Security Assignment
Security Assignment
Security Assignment
• Constructive?
Y/N
• Linked to relevant assessment
criteria? Y/N
Give details:
Internal Verifier
Date
signature
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous
page as your cover sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and
Page Number on each page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your
assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for the compulsory
information. eg: Figures, tables of comparison etc. Adding text boxes in the body except for the
before mentioned compulsory information will result in rejection of your work.
2. Carefully check the hand in date and the instructions given in the assignment. Late submissions
will not be accepted.
3. Ensure that you give yourself enough time to complete the assignment by the due date.
4. Excuses of any nature will not be accepted for failure to hand in the work on time.
5. You must take responsibility for managing your own time effectively.
6. If you are unable to hand in your assignment on time and have valid reasons such as illness, you
may apply (in writing) for an extension.
7. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
8. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then
be asked to complete an alternative assignment.
9. If you use other people’s work or ideas in your assignment, reference them properly using
HARVARD referencing system to avoid plagiarism. You have to provide both in-text citation and
a reference list.
10. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be
reduced to A REFERRAL or at worst you could be expelled from the course
Student Declaration
I hereby, declare that I know what plagiarism entails, namely to use another’s work and to
present it as my own without attributing the sources in the correct way. I further understand
what it means to copy another’s work.
Table of Contents
1 Task .............................................................................................................................. 8
1.1 Impact of CIA in EMC Cyber in order to improve the organizations security ..... 8
1.3.1 Danger things that are EMC Cloud Solution must aware for the IT Security.
19
1.4 Development of Security Procedures to Minimize the Impact for the IT Security.
27
1.4.2 Security procedures that can be used to minimize the impact of the EMC
Cloud Solution. .......................................................................................................... 28
2 Task ............................................................................................................................ 33
2.1 EMC Cyber and its clients will be impacted by improper/ incorrect
configurations. ............................................................................................................... 33
2.2 How DMZ, Static IP and NAT Helps To a Trusted Network in EMC ............... 43
3 Task ............................................................................................................................ 49
3.1 Risk management procedure for EMC Cyber solutions to safeguard itself and its
clients 49
3.2 Mandatory Data Protection laws and procedures, which will be, applied to data
storage solutions provided by EMC Cloud .................................................................... 71
4 Task ............................................................................................................................ 82
4.2 Develop and present a disaster recovery plan for EMC Cloud ........................... 93
4.2.2 Implementing Security Audit Recommendations for the Organization. ... 104
Table of Figures
Figure 1 CIA Triad ............................................................................................................... 8
Figure 2 Cyber Security ..................................................................................................... 10
Figure 3 Types of cyber security attacks ........................................................................... 13
Figure 4 Active attack ........................................................................................................ 20
Figure 5 Passive Attacks .................................................................................................... 22
Figure 6 Threats, Vulnerabilities, Risks, and Counter-measures ....................................... 23
Figure 7 Risk Management Process ................................................................................... 30
Figure 8 Firewall ................................................................................................................ 33
Figure 9 Virtual Private Network....................................................................................... 36
Figure 10 Network Monitoring System ............................................................................. 39
Figure 11 Solar Winds NPM .............................................................................................. 42
Figure 12 Demilitarized Zone ............................................................................................ 44
Figure 13 Static IP.............................................................................................................. 45
Figure 14 Network Address Translation ............................................................................ 47
Figure 15 Risk Matrix ........................................................................................................ 57
Figure 16 Risk Rating ........................................................................................................ 57
Figure 17 IT Security Audit ............................................................................................... 62
Figure 18 data Protection ................................................................................................... 71
Figure 19 Data Protection Act of 1998 .............................................................................. 72
Figure 20 Data Protection act of 2018 ............................................................................... 74
Figure 21 ISO 31000 .......................................................................................................... 79
Figure 22 Introduction slide ............................................................................................... 93
Figure 23 Introduction about EMC Cyber ......................................................................... 93
Figure 24 Definition of ISO ............................................................................................... 94
Figure 25 Cover Slide of Disaster Recovery Plan ............................................................. 94
Figure 26 Contents of Presentation .................................................................................... 95
Figure 27 Goal of Presentation .......................................................................................... 95
Figure 28 explanation of Disaster ...................................................................................... 96
Figure 29 examples for types of disaster ........................................................................... 96
Figure 30 Disaster Recovery Plan ...................................................................................... 97
Figure 31 Types of Disaster ............................................................................................... 97
Figure 32 Disaster Recovery Plan ...................................................................................... 98
Table of Tables
Table 1 Difference between Active and Passive Attacks................................................... 23
Table 2 EMC Cyber Procedure Chart ................................................................................ 53
Table 3 Probability Levels and their description ............................................................... 56
Table 4 System Failure ...................................................................................................... 58
Table 5 Uncertain Base Risk .............................................................................................. 58
Table 6 Hardware and Software errors .............................................................................. 59
Table 7 Internet Problems .................................................................................................. 59
Table 8 inside and outside threats ...................................................................................... 61
Table 9 Financial Problems................................................................................................ 61
Table 10 Physical Problems ............................................................................................... 62
Table 11 IT Security Audit of EMC Cyber........................................................................ 65
Table 12 IT Security Audit for Organizations Policies & Procedures ............................... 66
Table 13 IT Security Audit for Basic network controls ..................................................... 66
Table 14 IT Security Audit for Wireless and remote access.............................................. 67
Table 15 IT Security Audit for Network Servers ............................................................... 67
Table 16 IT Security Audit for Encryption ........................................................................ 68
Table 17 IT Security Audit for Access Control ................................................................. 69
Table 18 Computer misuse law's offence and penalty ....................................................... 77
ACKNOWLEDGEMENT
I would like to express my deepest appreciation to all those who provided me the Possibility
to complete this assignment a special gratitude I give to our lecturer Mr.E.Janarthanan
Whose contribution in stimulating suggestions and encouragement, Helped to me
coordinate my project especially in writing this assignment documentation.
Furthermore, I would also like to acknowledge with much appreciation of the crucial rote
of the staffs of ESOFT campus. Who gave the permission to use all required equipment’s
and the Necessary materials to complete this assignment. I have to appreciate the guidance
given by the assignment coordinator Mr. S. Premnath. In addition, other Lecturers of
ESOFT campus Jaffna Branch that has improved my working skills and thanks to their
Comment and advices.
S. Pakeen
HND in computing & Systems Development
ESOFT Metro Campus Jaffna
1 Task
1.1 Impact of CIA in EMC Cyber in order to improve the organizations security
1.1.1 CIA Triad
Confidentiality
Confidentiality ensures the confidentiality of confidential information as it travels over the
network. There are some proactive steps that need to be taken to prevent unauthorized
disclosure of sensitive data and allow access only to intended parties. Malicious agents
should not intercept data for nefarious purposes. Several implementations can be included
to ensure data confidentiality.
Cryptography is the best solution in this regard. Encryption primarily ensures the
confidentiality of confidential data. It converts plain text of data to cipher text, unreadable
by humans. The encrypted text can only be understood by authorized persons. Encryption
includes two vital security elements, including symmetric encryption and asymmetric
encryption. The use of strong passwords and two-way authentication are some of the other
privacy practices. In addition, you can also use steganography to hide data in other types
of data, such as images, audio files, or videos. It is very difficult to compromise the hiding
of sensitive data in large media files.
Integrity
Integrity means preventing unauthorized access, modification or alteration of data for
malicious purposes. The authorized party unchanged and unchanged must receive this
means that the data sent. Integrity is important to data, whether it is in transit or in storage.
Data integrity is critical for commercial and e-commerce websites. Various attacks that
compromise data integrity include Man-In-the-Middle (MITM) attack, web server
penetration, and injection of malicious code into databases.
Developers often provide the use of hashing algorithms like MD5 and SHA1 to verify data
integrity. Other methods include certificates, digital signatures, and non-repudiation.
Availability
Availability is also a security service that ensures that resources and services are always
available only to authorized parties within a specified time frame. It is necessary to maintain
reliable equipment in order to provide stable service to a large number of customers in any
organization. There should be less downtime during upgrades, and backing up sensitive
data to external drives comes in handy in case of data loss.
In the worst case, you should follow the rapid disaster recovery plans. Other important
security measures to ensure availability include data backups, patches, and backups.
Redundancy provides fault tolerance. This means that when the main system is not
working, the auxiliary machine is available to continue providing functions and services.
In this case, security analysts redirect all traffic or workload to the backup system.
Importance of CIA Triad in Cybersecurity
Security breaches and data theft are now a headache in business. Recent reports and surveys
reflect an ugly picture of the organization's cybersecurity state. The focus is on the recent
Facebook data breach scandal, in which the personal data of millions of users was
compromised. Most companies have data unprotected due to poor policies that can lead to
data breaches and severe fines due to compliance issues, such as the GDPR - General Data
Protection Regulation. To prevent this situation, organizations must implement the
aforementioned security measures along with various other controls (such as SIEM and
SOAR) to improve their position in the cybersecurity field.
1.2 EMC Cyber in order to improve the organization’s security.
1.2.1 Definition of Cyber Security
Cybersecurity can be described as collective methods, technologies, and processes that help
protect the confidentiality, integrity, and availability of computer systems, networks, and
data from cyber-attacks or unauthorized access. The main goal of cybersecurity is to protect
all assets of an organization from external and internal threats, as well as from disruptions
caused by natural disasters. Because an organization's assets are composed of multiple
disparate systems, an effective and efficient cybersecurity posture requires a coordinated
effort across all of our information systems. (synopsys, 2021)
As technology advanced, the dark web became more complex. It has become a haven for
cybercriminals and has increased the threat to ground-based Internet use. These
vulnerabilities have increased the importance of cybersecurity. (hakin9, 2021)
Phishing attack
A phishing attack is a combination of technical tricks and social engineering in which an
attacker sends an email that simulates sending from a trusted source. A phishing attack is
carried out in order to obtain personal information about a person or to persuade him to
take certain actions. The email may contain a link to a website that can receive data from
the user. In addition, it sends data to an attacker who can redirect the user to another website
that might host malware. In addition, emails may contain malware attachments that, when
loaded, can infect the system and reveal sensitive information stored on the computer,
making it vulnerable. In this attack, personal information mainly includes login credentials,
credit card numbers, or salary information. Since the end of February 2020, the number of
targeted phishing attacks has grown by 667%. The Barracuda Sentinel discovered it. A total
of 467,825 such attacks were detected, of which 9,116 were related to COVID-19. Whereas
in February only 1,188 such attacks were detected, and in January - 137.
Denial of Service (DoS) Attack
A denial of service attack is mainly aimed at shutting down servers or making them too
busy to be able to serve their users' requests. In this type of attack, the attacker uses more
machines that constantly flood the server with requests. Its purpose is to make the user too
busy to serve these bogus requests so that they don't have time to serve legitimate requests.
To do this, attackers acquire a huge number of machines, infecting several machines around
the world with their malware, so that they have access to each machine. In some cases,
when the load is too high, it can also cause the servers to crash. However, these attacks do
not benefit the attacker in any way, since they cannot steal confidential and sensitive
information from the server. Rather, they can simply keep it busy so that legitimate users
cannot use its services. In some cases, these attacks are also used as a distraction from
several other attacks. This is also due to the fact that when an organization starts focusing
on the server down, they forget to keep their server secure. Attackers using a recent
COVID-19 DoS attack attempted to disable the US Department of Health and Human
Services (HHS) website in order to deprive citizens of public information about the
pandemic. However, the website continued to function normally, although performance
slightly decreased, but it was able to serve requests under increased load.
Vishing Attack
This is another form of phishing attack, in which an attacker makes phone contact with a
customer to obtain their personal information, claiming to be a real user. More often than
not, attackers claim to be employees of an insurance company in order to obtain the user's
bank details. The attacker uses bogus strategies to trick the client into passing on basic
information to inauthentic objects. In this type of phishing attack, the attacker tries to trick
his customers with SMS messages and fake voice calls.
Viruses
Viruses are malicious programs that contain malicious code, the purpose of which is to
disrupt the normal operation of computer systems. The virus can create its own replicas in
the user's system for infection. In addition, it can be attached to a file on another computer
system, that is, it can be distributed. After the user's file is damaged, it steals all the
information contained in the file. And it is possible that the file will contain the user's bank
account details, which could be damaged by an intruder. The virus cannot work without the
main program, because it is he who looks for other files in the system that are not infected
in order to steal information contained in such files.
Malware Attacks
Malware attacks are mainly carried out using malicious code that can disrupt the entire
network, including the server and its clients. It gives attackers access to confidential
information and control over the machine. This is more dangerous because it can be on the
network without being monitored for a long time, thus intercepting data from packets and
causing internal information damage due to leakage of their information. It is even
considered deadly, as it can mimic as legitimate code and spread itself over the network,
thus spreading to all devices connected to the network. On April 20, 2020, an American IT
company was attacked by the ransomware Maze, which encrypted all of their data and sent
emails to customers with an IP address and a file. He blocked the organization's access to
their systems and encrypted the data. In addition, he stole the organization's data, as a result
of which the confidentiality of customer data was breached. It could not be deciphered and
the organization could not gain access until it paid the requested ransom amount.
SQL injection Attack
As the name suggests, it is an attack on database-driven websites. When the SQL injection
is successful, it gives the attacker access to sensitive information such as login credentials,
billing information, and personal information of customers along with employees. This
attack is carried out using SQL commands that are inserted into the database to perform
certain operations on the database. This can be of immense benefit to an attacker, as he can
steal information and sell it for huge profits, or take advantage of information leaks over
the Internet. In some cases, attackers also delete data, causing significant damage to the
organization. In 2016, a SQL injection attack was carried out on the Illinois Election
Commission, which compromised the data of 200,000 citizens. As a result, the server was
shut down for 10 days in order to repair the server and fix vulnerabilities and flaws.
Man in the Middle Attack
This is a type of cybersecurity breach in which an attacker intercepts the transmission of
packets between a client and a server, and each of them knows that their conversations are
being tapped. This allows an attacker to gain access to certain information that would
otherwise be unavailable. In addition, an attacker can capture and modify a packet before
it is sent to its intended destination. A logistics organization in Mumbai, India, was the
victim of an unknown attacker and allegedly lost $ 16,000. The attacker used the MITM
technique to intercept the payment the company was about to receive by hacking into their
official account.
Password Attack
These include attack attempts by malicious hackers to gain unauthorized access to the
corporate security system. Hackers can use some password cracking or security scanner
tools to gain access. Most of the time, these password cracking tools are used in login
procedures to give a false access to the user's account to steal the user's credentials and
other information.
Brute force attack
A brute force attack is a network attack in which an attacker overpowers the system and
tries to gain access to the system by force, that is, tries to use all possible methods and
passwords. The procedure is performed until the correct access token is found and access
to the account is obtained. It is used in conjunction with vocabulary software, which allows
it to sample thousands of vocabulary words, making every possible combination. However,
the attack is not entirely effective, since if the other side finds out about such a brute force,
in the meantime it can increase its security, thus repelling the attack. TaoBao, a subsidiary
of the Alibaba Group, has been the victim of a massive brute-force attack that has hacked
up to 21 million accounts. It was found that the attackers used a database of 99 million
accounts. As a result, the company hacked 1 out of every 5 accounts, that is, 10.6 million
accounts.
Spyware and Key loggers
Spyware is a type of malware attack that aims to identify activities performed on the
victim's computer system. On the other hand, there is another malware called Key loggers,
which aims to record all keystrokes pressed by victims. This may include details about
password, login, bank account or other important information that could be compromised
with this backend registration program. Basically, these spyware and Key loggers work by
entering the user's system after the user uploads or downloads any corrupt files from
malicious websites. Because these spyware and key logger programs are already present in
the user's system. Therefore, it can cause this important information along with the user's
browser history to be shared with the malicious hacker who might be controlling all this
activity at his own end. Also, the hacker can sell this information to a third-party vendor. It
can also use customer information to make fraudulent transactions over bank account
information. It may also be possible for the hacker to leak this data on the dark net, which
could be exploited by anyone.
Cross site Scripting (XoS)
The attack is an injection vulnerability in which well-known websites are used as hosts and
malicious scripts are sent through them because people usually trust the content from those
websites. This feat is achieved by attaching malicious code to the dynamic content of the
website. Here, the target browser executes the JavaScript code snippets, which are then sent
to the victim's browser. This is due to active vulnerabilities on the host site. In 2018, British
Airways was hit by a data breach that used a cross-site scripting attack. Between August
21st and September, it affected almost 380,000 booking transactions. The hack affected
both mobile app users and website users.
Advantages of cyber security
Cybersecurity as an exercise is very useful. In addition to protecting users from possible
cyber-attacks, it also warns against potential risks. Below is a list of the benefits of
cybersecurity.
It protects personal and confidential data of individuals and organizations against
theft.
The main advantage that can be achieved by using these effective cybersecurity
mechanisms is the protection of networks from various rogue nodes trying to gain
unauthorized access to the network.
The most important aspect is that it increases the security of the system in
cyberspace.
This eliminates the risk of compromised computers, reducing the risk of system
freezing and crashing.
This improves overall safety mechanisms with an advanced knowledge structure
and leads to smooth business management.
Identifies vulnerabilities and weak targets that could help an attacker attack a
system or server. These identification vulnerabilities can help teams secure systems
to prevent such attacks.
It protects your system from spyware, viruses, malware, Trojans, worms and some
other unwanted infectious programs.
This gives the user and organizations much-desired privacy as it protects their
personal information that might hurt their feelings in the event of a leak.
1.3.1 Danger things that are EMC Cloud Solution must aware for the IT Security.
• Unauthorized access
• Use
• Disclosure Disruption
• Modification
• Inspection Recording
• The destruction of information
As described above, EMC Cyber can face a number of threats. It’s not only about not
stealing something, it’s much more.
An attack is any behavior that destroys the protection of an organization's own data. These
attacks can be narrowly classified, at the highest level, as:
Active Attack
Passive Attack
1. A random session key can be generated that is valid for only one transaction at a
time and should effectively prevent an attacker from retransmitting the original
message after the original session has expired.
2. Using a one-time password helps authenticate transactions and conversations
between communicating parties. This ensures that the associated password expires
even if the attacker successfully logs and forwards the intercepted message.
3. The Kerberos authentication protocol (usually used in Microsoft Windows Active
Directory) is used, which supports various countermeasures against different types
of replay attacks. (venafi, 2021)
In today's world, data and its protection are critical issues for businesses. Customers want
to make sure their information is safe with company, and if organization can't keep it safe,
they'll lose their business. Many customers with sensitive information want you to have a
solid data security infrastructure before doing business with organization.
How confident EMC Cyber organization's IT security in this environment?
To have a strong grasp of data security issues that could potentially impact business, it is
imperative to understand the interrelationships of the three components:
1. Threats
2. Vulnerabilities
3. Risk
Although these technical terms are used interchangeably, they are different terms with
different meanings and consequences. Let's have a look.
1.3.2.1 Threats
A threat refers to a new or newly discovered event that has the potential to harm a system
or your company in general. There are three main types of threats:
Natural threats such as floods, hurricanes or tornadoes
Unintentional threats, such as an employee accidentally accessing false
information
Intentional threats such as spyware, malware, adware companies, or the actions
of a disgruntled employee
Worms and viruses are classified as threats because they can harm your organization by
being subject to an automated attack, as opposed to a human attack. Finally, on May 12,
2017, the WannaCry Ransomware Attack began bombing computers and networks around
the world and has since been described as the largest attack of its kind. As seen in the 2017
Internet Security Threat Report, cybercriminals are constantly finding creative new ways
to compromise your data.
These threats are uncontrollable and can often be difficult or impossible to detect
beforehand. However, certain precautions will help you assess threats regularly so you can
be better prepared should a situation arise. Here are some ways to do this:
Keep the team members aware of current trends in cybersecurity so they can
quickly detect new threats. They should subscribe to blogs (like Wired) and
podcasts (like Techgenix Extreme IT) that cover these topics, and they should be
members of professional associations so they can benefit from breaking news feeds,
conferences, and webinars.
Perform regular threat assessments to determine the best approaches to
protecting a system against a particular threat and to evaluate different types of
threats.
Perform penetration testing by modeling real-world threats to discover
vulnerabilities.
1.3.2.2 Vulnerability
Vulnerabilities are known asset (resource) weaknesses, which can be exploited by one or
more attackers. In other words, this is a known issue that allows the attack to be successful.
For example, when a team member resigns and you forget to disable their access to external
accounts, change their login information, or remove their name from their corporate credit
card, this can leave your company vulnerable to both intentional and unintentional threats.
However, automated attackers exploit most vulnerabilities, not by manual entry at the other
end of the network.
Vulnerability testing is essential to ensure ongoing system security. By identifying
weaknesses, you can develop a strategy for a quick response. Here are some questions to
ask yourself when identifying your vulnerabilities:
Has your data been backed up and stored in a secure off-site location?
Is your data stored in the cloud? If so, how does the cloud prevent vulnerabilities?
What kind of network security do you need to determine who can access, change,
or delete information in your organization?
What type of virus protection is used? Is the license up to date? Does it work as
often as necessary?
If the vulnerability is exploited, do you have a data recovery plan?
Vulnerabilities can divide in to six sub topics
Hardware Vulnerability
Software Vulnerability
Network Vulnerability
Personal Vulnerability
Physical site Vulnerability
Organizational Management Vulnerabilities
Examples for the above Vulnerabilities
Hardware Vulnerabilities
Susceptibility to humidity or dust
Insecure storage
Software Vulnerabilities
Improper testing
Lack of audit trail
Design flaws
Network Vulnerability
Insecure communication strategies
Insecure Network architecture
Personal Vulnerability
Inadequate recruiting of suitable professionals
Low-security awareness
Physical site Vulnerability
Area susceptibility to floods.
Unreliable power sources.
Accidental fires.
Organizational Management Vulnerabilities
1.3.2.3 Risk
Risk is defined as potential loss or damage when a vulnerability is exploited by a threat.
Examples of risks include:
1. Financial loss
2. Loss of confidentiality
3. Damage to your reputation
4. Legal implications
5. Even the loss of life
The risk can also be defined as:
Risk = Threat x Vulnerability
Reduce your risk potential by creating and implementing a risk management plan. Here are
the key aspects to consider when developing a risk management strategy:
Assess risk and identify needs. When it comes to designing and implementing a risk
assessment system, it is very important to prioritize the most critical violations that
need to be addressed. This level of assessment should be performed on a regular
and iterative basis, although the frequency will differ from organization to
organization.
Include a common stakeholder perspective. Stakeholders include business owners
as well as employees, customers, and even suppliers. All of these players can
negatively impact the organization (potential threats), but they can also be assets
that help mitigate risk.
Identify a central group of people responsible for risk management and determine
the appropriate level of funding for this activity.
Implement appropriate policies and appropriate controls, and ensure that the
appropriate end users are notified of any changes.
Monitoring and evaluating policy and control effectiveness. The sources of risk are
constantly changing, which means that your team must be ready to make any
necessary adjustments to the structure. This may also include the inclusion of new
monitoring tools and techniques.
5. Application error
EMC output can be affected by computation errors, input errors, buffer overflows, database
failures, system failures, and license failures.
6. Physical damage
There will be fire, water, power outages and natural disasters, and a disaster recovery plan
must be named to restore everything that has been destroyed or lost to a minimum.
1.4.2 Security procedures that can be used to minimize the impact of the EMC
Cloud Solution.
For any company, a security protocol must exist to protect its resources from attacks or
disruptions. EMC should also provide an IT security mechanism to protect all company
property. This should be well managed and reported in the update. Any improvement made
should also be recorded. This is the recommended way to provide capital for the
organization. There are forms and risk groups. For each risk and its impact, we need to
establish a procedure. This is often considered a risk control method. Risk is determined in
the process of risk management; they are rated, and also classified by form. There are
security protocols for these forms that must be followed to reduce the impact on the
organization.
protection, they need to be well updated and managed. For best practice, backups should
be stored elsewhere. This is the recommended data protection protocol.
3. Encryption procedure - misuse of data.
The best way to avoid trade secrets, scams, espionage and data theft is by encrypting your
data. If a company can encrypt data to protect data using a dedicated encryption process,
the impact of data misuse will be reduced.
There are various methods for encrypting data. Therefore, if we can encrypt data with a
hash algorithm, encryption with a cryptographic key, it must be safe and recorded for
certain methods and keys of encryption algorithms and everything else. This is
recommended advice from IT professionals.
4. Access policy and restriction procedure - Interaction with people
Any company must have access policies, restrictions and regulatory processes. There is a
great danger here. Who has what access, what can be done with these access policies, what
are the restrictions, who has the right to do something with confidential data, what are the
intentions, what are the criteria, why should this be done to reduce the effects, should
everything be documented?
This is also required for the IT audit period. Every log, every change we made with time
and date that needs to be mentioned.
5. Procedure for using hardware resources - hardware failure
The business process is triggered by the failure of systems and peripheral equipment.
Therefore, the organization must provide redundant servers and computers for the duration
of the hardware failure to resolve system errors. To take action in the event of a failure, it
is important to record your current hardware products, server configurations, and system
configurations. Then it will be possible to apply only the backup method in order to enter
the periodic output state as soon as possible.
6. Troubleshooting Procedure - Application Error
In the IT sector, errors, bugs, failures are usually few. There might have been a failure.
If a loss occurs, before a solution can be found, it must be determined from top to bottom.
And from bottom to top. To overcome every failure, there must be procedures.
After the last time, there was a need for a good preservation and correction. What are the
latest steps taken, what new resources are being used, what triggered them, and what needs
to be recorded?
When any new recruit arrives, that person should be aware of the failures that occurred
earlier and what steps should be taken to resolve them. They will need to check and record
if new failures, crashes and errors occur.
7. Disaster recovery procedure - physical damage
Physical injuries disrupt the entire business process. When a natural disaster occurs, a
mechanism can be used to restore the functioning of the business process to a minimum.
In honor of this operation, the "Disaster Recovery Plan" is named. This strategy includes
how the company will recover from the incident, what needs to be done during this period,
the recovery process, and so on. This described process is simply called the “Risk
Management Procedure”. This document contains:
Identify key risks, measure the likelihood and impact
Analyze security threats
Measurement of impact
Rank potential risks and indicate desired results
Avoiding risks
Transfer of risk
Risk reduction
Thus, by measuring and investigating them and determining the consequences of threats,
this document helps to reduce the risk and take appropriate action against it.
Risk management involves identifying, analyzing and responding to risk factors that form
part of the life of a business. Effective risk management means trying to control future
results as much as possible by acting proactively rather than reacting. Thus, effective risk
management makes it possible to reduce both the likelihood of a risk and its potential
impact. (corporatefinanceinstitute, 2021)
IT managers conduct this process to help them balance the economic and operational costs
associated with using security controls to protect the data and information systems that
support the company.
The steps of risk management can be shown as below
1. Identify Risk
Anticipating potential project pitfalls shouldn't be discouraging for your organization. Vice
versa. Risk identification is a positive experience in which your entire team can participate
and learn from.
Leverage the collective knowledge and expertise of your entire team. Ask everyone to
identify the risks they have encountered previously or may have additional information.
This process promotes communication and cross-functional learning.
2. Assess Risk
In this way, the identified risk evaluates what the risk will do to the resources and the
organization. Each risk is evaluated to classify their behavior. Therefore, the concept of
risk access is the process of assessing, analyzing risks that understand how risks can cause
the organization and can eliminate or prevent hazards.
3. Analyze the Risk
They are measured in terms of severity by measuring the risks after assessing the identified
risks. They should record subsequent changes following an appropriate risk assessment.
Thus, the concept of risk analysis is a technique that allows you to deal with the detected
potential hazards that can cause a business process. This applies to programs, IT, security
issues and any activity in which threats can be assessed on a quantitative and qualitative
basis. Risk analysis is part of risk management.
4. Control the Risk
Risk management helps you manage identified, assessed and analyzed threats. These are
mainly the risks described by this. Risk management determines what steps should be taken
to mitigate these identified risks.
5. .Review the controlled Risk
It is important to monitor the implementation of control measures (to reduce or control
risks) to assess whether the measures are successful and whether they have a significant
impact on eliminating or minimizing the risk. Tracking monitoring is often used to assess
whether other threats have emerged because of the deployment.
2 Task
2.1 EMC Cyber and its clients will be impacted by improper/ incorrect
configurations.
2.1.1 Definition of Firewall
A firewall can be defined as a special type of network security device or program that
monitors and filters inbound and outbound network traffic based on a set of defined security
rules. It acts as a barrier between internal private networks and external resources (such as
the public Internet). The main purpose of a firewall is to allow safe traffic and prevent
malicious or unwanted data traffic to protect your computer from viruses and attacks. A
firewall is a cybersecurity tool that filters network traffic and helps users block malware
from accessing the Internet on infected computers.
Figure 8 Firewall
Types of Firewall
There are software and hardware firewalls. Each format serves a different but important
purpose. A hardware firewall is physical, like a broadband router, and is stored between
your network and the gateway. A software firewall is internal - a program on your computer
that runs through port numbers and applications. There are also cloud firewalls known as
Firewall as a Service (FaaS). One of the benefits of cloud firewalls is that they can grow
with your organization and, like hardware firewalls, do a good job of perimeter security.
There are several different types of firewalls depending on their structure and function.
There are various firewalls you can implement depending on the size of your network and
the level of security you need.
Improperly controlled firewalls in every company pose some of the biggest business risks.
Networks are getting more complex and the most important factor to keep in mind is the
firewall specifications.
Therefore, firewall management and overall network security must be done correctly when
it comes to firewalls.
In every company, poorly controlled firewalls pose business risks. Risks are something we
don't know about until it's too late.
Conflicts of policy rules or the order of policies can make some systems or
applications inaccessible
Prevents hacking
Unfortunately, the trend towards more and more digital operations encourages thieves and
intruders to do the same. With the rise of data thefts and criminals holding systems hostage,
firewalls have become even more important as they prevent unauthorized hackers from
gaining access to your data, email, systems, and more. A firewall can completely stop a
hacker or keep him from choosing an easier target.
Stops spyware.
In a data-driven world, a much-needed advantage is preventing spyware from accessing
and infiltrating your systems. As systems become more sophisticated and reliable, the
number of entry points that criminals can use to gain access to your systems also increase.
One of the most common ways unwanted people gain access is using spyware and malware,
programs designed to infiltrate the systems, control your computers, and steal our data.
Firewalls are an important defense against this malware.
Stops virus attacks.
Nothing can stop your digital operations faster and harder than a virus attack. Hundreds of
thousands of new threats are created every day, so it is vital that you put in place defenses
to keep your systems up and running. One of the most obvious benefits of firewalls is the
ability to control entry points into your system and stop virus attacks. The cost of damage
from a virus attack on your systems can be prohibitive, depending on the type of virus.
Provides confidentiality.
The main advantage is confidentiality. By working proactively to keep your and your
customers' data secure, you create a privacy environment that your customers can trust. No
one likes stealing their data, especially when it is clear that steps could have been taken to
prevent an intrusion.
In addition, updated data protection systems can be a competitive advantage and an
argument in favor of buyers and customers. The benefit is greater the more confidential the
data your company is dealing with. (fortinet, 2021)
VPNs work on the Internet. Therefore, the risk is really great. To secure your VPN
connection, you must enforce proper configuration policies. So the VPN connection can be
secured and the contact can be stopped from being hacked by an attacker.
If there is an incorrect / inaccurate configuration or regulation, the EMC can face a
dangerous number of them.
If remote access has been configured using an insecure authentication protocol,
attacker-in-the-middle attacks are possible. This attack is capable of remotely
authenticating to a VPN server.
If an attacker can compromise the security certificate, the attacker gains access to
the server from the certification authority without compromise.
When remote workers are unable to access a mission-critical application, it can
severely impact EMC and employee productivity.
So, one of the interesting features of EMC is VPN. Therefore, it must be installed correctly.
Accordingly, VPN connections can be protected using firewalls. VPNs must be located
correctly, without losing connectivity and without any security risks.
In most situations, employees and others using your internet connection will not be
restricted based on their internet use, but using a VPN can hide their data transmission and
eliminate the possibility.
Network scalability
While a private network can help get the business off the ground, the costs of network
expansion can be prohibitive. If using a VPN, that can provide access to multiple employees
and remote employees at the same time. We can also run key applications in the cloud and
grant them access through a secure VPN tunnel.
This can be anything from email to full-fledged applications that you usually run on your
desktop computer. When employees connect to the VPN, they gain access to another
computer that you use to run the application they want. Every employee with a login can
access the VPN and therefore the application. Adding additional staff is only a matter of
providing more bandwidth if needed and credentials for each new team member.
In addition, if you find a problem, you need to spend more time fixing it and the possible
consequences in your organization.
However, in the case of a VPN, all maintenance, performance checks, and security
measures are the responsibility of the service provider. Their IT costs are supported by a
huge number of paying customers, which makes their costs per customer relatively low.
These cost savings are passed on to you in commissions that are lower than what you would
pay to have a dedicated team run your infrastructure.
To ensure that this is the case, it is prudent to carefully check the services the provider
offers and the types of equipment they use. More advanced components and security
measures often improve the experience for you, the customer. (fortinet, 2021)
Multi-level thresholds
Customizable dashboards
SNMP monitoring
Auto-discovery
2. Paessler PRTG Network Monitor
Paessler PRTG Network Monitor allows organizations to monitor all their systems,
devices, traffic and applications in their IT infrastructure without additional plug-ins. You
can choose from multiple sensors that will monitor areas of your network, such as
bandwidth monitoring sensors, hardware parameter sensors, SNMP sensors, VOIP and
QoS sensors, and more.
Key features include:
Real-time dashboards
Reporting system
Although the name Solar winds Network Performance Manager is built on performance, it
is still a valuable network security-monitoring tool as it monitors network elements such as
servers, switches, and applications. Solar winds NPM can move from SNMP monitoring to
packet analysis to give your organization more control over monitoring your network
partitioning and improve network security.
Key features include:
Smart mapping
Extended alert
SNMP monitoring
Performance board
API Integration
Availability reports
Warning
Advanced plugins
Network screen
2.2 How DMZ, Static IP and NAT Helps To a Trusted Network in EMC
network as the network used by internal employees in the office or through a secure and
controlled search engine. (subscription.packtpub, 2021)
A static IP address is a manually configured IP address for the device rather than the
address assigned by the DHCP server. It is called static because it does not change
compared to a dynamic IP that changes. Routers, phones, tablets, desktops, laptops, and
any other device that can use an IP address can be configured to obtain a static IP address.
This can be done through a device (such as a router) that issues IP addresses, or by
manually entering the IP address from the device itself to the device. (Fisher, 2020)
Figure 13 Static IP
Running servers
One of the biggest advantages of a static IP address is that computers using such an
address can host servers containing data that other computers can access over the Internet.
A static IP address makes it easy for computers to find a server from anywhere in the
world. In addition, computers that allow remote access on a closed network work best
with static IP addresses. This allows different types of computers running different
operating systems to access the host system by searching for the same IP address each
time.
Stability
Static IP addresses are more stable on the Internet as they never change. In the case of a
dynamic IP address, the ISP may automatically change the address regularly, for example
every few hours. This may cause the user's connection to fail. The computer may also
experience problems reconnecting to the Internet using the new address. Using a static IP
address avoids all these potential problems.
Simplicity
Static IP addresses are easier to assign and maintain. It becomes easier for network
administrators to monitor Internet traffic and assign access to specific users based on their
IP address ID. Dynamic addresses require a program that assigns and changes IP
addresses and may require users to change settings on their computers.
Number of addresses
One of the major disadvantages of static IP addresses is that each assigned address covers
a computer even when that computer is not in use. Because each computer needs a unique
address, this limits the number of available IP addresses. This prompted ISPs to create
several different IP standards to inject more IP addresses into the system, thus making
room for more computers.
Access Monitoring
A computer with a static IP address is much easier to monitor over the internet. This can
be a disadvantage when it comes to websites that allow each visitor to download or view
a certain amount of content. The only way to view or download additional content is to
update the IP address in the dynamic IP system.
Similarly, law enforcement can track computer users who download content by tracking
their IP addresses.
Users have expressed concerns about the privacy of this type of tracking, and whether
ISPs should disclose the name and address of a user associated with a particular static IP
address remains a controversial issue.
3 Task
3.1 Risk management procedure for EMC Cyber solutions to safeguard itself and
its clients
3.1.1 Risk Assessment
Risk assessment is the process of identifying potential hazards and analyzing what might
happen if a hazard occurs. Business Impact Analysis (BIA) is the process of identifying
potential impacts resulting from the disruption of time-sensitive or critical business
processes. (ready.gov, 2021)
There are at least five key components to consider when creating a risk management
framework. These include risk identification; measuring and assessing risks; risk reduction;
reporting and monitoring of risks; and risk management.
1. Risk identification
The first step in identifying the risks a company faces is to determine the magnitude of the
risks. The amount of risk is simply a list of all possible risks. Examples include IT risk,
operational risk, regulatory risk, legal risk, political risk, strategic risk, and credit risk.
After listing all possible risks, the company can select the risks it faces and divide it into
main risks and non-essential risks. The main risk is the risk the company must take to
achieve results and ensure long-term growth. Non-essential risks are often unnecessary and
can be minimized or completely eliminated.
2. Measuring risk
The risk measurement provides information on the number of specific exposures or
exposures in general and the probability of losses resulting from those exposures. When
measuring exposure to a particular risk, it is important to consider the impact that risk has
on the organization's overall risk profile.
Some risks provide multiple benefits, while others do not. Another important consideration
is the ability to measure exposure. Some risks are easier to measure than others. For
example, you can use observable market prices to measure market risk, but measuring
operational risk is considered both an art and a science.
If there is a small change in risk, the particular risk measure usually has a predictable effect
on profit and loss (“P/L”). They can also provide information about the degree of volatility
in the P&L. For example, the risk of investing in stocks can be measured as the effect of
gains and losses on stocks, such as a 1-unit change in the S&P 500 Index or the standard
deviation of a particular stock.
Common comprehensive risk measures include value at risk (VaR), return at risk (EaR)
and economic capital. In addition to these measures, techniques such as scenario analysis
and stress testing can also be used.
3. Risk reduction
Once risks are classified and measured, the company can decide which risks should be
eliminated or minimized and how many major risks should be retained. Directly selling
assets or liabilities, purchasing insurance, and using derivatives for hedging or
diversification purposes, can mitigate risks.
4. Risk reporting and monitoring
It is important to regularly report on specific and comprehensive risk measures to keep the
level of risk at an optimal level. Financial institutions that trade daily will generate daily
risk reports. Other organizations may require less reporting frequency. A risk report should
be sent to risk personnel who have the authority to adjust (or instruct others to adjust) risk
exposure.
5. Management of risks
Risk management is the process of ensuring that all employees of the company perform
their duties in accordance with the risk management system. Risk management includes
defining the roles of all employees, segregation of duties and delegating authority to
individuals, committees and boards of directors to approve key risks, risk limits, exceptions
and risk reports, and overall oversight.
Stakeholders will be informed about the risks their organizations are exposed to and
whether the current measures are sufficient.
Participants within the organization become more aware of risks and learn to defend
themselves and avoid actions that could put the organization at greater risk.
Date 29.08.2021
Version 1.0
Email Shrawanshraw3333@gmail.com
Assets Identifications
Human Resources
IT infrastructures
Website
Security equipment
Classification
System Failure
Financial Risks
Internet Problems
Internet dependency
Radiation Effect
Over heat
Potential consequences
Data Loss
Legal consequences
Breach of confidence
Risk Matrix
Risk Rating
ID - 01
Category – System Failure
Risk
Description Probability Impact Solidarity Cost Benefits
Level
Use anti-
Virus
Use Network
address
Translation
Malware and
High Use anti-
hacker Medium Medium Medium High
Risk malware
attacks
Use Virtual
Private
Network
Apply
Firewall
Exhausting
heat to
Atmosphere
over a high
Over heat tunnel
and Instructed
High High Critical High High
Exhausting them to
heat Keep the
instructions
Use Safety
things
ID - 02
Category – Uncertain base Risk
Risk
Description Probability Impact Solidarity Cost Benefits
Level
Make
Disaster
recovery
plan
Damage by Use Backup
Natural Low High Moderate generators Medium High
Disasters Use
alternative
satellite
Use backup
servers
Table 5 Uncertain Base Risk
ID - 03
Category – Hardware and Software errors
Risk
Description Probability Impact Solidarity Cost Benefits
Level
Stored Data Use Backup
Low High Moderate Medium Medium
is Lost Servers
Buy and use
genuine
Application software
High High Critical Low Low
Errors Renew the
software
every year
Table 6 Hardware and Software errors
ID – 04
Category – Internet Problems
Risk
Description Probability Impact Solidarity Cost Benefits
Level
Use SSL and
TSL
certificates
Use secure
protocols such
Transmission as https and
Very
Data over Low Low connection Low Medium
Low
unprotected Use anti-
malware
Use Virtual
Private
Network(VPN)
Use Captchas
to prevent
from
Over unwanted
Network Medium Low Low traffic Low Medium
Traffic Use Load
balance to
reduce the
server load
Internet Get High
Very
Dependency Low Low speed internet Low Low
Low
connection
Table 7 Internet Problems
ID - 05
Category – Inside and Outside threats
Risk
Description Probability Impact Solidarity Cost Benefits
Level
Schedule
Regular
Breaks
Use safety
things to
prevent from
radiation
Monitor and
Regulate
Radiation Workplace
High High Critical Low Medium
effect Heat
Ensure
Workers Do
Not Work
Alone
Schedule
Strenuous
Work on
Cooler Days
Use
Captchas to
prevent
from
Poor choice
unwanted
of Pass Low Medium Low Low Low
traffic
words
Use Load
balance to
reduce the
server load
Fix CCTV
in the server
room
Block ports
Employee on the
Very
Negligence Low Low system Low Low
Low
Provide
access
control with
specific
passwords
Hackers Use network
attack address
Low Medium Low Medium Medium
translations
devices
Give Strong
Passwords
Use Better
Encryption
Lack of staff Provide
knowledge trainings to
staffs
Very
Low Low Appoint Low Low
Low
new staffs
with
interview
Table 8 inside and outside threats
ID - 06
Category – Financial Problems
Risk
Description Probability Impact Solidarity Cost Benefits
Level
Appoint
hardware
technician for
safe maintain
Security
Very Get Long
Equipment Low Low Low Medium
Low Term
Problem
Warranty
Buy High
quality things
ID – 07
Category – Physical Problems
Risk
Description Probability Impact Solidarity Cost Benefits
Level
Use SSL and
TSL
certificates
Use secure
Lack of protocols such
Security as https and
functionality Low Medium Low connection Low Medium
in the Use anti-
organization malware
Use Virtual
Private
Network(VPN)
Use Captchas
to prevent
from
Theft of unwanted
intellectual Low Medium Low traffic Medium Medium
property Use Load
balance to
reduce the
server load
Table 10 Physical Problems
Application security
Due to application security, applications are specially encrypted at creation time to be as
secure as possible to ensure that they are not vulnerable to attacks. This additional layer of
security includes assessing the application code and identifying vulnerabilities that may
exist in the software. (cisco, 2021)
IT Security Audit Chart of EMC Cyber
EMC Cyber
Description – IT Security Audit of EMC Cyber
Version 1.0
Security Administrator Sivarasa Pakeen
Email or Phone Shrawanshraw3333@gmail.com
To assesses the security of the server's
physical configuration and environment,
Purpose
software, information handling processes,
and user practices.
Date 02 August 2021
Auditor Remarks (Supporting
Areas of Audit Observations, Findings, References &
Substantiation)
Table 11 IT Security Audit of EMC Cyber
Network Servers
Encryption
Access control
Description Yes No N/A
Does the system prompt you to change your password the first
time a user logs into the system?
Does the system automatically log out (lock/lock) the user
when the password expires?
Does the system provide password masking or password
hiding at login?
Are there controls to ensure that the password is a minimum
of six characters and a maximum of twelve characters?
Data Protection Act is the UK law that governs the processing and processing of personal
information.
In particular, the term "data protection law" can refer to many different pieces of legislation
called "data protection law". Each new legislation is introduced to replace, update and
update the previous version of the DPA. (sumup, 2021)
2. Goal limitation
This principle emphasizes the need for organizations to have a clear understanding of their
processing objectives from the outset. You need to clearly understand what your processing
purposes are and they should be recorded as part of your documentation obligations
(liability principle). You can no longer collect unnecessary information, you must have a
goal. If a new processing purpose arises, this data can only be used if it is compatible with
the original, if you have obtained consent or if it has a clear basis in law.
3. Data minimization
This principle emphasizes the need for organizations to minimize the data they collect.
All data collected must have a specific purpose. This principle is designed with today's
digital landscape in mind, in which almost all imaginable data can be collected in one way
or another. To be GDPR compliant, organizations only need to store the minimum amount
of data they need.
We must ensure that the personal data you process:
Enough to adequately achieve the set goal
Relevant: contains a link / refers to this target
Limited to what is needed: you have no more than what is needed for this purpose.
4. Accurate and timely processing
This principle requires dispatchers to ensure that the information they hold is accurate, up-
to-date and up-to-date. Its use is only permitted if it remains accurate and up-to-date. You
must take all reasonable steps to ensure that your personal information is in no way
incorrect or misleading. If you find that personal information is incorrect or misleading,
you should take all reasonable steps to correct or delete it as soon as possible.
5. Storage limitation
This principle emphasizes the need for organizations not to store data more than is
necessary.
Personal data is stored in a form that allows the identification of data subjects for a period
not exceeding that necessary for the purposes for which the personal data is processed.
Even if you collect and use it legally, you can't keep it longer than you really need to.
The GDPR does not set specific time limits for different types of data; this is up to you, but
the retention periods you specify for different types of data should be reflected in your data
retention policy.
The Data Protection Act 2012 (Act No. 843) sets out the rules and principles for the
collection, use, disclosure and storage of your information or personal data-by-data
controllers or processors. By allowing controllers or data processors to process (collect,
use, disclose, delete, etc.) such personal data or information in accordance with individual
rights, you acknowledge that individuals have the right (rights of data subjects) to protect
your data or personal information. The bill also established the Data Protection
Commission as an independent legislative body to enforce and enforce compliance. (data
protection, 2021)
Principles of Personal data protection act 2012
The PDPA imposes the following data protection obligations on organizations in relation
to their data operations:
1. Obligation to Consent
An organization must obtain an individual's consent before collecting, using, or disclosing
their personal data for specific purposes (Section 13-17 of the PDPA).
Purpose Limitation Obligation: An entity may collect, use, or disclose personal data only
for purposes that a reasonable person deems appropriate in the circumstances (Section 18
of the PDPA).
2. Obligation to Notify
An entity must notify an individual of the purposes for which it intends to collect, use or
disclose their personal data during or prior to such collection, use or disclosure, and may
collect, use and disclose personal data only for such purposes (Sections 18 and 20 PDPA).
Obligation to Access and Correct: The organization must, upon request, allow a person to
access and / or rectify their personal data in their possession or control. In addition, the
organization is required to provide an individual with information on how personal data
may have been used or disclosed during the last year (sections 21 and 22 of the Personal
Data Protection Act).
3. Commitment to Accuracy
An organization must use reasonable efforts to ensure the accuracy and completeness of
the personal data it collects if it can use such personal data to make decisions that affect the
person concerned, or to disclose such personal data to another organization. (Section 23
PDPA).
4. Obligation to protect
An organization must protect personal data in its possession or control by adopting
reasonable security measures to prevent (a) unauthorized access, collection, use, disclosure,
copying, modification, deletion or similar risks and (b) loss of any medium or device on
which personal data is stored (section 24 of the Personal Data Protection Act).
Obligation to Restrict Retention: An entity should cease withholding documents containing
personal data, or remove the means by which personal data can be associated with specific
individuals, as soon as it is reasonable to assume that the storage of such personal data no
longer serves a purpose. For which it was collected and is no longer required for legal or
business purposes (Section 25 of the Personal Data Protection and Human Rights Act).
5. Restriction of Transfer Obligation
An entity must not transfer personal data to a country or territory outside of Singapore,
except as required by the PDPA to ensure that the transferred personal data is provided with
a protection standard comparable to the PDPA standard (Section 26 of the PDPA)
6. Accountability Commitment
An organization must appoint a PDPA Compliance Officer, commonly referred to as a Data
Protection Officer (DPO), and develop and implement the policies and practices necessary
to fulfill your obligations. in accordance with PDPA, including a complaint process. In
addition, the organization is required to communicate these policies and practices to its
staff and to provide information to those requesting it about these policies and practices
(Sections 11 and 12 of the PDPA).
7. Obligation to report data breaches
An organization must assess data breaches that have occurred with respect to personal data
in its possession or control and must notify PDPC as well as those affected when certain
data breaches (reported data breaches) occur (Sections 26A - 26E PDPA). (dataguidance,
2021)
It is made to measure
4 Task
4.1 Managing Organizational Security
4.1.1 Security Policy
Information technology (IT) security policies define rules and procedures for all people
who access and use the organization’s IT assets and resources. An effective IT security
strategy is an organizational culture model in which rules and procedures depend on how
your employees handle their knowledge and work. Therefore, an effective IT security
strategy is a unique document designed for each organization, involving employees’
tolerance for risks, the way they view and evaluate information, and the availability of the
final information. They continue. ... For this reason, many companies will abandon repeated
IT security policies because they fail to consider how people in the organization actually
use and share information, as well as between each other and the public.
The goal of an IT security strategy is to protect the confidentiality, integrity, and availability
of systems and information used by members of the organization. These three principles
form the CIA triplet:
Confidentiality includes protecting assets from outsiders.
Integrity ensures that asset changes are handled in a specific and authoritative manner.
Availability is the state of the system where authorized users can continuously access these
assets.
An IT security policy is a dynamic document that will be constantly updated to adapt to
changing IT and business needs. Organizations such as the International Organization for
Standardization (ISO) and the National Institute of Standards and Technology (NIST) have
issued security policy standards and best practices. According to the National Research
Council (NRC), the characteristics of any company policy should include:
1. Goal
2. Scope of application
3. Special instructions (paloaltonetworks, 2021)
Data protection and data security are essential in an organization. And it should be handled
appropriately. There must be an agreement to control data protection in the organization.
This law should address every security issue,
Introduction
The risk of data theft, fraud, and security breaches can have a detrimental effect on a
company's systems, technology infrastructure, and reputation. As a result, EMC Cyber has
developed this policy to help outline the security measures that keep information safe and
secure.
Purpose
The purpose of this policy is to protect EMC's cyber data and infrastructure, describe the
protocols and guidelines governing cyber security measures, define the rules for corporate
and personal use, and list the company's disciplinary procedures for breaches of the politics.
Scope
This policy applies to all remote EMC Cyber employees, full-time and part-time
employees, contractors, volunteers, vendors, trainees, and / or anyone with access to the
electronic systems, information, software, and / or equipment of the company.
1. Confidential information.
EMC Cyber defines "sensitive data" as:
Secret and unpublished financial information
Information about customers, suppliers and shareholders.
Lead and sales data.
Patents, business processes and / or new technologies.
Passwords, assignments and personal information of employees.
Corporate contracts and legal documents.
Device Security:
Company use.
To ensure the security of all company-issued information and devices, EMC Cyber
employees must:
All devices manufactured by the company must be password protected (at least
eight characters). This includes tablets, computers, and mobile devices.
Secure all relevant devices before leaving your desk.
Obtain permission from organization office manager and / or inventory manager
before removing devices from company premises.
Do not share personal passwords with colleagues, personal acquaintances,
management team and / or shareholders.
Update devices periodically with the latest security software.
Personal use.
EMC Cyber understands that employees may be required to use personal devices to access
company systems. In such cases, employees should report this information to management
for record keeping. To protect company systems, all employees must:
Make sure all personal devices used to access company systems are password
protected (at least eight characters).
Install fully functional antivirus software.
Update your antivirus software regularly.
Lock all devices if left unattended.
Make sure all devices are protected at all times.
Always use secure and private networks.
2. Email security
Securing email systems is a top priority because emails can lead to data theft, fraud and
contain malicious software such as worms and errors. Therefore, EMC Cyber requires all
employees to:
Please check the legitimacy of each email, including the email address and
sender's name.
Avoid opening suspicious emails, attachments and clicking on links.
Look for serious grammatical errors.
Avoid clickbait headlines and links.
Contact your IT department about any suspicious emails.
3. Data exchange
EMC Cyber is aware of the security risks associated with internal and / or external transfers
of sensitive data. To minimize the likelihood of data theft, we instruct all employees:
Refrain from transferring classified information to employees and third parties.
Only transfer sensitive data over EMC cyber networks.
Get the required approval from senior management.
Check the recipient of the information and make sure they have adequate security
measures in place.
Comply with EMC Cyber's data protection laws and privacy agreements.
Report any breach, malware and / or fraud immediately to IT.
4. Disciplinary action
Violation of this policy may result in disciplinary action up to and including termination of
employment. EMC's cyber discipline protocols are based on the severity of the breach.
Unintentional violations require only verbal warning, frequent violations of the same nature
may result in written warning, and intentional violations may result in suspension and/or
termination depending on the circumstances of the case.
5. Awareness, Communication and Learning
New hires - To reduce the risk of inadvertent disclosure of confidential information
The HR department will refer new employees to this policy and confirmation that it has
been read understood and applied.
New and existing employees - To reduce the risk of inadvertent disclosure of confidential
information. Staff recruitment, cyber security training and orientation sessions will be held
as an integral part of the project. Employee adaptation and continuous improvement of
employees. In addition, recognition of this policy, if this is understandable and the
employee agrees to provide it, it will be included in the annual subscription with the code
of conduct.
Change in separation and/or employment status- In case of a change in status, including
promotion, Transfer or termination of the relevant HR department, the local IT
administrator is advised to change the employee's network and physical access rights as
needed appropriate on time.
Third parties - Third parties, suppliers, suppliers, partners, contractors, service providers
or customers. EMC intranet connection or EMC data access must be available policies and
policies governing third party access to the system are detailed in Annex VI.
6. Operations Technology
Data, applications and networks, new software and IT hardware: Software and IT
hardware that can compromise the security of all information technologies infrastructure,
IT department in Vancouver, development, procurement, or the installation and approval
of all purchases of new software and major equipment. No software should be installed on
devices owned by the Company, unless approved by the employee's immediate supervisor
and IT department. EMC installs only properly authorized and licensed software and
Installing or using unauthorized, unlicensed or illegally copied software.
2. Metasploit
Metasploit is available in a commercial Pro version and an open source Pro version for
developers or security professionals. Users can use this Rapid7 network security tool to
search more than 1500 processes, including security for network segmentation. It also
allows organizations to perform various security assessments and strengthen the overall
security of the network to be more comprehensive and responsive.
3. Nessus
When a company has insufficient security settings or faulty updates, this software fixes
bugs and improves the integrity of its network. Nessus identifies and fixes detected
vulnerabilities, including missing or missing patches, software bugs, or other common bugs
in applications, computers, and operating systems.
4. Air crack
A suite of WEP and WPA cracking tools, Aircrack provides ideal solutions for securing
mobile devices on the Internet. Aircrack is a reliable software for hacking algorithms.
Airdecap for broadcasting for WEP/WPA file decryption and packet injection is included
in the package. This package includes many more tools for building a robust suite of
information security applications. Aircrack is a comprehensive solution for a variety of
wireless security needs.
5. Snoring
It is an open source IDS that supports all operating systems and hardware. The software
analyzes protocols, searches/collects content and detects various network security attacks.
Snort is an effective intrusion detection and prevention framework, thanks to its simple
configuration, universal rules, and raw packet analysis.
6. Cain and Abel
Cain and Abel is a password recovery tool that is only compatible with Windows operating
system. It can record VoIP interactions, crack encrypted passwords, and analyze protocols
for routing operations. Detect cached passwords; explore password boxes, cryptanalysis,
brute force cryptanalysis etc.
7. Argus
It is one of the best free open source network analysis tools on the market. Argus stands
for Audit Record Creation and Usage System. The software, as the acronym suggests,
performs deep and efficient analysis of network data with fast and detailed reports on large
network traffic.
8. Nagios
Nagios takes a great approach to network management. It is one of the most effective free
network security tools for aspiring cybersecurity professionals and experts. Nagios
monitors hosts, devices and networks and provides real-time notifications. Let users choose
the notifications they want to receive. It can monitor network resources such as HTTP,
NNTP, ICMP, POP3, and SMTP.
9. Tcpdump
Tcpdump is a Mac, Windows, and Linux compatible application that precedes the market-
leading Wireshark tool. It set the standard for network security. Tcpdump remains a very
effective network sniffer with a new approach.
10. Splunk
One of the simplest apps with a single interface, Splunk is the perfect tool for those on a
budget. This is a paid app with free versions for a limited time. Designed for real-time and
historical data searching, Splunk's powerful search feature makes monitoring applications
easy to use. Splunk is one of the fast and scalable network scanning tools. (jigsawacademy,
n.d.)
Encryption Security Tools
1. Final pass
Probably one of the most popular password management tools, Last Pass is available for
free with limited features while protecting your passwords and personal data. By using such
an encryption software tool, you no longer have to remember or type your password in a
notepad or other physical location. Last Pass has an intuitive and easy-to-use interface that
can make your life easier. There are extensions for the main web browsers such as Mozilla
Firefox and Google Chrome. You can also use the mobile application available for both
Android and Apple.
2. Descriptor
Another free open source encryption software that you can use to protect your internal and
external drive, including system partition and even ISO images, USB sticks, or other
storage devices. Like BitLocker, it is a full disk encryption tool for the Windows operating
system that includes various encryption algorithms such as AES, Twofish, and Serpent.
The interface is simple and intuitive, all you have to do is select a drive and click "Encrypt"
to protect your data.
3. Ax Crypt
Similar to 7-Zip, Ax Crypt is an open source file encryption tool that offers a free solution
and a premium version for Windows, macOS, Android, and iOS. It has AES-256 file
encryption and can effectively encrypt a file, an entire folder, or groups of files with a
simple right click. Files can be encrypted for a specified period of time or automatically
decrypted later when this file reaches its destination. So how can I improve my online
security without creating too many obstacles that can slow down my access to information
posted on the Internet? Here are some simple tools you can use to access content online, as
well as to protect against data leakage.
4. HTTPS anywhere
Encrypting your files is not enough. To stay one-step ahead of cybercriminals, you need to
improve your online protection by ensuring that no one is listening to your online
communication. We recommend trying a browser extension like HTTPS Everywhere,
which is compatible with Mozilla Firefox, Opera, and Google Chrome, to always have
access to secure web pages that use encryption mechanisms. The extension was created as
a result of collaboration between EFF and the Tor Project and automatically switches from
insecure sites using HTTP to secure https. (ioana, 2021)
Password Security Tools
1. 1Password
1Password is a password manager designed not only to provide protection for individuals
or organizations, but also to provide an overall password protection system for families.
1Password considers itself the most popular password manager in the world.
There are two main guidelines for the service, one for individuals and their families that
allow a user or a family of up to five people to securely log in using 1Password. There is
also a business service that provides protection for those working from home and for teams
and companies in general.
In addition to providing, all of the above, 1Password protects you from hacks and other
threats like key loggers and phishing attempts, and only works in trusted browsers.
The result is a highly reliable and competent password manager suitable for both personal
and corporate use, including working from home, without compromising your security.
2. OTP (One Time Password)
In some applications, a one-time password set (OTP) is predefined or even printed, but in
most modern applications, the one-time password (OTP) is generated in real time by a
software authenticator or hardware that the user has in his possession. The user-owned
authenticator uses a cryptographic key with a verifier, which is software that attempts to
verify the identity of the user.
Regardless of how it is created, each one-time password can only be used once. A verifier
that validates a password as a means of verifying the identity of a user will reject the reuse
of the password.
In many cases, the use of an OTP authenticator is just one component of the multi-factor
authentication procedure. By combining a one-time password with another factor, such as
a static password or some type of biometric signature, information can be more secure than
a separately stored static password.
Database Security tools
1. MSSQL data mask
When using real-time data in a test database, all organizations make a common mistake. In
order to avoid this situation, MSSQL Data Mask provides developers with the ability to use
SQL Server database to mask development, testing or outsourcing project data. MSSQL
Data Mask has a classified data-masking tool to protect data classified as personally
identifiable, sensitive personal data, or business-sensitive data.
2. Scuba diving
Scuba is a free database security software tool from the supplier Imperva, used to analyze
more than 2,000 common issues, such as weak passwords, known configuration risks, and
missing patches on various database platforms. The organization uses Scuba as a database
patch developer.
3. App Detective Pro
AppDetectivePRO can detect configuration errors, identity and access control issues,
missing patches or elevation of privilege or denial of service attacks, data leakage or data
manipulation.
4. Zen Card
Zen map is the official GUI of the Nmap security scanner. It is a cross-platform application
(Linux, Windows, Mac OS X, BSD, etc.) designed to make Nmap easier for beginners to
use and provide advanced features for advanced Nmap users. Allows you to save frequently
used scans as a configuration file for easy restart. It includes many very important
functions, such as scanning and detecting sample databases and vulnerabilities.
4.2 Develop and present a disaster recovery plan for EMC Cloud
Figure 45 Stakeholders
Types of Stakeholders
Businesses exist in a great environment and many factors affect them directly or indirectly.
Every organization has stakeholders regardless of its size, nature, structure, and purpose.
The interested parties can be any natural or legal person that affects the activities of the
company and can be influenced by it. In the business environment, stakeholders are divided
into two categories: internal stakeholders and external stakeholders.
Internal Stakeholder
Internal stakeholder area - those parties, individuals or clusters who are involved in the
management of the company. They will influence and can depend on the success or failure
of the organization as a result of the need for unconditional ownership within the
organization. Primary Stakeholders - This is the second name for internal stakeholders.
Internal Stakeholder Area Unit dedicated to the provision of corporate services. They are
extremely concerned about the choice of the company, its performance, profits and
alternative activities. if there are no internal stakeholders, the organization will not be ready
to survive in the long term. That is why they need great influence over the company. In
addition, they recognize all the secrets and internal affairs of the entity. Territorial unit
following the list of internal stakeholders:
Employees: a group of people working for a company for a fee.
Owners: The person or group that owns the organization. They will be partners,
shareholders, etc.
Board of Directors: This group of people runs a legal entity. Corporate members at the
AGM do not appoint them.
Managers: A manager is a person who manages an entire department. Such as Sales
Manager, Top Dog, etc.
Investors: an individual or group who invests their money in the territorial division of the
investing organization.
External Stakeholder
External stakeholders are those stakeholders who are not part of management, but who are
indirectly influenced by the work of the company. These external parts are part of the
business environment. They are also referred to as secondary stakeholders. They are users
of a company's financial information in order to know its results, profitability and liquidity.
External stakeholders are not involved in the day-to-day operations of the business, but are
influenced by the actions of the business. They deal with the company externally. They
have no idea about the internal affairs of the company.
Here is the list of external stakeholders:
Suppliers: They provide the organization with raw data such as raw materials, equipment,
etc.
Buyers: They are considered the king of the business because they are about to consume
the product.
Lenders: This is the individual, bank or financial institution that provides funds to the
organization.
Clients: These are the parties with which the company works and provides its services.
Intermediaries: These are marketing channels that create a connection between a company
and customers such as wholesalers, distributors, retailers, etc.
Competitors: These are competitors who also compete with the organization for resources
and market.
Society: The Company is accountable to the community because the company uses its
valuable resources.
Government: The Company is governed and controlled by government rules and
regulations, as if it had to pay taxes and fees charged to the company. (Surbhi, 2017)
4.2.2.2 Shareholders
A shareholder can be an individual, a company or an organization that owns shares in a
particular company. A shareholder must own at least one share of a company or mutual
fund in order to become a partial owner. Shareholders usually receive a declared dividend
if the business is going well and successfully.
Roles of a Stakeholder
A shareholder is not only about making a profit, but also about other responsibilities.
Here are some of the responsibilities:
Brainstorming and defining the powers granted to the directors of the company,
including their appointment and dismissal.
Decide how much directors are paid for their salary. This practice is very difficult
because shareholders must be sure that the amount they return will offset expenses
and the cost of living in the city where the director lives, without damaging the
company's treasury.
Make decisions in cases where the directors do not have authority, including
amending the company's bylaws.
Types of Stakeholder
There are Two Types of Stakeholders Such as Common Shareholder and Prefer
Shareholder
Common Shareholder
Common shares are a type of guarantee representing the ownership of the share capital of
a company. Other terms such as common shares, ordinary shares or voting shares are
equivalent to common shares.
Holders of ordinary shares have the right to claim and control a share of the company's
profits by participating in elections to the board of directors, as well as voting on important
corporate policies.
The holders of ordinary shares can benefit from the appreciation of the securities. On
average, common stocks offer higher returns than preferred stocks or bonds. However, the
highest returns are associated with the highest risks associated with such securities.
Preferred Shareholders
Preferred shares (also known as preferred shares or preferred shares) are securities that
represent property in a corporation and take precedence over ordinary shares in the assets
and earnings of the company. Stocks are older than common stocks, but younger than bonds
in terms of asset requirements. Holders of preferred shares also have priority over holders
of common shares in the payment of dividends. (corporatefinanceinstitute, 2021)
5 References
Active & Passive Attacks [Definition & Differences] | Venafi. 2021. Active & Passive
Attacks [Definition & Differences] | Venafi. [ONLINE] Available
at: https://www.venafi.com/blog/what-active-attack-vs-passive-attack-using-encryption.
[Accessed 13 September 2021].
Assignment Help 4 Me. 2021. A comprehensive study of Cyber Security and its types.
[ONLINE] Available at: https://assignmenthelp4me.com/article-advantages-and-
disadvantages-of-cybersecurity-342.html. [Accessed 13 September 2021].
BBC Bitesize. 2021. Computer Misuse Act (1990) - Ethical, legal and environmental
impact - CCEA - GCSE Digital Technology (CCEA) Revision - BBC Bitesize. [ONLINE]
Available at: https://www.bbc.co.uk/bitesize/guides/z8m36yc/revision/5. [Accessed 13
September 2021].
Best Network Monitoring Vendors, Software, Tools and Performance Solutions. 2021. 8
Benefits of Network Performance Monitoring Solutions. [ONLINE] Available
at: https://solutionsreview.com/network-monitoring/8-benefits-of-network-performance-
monitoring-solutions/. [Accessed 13 September 2021].
Brad Garland. 2021. 4 Common Mistakes in Firewall Configuration. [ONLINE] Available
at: https://www.valasecure.com/blog/4-common-mistakes-in-firewall-configuration.
[Accessed 13 September 2021].
Check Point Software. 2021. What is a DMZ Network? - Check Point Software. [ONLINE]
Available at: https://www.checkpoint.com/cyber-hub/network-security/what-is-a-dmz-
network/. [Accessed 13 September 2021].
Cisco. 2021. Network Address Translation (NAT) FAQ - Cisco. [ONLINE] Available
at: https://www.cisco.com/c/en/us/support/docs/ip/network-address-translation-
nat/26704-nat-faq-00.html. [Accessed 13 September 2021].
Cisco. 2021. What Is a VPN? - Virtual Private Network - Cisco. [ONLINE] Available
at: https://www.cisco.com/c/en/us/products/security/vpn-endpoint-security-clients/what-
is-vpn.html. [Accessed 13 September 2021].
Cisco. 2021. What Is IT Security? - Information Technology Security - Cisco. [ONLINE]
Available at: https://www.cisco.com/c/en/us/products/security/what-is-it-security.html.
[Accessed 13 September 2021].
Corporate Finance Institute. 2021. Risk Management - Overview, Importance and
Processes. [ONLINE] Available
at: https://corporatefinanceinstitute.com/resources/knowledge/strategy/risk-management/.
[Accessed 13 September 2021].
Corporate Finance Institute. 2021. Shareholder - Definition, Roles, and Types of
Shareholders. [ONLINE] Available
at: https://corporatefinanceinstitute.com/resources/knowledge/finance/shareholder/.
[Accessed 13 September 2021].
Cyber Security Solutions, Compliance, and Consulting Services - IT Security. 2021. 5
essential security tools for every organization - Cyber Security Solutions, Compliance, and
Consulting Services - IT Security. [ONLINE] Available
at: https://www.infoguardsecurity.com/5-essential-security-tools-for-every-organization/.
[Accessed 13 September 2021].
Data Protection Commission Ghana. 2021. The Data Protection Act 2012. [ONLINE]
Available at: https://www.dataprotection.org.gh/data-protection/data-protection-acts-
2012#:~:text=OVERVIEW%20OF%20DATA%20PROTECTION%20ACT%2C%20201
2%20(ACT%20843)&text=It%20recognises%20a%20person%27s%20right,accordance
%20with%20the%20individual%27s%20rights.. [Accessed 13 September 2021].
DataGuidance. 2021. Singapore - Data Protection Overview 2021 | Guidance Note |
DataGuidance. [ONLINE] Available at: https://www.dataguidance.com/notes/singapore-
data-protection-overview. [Accessed 13 September 2021].
Difference between Active Attack and Passive Attack. 2021. Difference between Active
Attack and Passive Attack. [ONLINE] Available
at: https://www.tutorialspoint.com/difference-between-active-attack-and-passive-attack.
[Accessed 13 September 2021].
Fortinet. 2021. Firewall Benefits: The Importance of Firewall Security | Fortinet.
[ONLINE] Available at: https://www.fortinet.com/resources/cyberglossary/benefits-of-
firewall. [Accessed 13 September 2021].
Fortinet. 2021. Benefits of VPNS: What are the pros and cons of a VPN? | Fortinet.
[ONLINE] Available at: https://www.fortinet.com/resources/cyberglossary/benefits-of-
vpn. [Accessed 13 September 2021].
GeeksforGeeks. 2021. Types of Network Address Translation (NAT) - GeeksforGeeks.
[ONLINE] Available at: https://www.geeksforgeeks.org/types-of-network-address-
translation-nat/. [Accessed 13 September 2021].
Heimdal Security Blog. 2021. The most Popular Free Encryption Software Tools (2021).
[ONLINE] Available at: https://heimdalsecurity.com/blog/free-encryption-software-
tools/. [Accessed 13 September 2021].
Hiep Nguyen Duc. 2021. 8 Reasons Cyber Security Is Important -. [ONLINE] Available
at: https://hakin9.org/8-reasons-cyber-security-is-important/. [Accessed 13 September
2021].
Hut Six. 2021. What are the Eight Principles of the Data Protection Act?. [ONLINE]
Available at: https://www.hutsix.io/what-are-the-eight-principles-of-the-data-protection-
act/. [Accessed 13 September 2021].
i-Sight. 2021. Policies and Procedures in the Workplace: The Ultimate Guide [2021] | i-
Sight. [ONLINE] Available at: https://i-sight.com/resources/policies-and-procedures-in-
the-workplace-the-ultimate-guide/. [Accessed 13 September 2021].
ISO. 2021. ISO - ISO 31000 — Risk management. [ONLINE] Available
at: https://www.iso.org/iso-31000-risk-management.html. [Accessed 13 September 2021].
IT Security Audits: The Key to Success. 2021. IT Security Audits: The Key to Success.
[ONLINE] Available at: https://blog.netwrix.com/2020/04/09/it-security-audit/. [Accessed
13 September 2021].
Jigsaw Academy. 2021. Top 10 Network Security Tools (2021). [ONLINE] Available
at: https://www.jigsawacademy.com/blogs/cyber-security/network-security-tools.
[Accessed 13 September 2021].
Key Differences. 2021. Difference Between Internal and External Stakeholders (with
Comparison Chart) - Key Differences. [ONLINE] Available
at: https://keydifferences.com/difference-between-internal-and-external-
stakeholders.html. [Accessed 13 September 2021].
KirkpatrickPrice Home. 2021. 5 Network Monitoring Tools and Techniques I
KirkpatrickPrice. [ONLINE] Available at: https://kirkpatrickprice.com/blog/5-network-
monitoring-tools-and-techniques/. [Accessed 13 September 2021].
Lifewire. 2021. What Is a Static IP Address?. [ONLINE] Available
at: https://www.lifewire.com/what-is-a-static-ip-address-2626012. [Accessed 13
September 2021].
Palo Alto Networks. 2021. What is an IT Security Policy? - Palo Alto Networks. [ONLINE]
Available at: https://www.paloaltonetworks.com/cyberpedia/what-is-an-it-security-policy.
[Accessed 13 September 2021].