities in your IT Infrastructure, you can fix any
issues before a hacker gains access to your systems
Penetration testing can take the form of Black Box, White Box and Grey Box
testing:
White Box – the tester has knowledge of the IT architecture and systems, and
will use these to test and analyse any potential weaknesses.
Grey Box – the tester has some knowledge of the systems, and will use the
limited information they have to find potential vulnerabilities or security holes.
Cyber insurance
Even with robust cybersecurity and the best business continuity plans in place,
a cyber breach or attack may still occur leaving your business liable to pay out-
of-pocket for a range of costs and liabilities including data and system recovery,
notification costs, reputational damage and even legal liabilities.
Both cyber liability and cyber crime insurance cover will help your business
offset the costs of recovery after a cyber-related security breach, loss of data, a
ransomware attack or a similar event. A comprehensive cyber insurance policy
will provide financial compensation for the direct costs incurred, and any
liabilities payable to third parties following a cyberattack, a data breach or loss
of data.
UNIT - IV 33
[CYBER SECURITY]
Many insurers’ policies also offer significant additional value in terms of Cyber
Breach Response Support which is an invaluable resource when dealing with
cyber-attacks.
HANDLING INCIDENTS
DEFINITION
Today, Benjamin Franklin might say the only certainties are death, taxes and
cyber attacks. Research suggests critical security incidents are all but inevitable,
thanks to both criminal ingenuity on the attacker's side and human error on the
user's side. A reactive, disorganized response to an attack gives bad actors the
upper hand and puts the business at greater risk. At worst, the financial,
UNIT - IV 34
[CYBER SECURITY]
operational and reputational damage from a major security incident could force
an organization to go out of business.
UNIT - IV 35
[CYBER SECURITY]
Password attacks.
Web application attacks.
Advanced persistent threats.
But since all security events are not equally serious -- and enterprises simply do
not have the resources to aggressively address each and every one -- incident
response requires prioritization. Weigh an incident's urgency and importance to
determine if it warrants a full-fledged response. For example, an active
ransomware attack is both urgent (i.e., time-sensitive) and important (i.e., it
puts critical IT assets and business continuity at risk). Such an attack logically
warrants a major, expedited response.
Learn more about the top cybersecurity threats enterprises face today.
UNIT - IV 36
[CYBER SECURITY]
UNIT - IV 37
[CYBER SECURITY]
A plan overview.
A list of roles and responsibilities.
A list of incidents requiring action.
The current state of network infrastructure and security controls.
Detection, investigation and containment procedures.
Eradication procedures.
Recovery procedures.
The breach notification process.
A list of post-incident follow-up tasks.
A contact list.
Incident response plan testing.
Ongoing revisions.
UNIT - IV 38
[CYBER SECURITY]
After both simulated and real security incidents, response teams should study
what happened and review lessons learned. Note any security gaps that
emerged, recommend appropriate additional controls, brainstorm ways to
improve processes and update the incident response plan accordingly.
Well-known frameworks from NIST, SANS Institute, ISO and ISACA all differ
slightly in their approaches, yet they each describe similar phases of incident
response:
UNIT - IV 39
[CYBER SECURITY]
These acronyms are often used interchangeably in the field, and the teams
generally have the same goals and responsibilities. One important note is that
the name CERT is a registered trademark of Carnegie Mellon University, so
companies must apply for authorization to use it.
UNIT - IV 40
[CYBER SECURITY]
UNIT - IV 41
[CYBER SECURITY]
UNIT - IV 42
[CYBER SECURITY]
UNIT - IV 43
[CYBER SECURITY]
can make incident detection and investigation more difficult or even impossible,
depending on the deployment.
Cloud incident response may also require new tools and skill sets, as well as a
deeper knowledge of cloud security incidents and threats. Traditional tools may
not work properly -- or at all -- in cloud environments. New tools and procedures
not only add to what incident response teams must learn and manage but may
also require extra budget.
Learn more about cloud incident response, including the Cloud Security
Alliance's framework and best practices for including cloud in incident response
programs.
As Benjamin Franklin once said, "The best investment is in the tools of one's own
trade." In the case of incident response, this involves many tools, typically
categorized by their prevention, detection or response functionalities.
Antimalware.
Backup and recovery tools.
Cloud access security broker.
Data classification tools.
Data loss prevention.
DoS mitigation.
UNIT - IV 44
[CYBER SECURITY]
Managing all these tools can be a lot for a security team to handle. Many
organizations are turning to automation in incident response to reduce alert
fatigue, perform alert triage, automatically investigate and respond to threats,
automate ticketing and alerting, conserve human efforts for more high-value
activities, respond and resolve issues faster, automate case management and
reporting, and save money.
Service providers often offer incident response services, such as the following,
on retainer or on an emergency basis:
UNIT - IV 45
[CYBER SECURITY]
SOAR is one of the newest tools to join the incident response arsenal. As such,
confusion surrounds what it is and what it does. Its capabilities sound similar to
those of SIEM, adding to the confusion.
UNIT - IV 46
[CYBER SECURITY]
The four components of SOAR tools enable teams to collect, analyze, find and
respond to security incidents.
SIEM systems' operations are similar to SOAR platforms, but they lack a key
feature: automated response. SIEMs simply alert teams about potential
incidents; they do not trigger automated actions. SIEMs and SOARs have similar
mean time to detect, but SOARs excel with mean time to respond, thanks to
their automated capabilities.
In these use cases, SOAR platforms can help improve productivity; automate
repetitive, tedious and low-importance tasks; use existing security tools better
and more contextually; and improve third-party tool integration, among other
benefits. SOAR platforms aren't without challenges, however. Namely, SOARs
may not be able to integrate with all security tools easily or at all, do not address
security culture within an organization and may fail to live up to inflated user
expectations.
RISK ANALYSIS
Risk analysis refers to the review of risks associated with the particular action or
event. The risk analysis is applied to information technology, projects, security
issues and any other event where risks may be analysed based on a quantitative
and qualitative basis. Risks are part of every IT project and business
organizations. The analysis of risk should be occurred on a regular basis and be
updated to identify new potential threats. The strategic risk analysis helps to
minimize the future risk probability and damage.
Every organization needs to understand about the risks associated with their
information systems to effectively and efficiently protect their IT assets. Risk
analysis can help an organization to improve their security in many ways. These
are:
Getting the input from management and department heads is critical to the risk
assessment process. The risk assessment survey refers to begin documenting
the specific risks or threats within each department.
UNIT - IV 49
[CYBER SECURITY]
Once the risks are evaluated and identified, the risk analysis process should
analyse each risk that will occur, as well as determine the consequences linked
with each risk. It also determines how they might affect the objectives of an IT
project.
After analysis of the Risk that provides an idea about which assets are valuable
and which threats will probably affect the IT assets negatively, we would
develop a plan for risk management to produce control recommendations that
can be used to mitigate, transfer, accept or avoid the risk.
The primary goal of this step is to implement the measures to remove or reduce
the analyses risks. We can remove or reduce the risk from starting with the
highest priority and resolve or at least mitigate each risk so that it is no longer a
threat.
This step is responsible for monitoring the security risk on a regular basis for
identifying, treating and managing risks that should be an essential part of any
risk analysis process.
UNIT - IV 50
[CYBER SECURITY]
UNIT - IV 51
[CYBER SECURITY]
Disaster recovery starts with an inventory of all assets like computers, network
equipment, server, etc. and it is recommended to register by serial numbers too.
We should make an inventory of all the software and prioritize them according
to business importance.
An example is shown in the following table −
You should prepare a list of all contacts of your partners and service providers,
like ISP contact and data, license that you have purchased and where they are
purchased. Documenting all your Network which should include IP schemas,
usernames and password of servers.
Preventive steps to be taken for Disaster Recovery
The server room should have an authorized level. For example: only
IT personnel should enter at any given point of time.
In the server room there should be a fire alarm, humidity sensor,
flood sensor and a temperature sensor.
These are more for prevention. You can refer the following image.
UNIT - IV 52
[CYBER SECURITY]
At the server level, RAID systems should always be used and there
should always be a spare Hard Disk in the server room.
You should have backups in place, this is generally recommended
for local and off-site backup, so a NAS should be in your server
room.
Backup should be done periodically.
The connectivity to internet is another issue and it is recommended
that the headquarters should have one or more internet lines. One
primary and one secondary with a device that offers redundancy.
If you are an enterprise, you should have a disaster recovery site
which generally is located out of the city of the main site. The main
purpose is to be as a stand-by as in any case of a disaster, it
replicates and backs up the data.
UNIT - IV 53