Seinio Tweulongelwa Ndeiluka - 2126922
Seinio Tweulongelwa Ndeiluka - 2126922
Seinio Tweulongelwa Ndeiluka - 2126922
1. Overview
I have recently been employed as a security consultant for Ozone Insurance Company,
whereby I am tasked to develop a security policy, explain the core components and
objectives of a network security policy, and specify security measures I will include in
its policy.
Robert Grimmick (2023) explains that a security policy (also called an information
security policy or IT security policy) is a document that spells out the rules,
expectations, and overall approach that an organization uses to maintain the
confidentiality, integrity, and availability of its data. Security policies exist at many
different levels, from high-level constructs that describe an enterprise’s general
security goals and principles to documents addressing specific issues, such as remote
access or Wi-Fi use.
2
Student No. 2126922
organization’s security controls. It aims to keep malicious users out while also
mitigating risky users within your organization, AlgoSec( 2022).
To specify who, what, when, where, and how users and devices can
access network resources and services. Examples of Access Cards,
Biometrics, Face Recognition, and Fingerprint to access the Ozone
Insurance Data Centre.
3
Student No. 2126922
To define how the organization encrypts and decrypts, its network data
and communications. Example VNP tunnel for employees to access the
office while away from the office.
III. Backup and recovery policies
To define how the organization backs up and restores its network data
and systems in case of a disaster, outage, or incident.
To define how the organization expects its users and devices to use the
network resources and services responsibly and ethically.
To define how the organization educates and trains its users and staff on
network security best practices and policies.
It’s easy to protect some data that is valuable to you only. You could store your
pictures or ideas or notes on an encrypted thumb drive, locked away in a spot where
only you have the key, but companies and organizations have to deal with this on a vast
4
Student No. 2126922
scale. After all, it’s the company data—products, customer and employee details, ideas,
research, and experiments—that make your company useful and valuable.
The “assets” we normally think of, like hardware and software, are simply the
tools that allow you to work with and save your company data, Chrissy Kidd (2020).
The core components and objectives of network security are defined by the CIA
Security Triad:
Fig 1
Confidentiality: A system’s ability to ensure that only the correct, authorized
user/system/resource can view, access, change, or otherwise use data.
5
Student No. 2126922
Integrity: A system’s ability to ensure that the system and information are
accurate and correct.
Availability: A system’s ability to ensure that systems, information, and services
are available the vast majority of the time.
In a world that is evolving together with the Internet of Things (IoT), this is a new
normal way of increasingly complex Network security. Network architecture is
constantly under threat from unauthorized users who are also evolving and
continuously finding ways to identify vulnerabilities in network security and
exploit them. Therefore, the CIA Security Triad is no longer enough, below is a
table for some other components that Ozone Insurance Company should include in
network security.
6
Student No. 2126922
7. IT Security measures
An effective policy is to set clear standards where an expectation can be drawn for
the IT Network security team. Reports required by policies should adhere and
compile to the policy as agreed, this will enable the IT Network security team to
measure their success in meeting the goals of the policies.
Employees always strive- and willingly to succeed, therefore falling short can also
be used to justify increases in resources when a justification is needed. For
example, if reports are required by the SAP or Windows patch management policy
to show that the patch is critical and updates take longer than anticipated, then
management can consider adding more resources or outsourcing some functions.
7
Student No. 2126922
b) Risk analysis
The term risk analysis refers to the assessment process that identifies the
potential for any adverse events that may negatively affect organizations and
the environment, Adam Hayes(2023).
list all possible potential risks you may encounter from internal threats and
external threats from outside forces. Analyzed and evaluated based on the
likelihood of success or the projected impact the benefits might have.
Involve many departments with the company, you may also benchmark the
companies that had similar risks before.
8
Student No. 2126922
Identify troublesome areas in the company and analyze the current state of
an organization to better understand needs or gaps that are already known.
A business may see a potential risk looming and want to know how the
situation may impact the business.
Example: the IT department has assessed that there is only a 1% chance that
trojan malware may have spread to other departments due to that the
Finance department has been on a special network zone all along. If it
happens, it will only cost the company N$ 2 million.
9
Student No. 2126922
3.1. Introduction
What is Security architecture
Security architecture is the design of the systems, processes, and policies that protect
an organization's data, assets, and users from cyber threats. It can be centralized or
decentralized, depending on how the security functions are distributed and coordinated
across the network, (Security Architecture Design,2023).
Centralized security architecture means that a single authority security team handles all
the security decisions, controls, and monitoring.
Decentralized security architecture means that multiple security departments handle the
security decisions, controls, and monitoring within their environment, and they don’t
propagate it to a higher level.
In this questionnaire, I will Compare and contrast and list the advantages and
disadvantages of centralized and decentralized security organization approaches, and
how to choose the best one for your security goals, resources, and context.
10
Student No. 2126922
Advantages disadvantages
Efficient communication cannel Bureaucratic command
Clear vision Remote controlled
Economical workplace delays
Decision-making is simple Employee dissatisfaction
Increases productivity
Advantages disadvantages
Quick decision and response time Problem coordinating
Better ability to expand the organization Increased expenditure
On-demand training incongruity in operations
appraisals self-centeredness
better utilization of management Reliance on hierarchy
Most of the time centralization security organizations become a bottleneck over some
time. It loses the connection to what's happening, and people get tired of absent
services. As time goes the inconsistencies create so much chaos and dissatisfaction in
organizational leadership, which leads to the cycle of starting over again. On the other
hand, decentralization security organizations' main issue is inconsistency and creates
11
Student No. 2126922
dislike between scattered security teams. There is no correct answer when choosing the
security architecture for the organization rather than aligning the security architecture
with the organization's business objectives and requirements to improve the security
architecture.
4. Reference
12
Student No. 2126922
13