CYB 410 Module Three Activity Worksheet Anthony Grider
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
410
Subject
Information Systems
Date
Nov 24, 2024
Type
docx
Pages
8
Uploaded by ChiefFogCrow
CYB 410 Module Three Activity Worksheet
Responding to Risk
Scenario One: BYOD
You work as an analyst for a fire station that has begun updating its bring your own device
(BYOD) policy. Gaps have been identified in the current policy that would permit any employee
to access the USB ports on their workstations. The firefighters want to use the USB ports to
access movies and music during their free time.
1.
What type of risk do you identify in this scenario?
The current BYOD policy allows for any employee to use USB ports on their
workstation. Allowing this activity to continue would leave the fire station open to
potential data exfiltration, malware, and DoS attacks.
2.
How does your identified risk impact the organization?
Any data that is exposed may include malicious code, these hazards have the
potential to impact the whole business by leaving the network open to attacks that
might reveal any proprietary, sensitive, private, or confidential data. These codes
might cause the network to lag or possibly go down completely, which would
undermine the CIA's availability principle. The public's mistrust of the fire station
will grow if an internal threat decides to sell or leak data to the public, perhaps
exposing the station to legal repercussions. This may compromise the information
that firefighters have provided about their exposure to viruses, carcinogens, and
1
other potential dangers in the Personal Exposure Reporting (PER) tool or the
NFORS system.
3.
How would you rate the probability and impact on a scale of low, medium, and high?
This event would rate medium probability risk but high on the impact. This event
is not likely to occur often but with the employees having access to so many
different USB ports there is still the risk of it happening and the consequences
would be severe.
4.
What do you need to be successful in minimizing the risk?
The administrator should develop an Acceptable Use Policy (AUP) and distribute
a security strategy to reduce this risk. This strategy should incorporate least
privilege implementation to guarantee that permitted devices do not have access
to prohibited regions prior to being allowed onto the network, along with device
registration, check-up, and approval mechanisms.
Anti-virus and anti-malware software must be installed on all host-based
workstations in case a malicious USB is placed into a workstation. This will stop
an intruder from advancing over the network or carrying out any escalation
assaults.
The implementation of a VPN network with encryption should happen
immediately if not already in place.
Scenario Two: Data Retention
2
Your company does not currently have a data retention policy in place because of a
limited IT budget that will not cover the costs of necessary hardware. There have been
discussions about developing one, but the process has been shelved in favor of other projects.
Despite this lack of policy for storing old data, for the next fiscal year, no money has been
budgeted to buy hardware that could store the additional data long term. Storage space has been
running out, and soon data will need to be deleted to make space for new data.
1.
What type of risk do you identify in this scenario?
This event may result in data corruption, server overloads, and storage capacity
exhaustion, which might impair system performance, or even data packet leaks or
dropouts when data is being sent.
2.
How does your identified risk impact the organization?
This even has the potential to result in data corruption from overheated servers
and data leaks from lost packets, both of which would impair system performance
and generate inefficiencies throughout the company.
3.
How would you rate the probability and impact on a scale of low, medium, and high?
This event has only a medium probability but a high potential impact.
4.
What do you need to be successful in minimizing the risk?
Establishing, putting into practice, and upholding a data retention strategy that
will analyze and value-assess all stored data is necessary to mineralize such a risk.
Any non-value or useless material ought to be removed. Any data that must be
3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
kept up to date, including sensitive or proprietary data according to national and
local laws has to be kept in storage, together with any safety configurations that
ought to be put into practice and upheld. Rules and procedures for retention
should be put in place to reduce any possible dangerous occurrences such as
system logs, backup logs, lost or stolen data, and internal space loss or tiredness,
to make it difficult for a threat actor to find.
Scenario Three: Physical Security
Your company is repainting the walls in its server room, which means a small team of
additional workers has been granted access to the space. Usually, the door to enter the room is
locked with a key card that prevents entry to anyone without preset permissions. Because the
painters have been moving their own tools in and out, and because they want to keep the room
ventilated, you notice one of them has decided to prop open the door.
1.
What type of risk do you identify in this scenario?
This event allows for multiple, usually not authorized, people to come and go out
of the secured server room. Propping the door allows pretty much anyone to walk
in and out unsupervised. This could lead to data leaks due to their having direct
access to the servers.
5.
How does your identified risk impact the organization?
Any intruder can install malware, such as viruses, worms, and keyloggers to
collect passwords, leak data, and construct back doors for lateral movement
4
within the network, among other things, with direct illegal access to the
organization's servers. The potential consequences might destroy the company's
assets and reputation. Additionally, there's a chance of legal repercussions like
litigation, which might finally result in bankruptcy.
6.
How would you rate the probability and impact on a scale of low, medium, and high?
This event has a high probability since the door is propped open, and it will also
have a significant effect because an intruder utilizing social engineering
techniques has the time and chance to have access to the servers.
7.
What do you need to be successful in minimizing the risk?
Security guards, cameras, and temporary access cards that track the painters'
access privileges must be installed to reduce the possibility of the servers' assets
being completely compromised. The security personnel can ensure that the door
remains propped open. The painters should be given access cards that can only be
used to enter the server room during the renovations (implement least privileges).
This will provide a digital trail for security and monitoring in addition to the
security officer physically confirming that the person matches the badge. It is
recommended to set the access card to activate just during the designated hours of
the painters.
Overall View
(Scenarios One, Two, and Three)
5
8.
What is your implementation strategy on a 30/60/90-day timeline?
Scenario One: 30-Day Plan
o
The implementation of security policies
o
Configuration, Maintenance, and roll out of least privileges by employee
roles.
o
Implementation of regular security awareness training
o
Implementation of security software on the network
o
Implementation of VPN software on the network
Scenario One: 60-Day Plan
o
Configure the VPN as well as the rest of the network architecture such as
firewalls and IPS.
o
Perform and review security logs for vulnerabilities.
o
Schedule regular security logs for review
o
Network penetration testing to evaluate how the newly installed program
is operating and affecting productivity and security.
o
Implement a Mobile Device Management System to monitor employee
devices on the network.
Scenario One: 90-Day Plan
o
Implement an Acceptable Use Policy for safe and secure use of the
internet while in the view of others.
o
Perform a checkup on the network to make sure new changes are working.
6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Scenario Two: 30-Day Plan
o
Research hardware needs in order to find secure storage options.
o
Cost analysis on different storage options such as cloud storage.
o
Give risk report to Executives for budgeting.
o
Take inventory of all data as well as identify its value.
o
Attempt to obtain a list of all painters that will need access to the server
room.
Scenario Two: 60-Day Plan
o
Review what the potential budget will be and perform a cost analysis.
o
Wrap up the creation of the data retention plan and prepare for the rollout.
o
Test and analyze the new storage application for any bugs or errors.
Scenario Two: 90-Day Plan
o
Ensure that the new storage systems are operating correctly and are in line
with company standards.
o
Implement new training presentation for the new storage system.
Scenario Three: 30-Day Plan
o
Assign the painter access badges in accordance with the applicable ACL
regulations, which include active and inactive work hours, access
expiration depending on the project completion date, and least privilege
access (front entrance and server room door).
o
Check to make sure all server access is secured with multi-factor
authentication.
7
o
Make sure that all logins into the server are with complex credentials.
o
Implement a sign-in and sign-out sheet for every employee in and out of
the server room.
o
Assure that there is a strict lunch and break time so as to not have anyone
in the server room during those times.
Scenario Three: 60-Day Plan
o
Maintain an accurate list of painter employee list, update as needed to add
new hires or remove fired employees.
o
Maintain accurate log of sign in sheets, access logs, and least privileges
for all current painter employees.
Scenario Three: 90-Day Plan
o
Review access and server logs.
o
Review that project is on schedule.
o
Keep constant review on any updates for access.
8