CYB 410 Module Three Activity Worksheet Anthony Grider

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

410

Subject

Information Systems

Date

Nov 24, 2024

Type

docx

Pages

8

Uploaded by ChiefFogCrow

Report
CYB 410 Module Three Activity Worksheet Responding to Risk Scenario One: BYOD You work as an analyst for a fire station that has begun updating its bring your own device (BYOD) policy. Gaps have been identified in the current policy that would permit any employee to access the USB ports on their workstations. The firefighters want to use the USB ports to access movies and music during their free time. 1. What type of risk do you identify in this scenario? The current BYOD policy allows for any employee to use USB ports on their workstation. Allowing this activity to continue would leave the fire station open to potential data exfiltration, malware, and DoS attacks. 2. How does your identified risk impact the organization? Any data that is exposed may include malicious code, these hazards have the potential to impact the whole business by leaving the network open to attacks that might reveal any proprietary, sensitive, private, or confidential data. These codes might cause the network to lag or possibly go down completely, which would undermine the CIA's availability principle. The public's mistrust of the fire station will grow if an internal threat decides to sell or leak data to the public, perhaps exposing the station to legal repercussions. This may compromise the information that firefighters have provided about their exposure to viruses, carcinogens, and 1
other potential dangers in the Personal Exposure Reporting (PER) tool or the NFORS system. 3. How would you rate the probability and impact on a scale of low, medium, and high? This event would rate medium probability risk but high on the impact. This event is not likely to occur often but with the employees having access to so many different USB ports there is still the risk of it happening and the consequences would be severe. 4. What do you need to be successful in minimizing the risk? The administrator should develop an Acceptable Use Policy (AUP) and distribute a security strategy to reduce this risk. This strategy should incorporate least privilege implementation to guarantee that permitted devices do not have access to prohibited regions prior to being allowed onto the network, along with device registration, check-up, and approval mechanisms. Anti-virus and anti-malware software must be installed on all host-based workstations in case a malicious USB is placed into a workstation. This will stop an intruder from advancing over the network or carrying out any escalation assaults. The implementation of a VPN network with encryption should happen immediately if not already in place. Scenario Two: Data Retention 2
Your company does not currently have a data retention policy in place because of a limited IT budget that will not cover the costs of necessary hardware. There have been discussions about developing one, but the process has been shelved in favor of other projects. Despite this lack of policy for storing old data, for the next fiscal year, no money has been budgeted to buy hardware that could store the additional data long term. Storage space has been running out, and soon data will need to be deleted to make space for new data. 1. What type of risk do you identify in this scenario? This event may result in data corruption, server overloads, and storage capacity exhaustion, which might impair system performance, or even data packet leaks or dropouts when data is being sent. 2. How does your identified risk impact the organization? This even has the potential to result in data corruption from overheated servers and data leaks from lost packets, both of which would impair system performance and generate inefficiencies throughout the company. 3. How would you rate the probability and impact on a scale of low, medium, and high? This event has only a medium probability but a high potential impact. 4. What do you need to be successful in minimizing the risk? Establishing, putting into practice, and upholding a data retention strategy that will analyze and value-assess all stored data is necessary to mineralize such a risk. Any non-value or useless material ought to be removed. Any data that must be 3
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
kept up to date, including sensitive or proprietary data according to national and local laws has to be kept in storage, together with any safety configurations that ought to be put into practice and upheld. Rules and procedures for retention should be put in place to reduce any possible dangerous occurrences such as system logs, backup logs, lost or stolen data, and internal space loss or tiredness, to make it difficult for a threat actor to find. Scenario Three: Physical Security Your company is repainting the walls in its server room, which means a small team of additional workers has been granted access to the space. Usually, the door to enter the room is locked with a key card that prevents entry to anyone without preset permissions. Because the painters have been moving their own tools in and out, and because they want to keep the room ventilated, you notice one of them has decided to prop open the door. 1. What type of risk do you identify in this scenario? This event allows for multiple, usually not authorized, people to come and go out of the secured server room. Propping the door allows pretty much anyone to walk in and out unsupervised. This could lead to data leaks due to their having direct access to the servers. 5. How does your identified risk impact the organization? Any intruder can install malware, such as viruses, worms, and keyloggers to collect passwords, leak data, and construct back doors for lateral movement 4
within the network, among other things, with direct illegal access to the organization's servers. The potential consequences might destroy the company's assets and reputation. Additionally, there's a chance of legal repercussions like litigation, which might finally result in bankruptcy. 6. How would you rate the probability and impact on a scale of low, medium, and high? This event has a high probability since the door is propped open, and it will also have a significant effect because an intruder utilizing social engineering techniques has the time and chance to have access to the servers. 7. What do you need to be successful in minimizing the risk? Security guards, cameras, and temporary access cards that track the painters' access privileges must be installed to reduce the possibility of the servers' assets being completely compromised. The security personnel can ensure that the door remains propped open. The painters should be given access cards that can only be used to enter the server room during the renovations (implement least privileges). This will provide a digital trail for security and monitoring in addition to the security officer physically confirming that the person matches the badge. It is recommended to set the access card to activate just during the designated hours of the painters. Overall View (Scenarios One, Two, and Three) 5
8. What is your implementation strategy on a 30/60/90-day timeline? Scenario One: 30-Day Plan o The implementation of security policies o Configuration, Maintenance, and roll out of least privileges by employee roles. o Implementation of regular security awareness training o Implementation of security software on the network o Implementation of VPN software on the network Scenario One: 60-Day Plan o Configure the VPN as well as the rest of the network architecture such as firewalls and IPS. o Perform and review security logs for vulnerabilities. o Schedule regular security logs for review o Network penetration testing to evaluate how the newly installed program is operating and affecting productivity and security. o Implement a Mobile Device Management System to monitor employee devices on the network. Scenario One: 90-Day Plan o Implement an Acceptable Use Policy for safe and secure use of the internet while in the view of others. o Perform a checkup on the network to make sure new changes are working. 6
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Scenario Two: 30-Day Plan o Research hardware needs in order to find secure storage options. o Cost analysis on different storage options such as cloud storage. o Give risk report to Executives for budgeting. o Take inventory of all data as well as identify its value. o Attempt to obtain a list of all painters that will need access to the server room. Scenario Two: 60-Day Plan o Review what the potential budget will be and perform a cost analysis. o Wrap up the creation of the data retention plan and prepare for the rollout. o Test and analyze the new storage application for any bugs or errors. Scenario Two: 90-Day Plan o Ensure that the new storage systems are operating correctly and are in line with company standards. o Implement new training presentation for the new storage system. Scenario Three: 30-Day Plan o Assign the painter access badges in accordance with the applicable ACL regulations, which include active and inactive work hours, access expiration depending on the project completion date, and least privilege access (front entrance and server room door). o Check to make sure all server access is secured with multi-factor authentication. 7
o Make sure that all logins into the server are with complex credentials. o Implement a sign-in and sign-out sheet for every employee in and out of the server room. o Assure that there is a strict lunch and break time so as to not have anyone in the server room during those times. Scenario Three: 60-Day Plan o Maintain an accurate list of painter employee list, update as needed to add new hires or remove fired employees. o Maintain accurate log of sign in sheets, access logs, and least privileges for all current painter employees. Scenario Three: 90-Day Plan o Review access and server logs. o Review that project is on schedule. o Keep constant review on any updates for access. 8