CYB_200_Project_Two_Victoria_Thibodeaux

docx

School

CUNY John Jay College of Criminal Justice *

*We aren’t endorsed by this school

Course

MISC

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

4

Uploaded by VET0003

Report
Incident Analysis Brief: Strengthening Security Posture Scenario Analysis: Security Objective: Confidentiality In the given scenario, the most relevant security objective for the organization is confidentiality. The breach of confidentiality poses a significant threat to the organization's sensitive information, potentially leading to severe consequences. Therefore, the organization must take the necessary steps to protect their data's confidentiality and privacy. Regular security checks and audits should be conducted to ensure that any vulnerabilities are addressed quickly. Additionally, effective employee training and awareness programs should be implemented to help reduce the risk of a breach. Impact Analysis: The loss of confidentiality reflects the greatest overall negative impact on the organization due to the following reasons: 1. Financial Impacts: Unauthorized access to sensitive financial data can result in financial losses, impacting organization stability and reputation. 2. Reputation Damage: A breach of confidentiality can erode trust among clients, partners, and stakeholders, leading to long-term damage to the organization's reputation. 3. Regulatory Compliance: Depending on the nature of the compromised data, the organization may face legal consequences for violating data protection regulations, resulting in fines and legal actions. 4. Operational Disruption: Confidentiality breaches can disrupt normal business operations, causing delays and operational downtime.
Recommendations: Fundamental Security Design Principles: Least Privilege and Encryption (a form of encapsulation) 1. Least Privilege: o Implement the principle of least privilege to restrict access rights for users and systems. Users should have the minimum access required to perform their job functions. o This ensures that even if unauthorized access occurs, the potential damage is limited, reducing the negative impact on people, processes, and technologies. 2. Encryption (Encapsulation): o Adopt encryption mechanisms to protect sensitive data in transit and at rest. This ensures that even if confidentiality is compromised, the unauthorized party cannot interpret the information without the appropriate decryption key. o By applying encapsulation through encryption, the organization adds an extra layer of protection, mitigating the risk of unauthorized access and limiting negative impacts. Balancing Impacts: The recommended solutions aim to balance impacts on people, processes, and technologies:
1. People: Training programs should be implemented to educate employees on the importance of confidentiality and the role they play in maintaining it. This ensures that the human factor becomes a part of the defense against breaches. 2. Processes: Integration of access control measures and encryption protocols into existing processes may cause initial disruptions. However, with proper planning and communication, these changes can be seamlessly integrated, enhancing security without compromising operational efficiency. 3. Technologies: Implementation of encryption and least privilege may require investments in new technologies. However, the long-term benefits in terms of enhanced security outweigh the initial costs. Most Important Aspect: The aspect I would recommend as most important to the organization is the implementation of encryption . Encryption, as a form of encapsulation, not only directly addresses the loss of confidentiality but also provides a robust and versatile layer of protection for sensitive information. It safeguards data during transmission and storage, aligning with the organization's need to secure information in various states. The investment in encryption technology is crucial for building a resilient security posture in the face of evolving cybersecurity threats. Supporting Evidence: The scenario emphasizes the organization's vulnerability to data breaches, and coursework highlights encryption as a fundamental mechanism to protect confidentiality in a variety of contexts. Encryption is an integral component of any organization's cybersecurity strategy, and the implementation of encryption should be a priority for any organization that
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
handles sensitive customer information. Encryption can help to protect customer data from unauthorized access, as well as malicious software and malicious actors. Therefore, encryption should be implemented to ensure the organization's security. Encryption should be implemented for all data, both in transit and at rest. Additionally, it should be regularly monitored and reviewed to ensure it remains effective. Finally, proper training should be offered to the organization's staff to ensure they are aware of the risks and mitigation measures. Regular audits should be conducted to ensure that encryption is correctly implemented and enforced. All staff should be held accountable for any security breaches or vulnerabilities. Finally, the organization should implement a system of regular backups to protect against data loss.