CYB 200 Module Three Case Study TRQ
docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
200
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
7
Uploaded by ChancellorNightingale2248
CYB 200 Module Three Case Study
After reviewing the scenario in the Module Three Case Study Activity Guidelines and Rubric document, fill in the table below by completing the following steps:
1.
Specify which Fundamental Security Design Principle applies to the control recommendations by marking the appropriate cells with an X
.
2.
Indicate which security objective (confidentiality, availability, or integrity) applies best to the control recommendations.
3.
Explain your choices in one to two sentences with relevant justifications.
Control
Recommendations
Isolation
Encapsulation
Complete
Mediation
Minimize Trust
Surface
(Reluctance to
Trust)
Trust
Relationships
Security
Objective
Alignment
(CIA)
Explain Your Choices
(1–2 sentences)
Deploy an automated tool
on network perimeters that monitors for unauthorized transfer of sensitive information and blocks such transfers while alerting information security professionals.
X
C
I chose encapsulation because the automated tool is ensuring that the resources are being used as they should be. I chose confidentiality because the system is now preventing any confidential data from
being accessed by an unauthorized entity.
Monitor all traffic leaving the organization to detect any unauthorized use.
X
C/I
I chose complete mediation because access should be checked to ensure that it is allowed. I chose confidentiality because monitoring the traffic prevents confidential info is not
Control
Recommendations
Isolation
Encapsulation
Complete
Mediation
Minimize Trust
Surface
(Reluctance to
Trust)
Trust
Relationships
Security
Objective
Alignment
(CIA)
Explain Your Choices
(1–2 sentences)
leaving an organization unauthorized. I also chose integrity because the integrity of the confidential info is important to the organization.
Use an automated tool, such as host-based data loss prevention, to enforce access controls to data even when data is copied off a system.
X
X
X
C
I chose encapsulation, complete mediation, and trust relationships
because they all help to prevent data loss by protecting the systems, ensuring that
access to said data is permitted and that accessing data from a device separate from the host is allowed. This is considered confidentiality because access to the data should only be viewed by those authorized to access it, regardless from where it is being accessed.
Control
Recommendations
Isolation
Encapsulation
Complete
Mediation
Minimize Trust
Surface
(Reluctance to
Trust)
Trust
Relationships
Security
Objective
Alignment
(CIA)
Explain Your Choices
(1–2 sentences)
Physically or logically segregated systems should be used to isolate higher-risk software that is required for business operations.
X
A
I chose isolation because by segregating the systems isolates the data to where it should be accessed. This limits the availability of the high-risk data to only those authorized to access it.
Make sure that only the resources necessary to perform daily business tasks are assigned to the end users performing such
tasks.
X
C
I chose trust relationships because the rights and privileges of the users is established by the connection to their devices. I chose confidentiality because this ensures that data is not accessed by an unauthorized entity in error.
Install application firewalls
on critical servers to validate all traffic going in and out of the server.
X
I
A firewall protects the
network and ensures that data coming or leaving the organization is
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
Control
Recommendations
Isolation
Encapsulation
Complete
Mediation
Minimize Trust
Surface
(Reluctance to
Trust)
Trust
Relationships
Security
Objective
Alignment
(CIA)
Explain Your Choices
(1–2 sentences)
protected and authorized. This helps keep the integrity of the data.
Require all remote login access and remote workers to authenticate to the network using multifactor authentication.
X
X
C
I chose complete mediation because MFA is one way of checking that access to a network is allowed. I chose trust relationships because remote access is a logical connection to the network by the user and shared with a
remote device. I chose
confidentiality because MFA keeps the data within the network confidential.
Restrict cloud storage access to only the users authorized to have access and include authentication verification
through the use of multi-
factor authentication.
X
X
C
Restricting access to authorized users is one way to keep access to the network secure with complete mediation and trust relationships. This access or lack there of keeps the
Control
Recommendations
Isolation
Encapsulation
Complete
Mediation
Minimize Trust
Surface
(Reluctance to
Trust)
Trust
Relationships
Security
Objective
Alignment
(CIA)
Explain Your Choices
(1–2 sentences)
confidentiality of the data secure by limiting
who has access to the data.
Make sure all data-in-
motion is encrypted.
X
C/I
Data needs to be always protected and especially when in motion. Encryption protects the confidentiality and integrity of data while it moves from system to system.
Set alerts for the security team when users log into the network after normal business hours, or when users access areas of the network that are unauthorized to them.
X
X
I
I chose encapsulation and complete mediation because the alerts that are set ensure that the network and/or data is being used and accessed when it should be. The alerts protect the integrity of the data so that it can not be altered by an unauthorized user and the IT team will be alerted if access happens and the user
Control
Recommendations
Isolation
Encapsulation
Complete
Mediation
Minimize Trust
Surface
(Reluctance to
Trust)
Trust
Relationships
Security
Objective
Alignment
(CIA)
Explain Your Choices
(1–2 sentences)
is not authorized to do
so.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
After you have completed the table above, respond to the following short questions:
1.
Is it possible to use DataStore and maintain an isolated environment
? Explain your reasoning.
It is not possible to maintain an isolated environment while using DataStore because it is a shared infrastructure, according to our case study. It is a public platform that can be accessed so there is not a way to keep it isolated.
2.
How could the organization have more effectively applied the principle of minimizing trust surface
with DataStore to protect its confidential data? Explain your reasoning.
The organization could have had a better understanding of how DataStore would protect their confidential data and ask questions if they were unsure about how their data would be handled. Since the user who was able to transfer the data was an intern, minimizing trust surface would have prevented the intern from having access to the data. Their role as an intern could have stricter access to components or systems to prevent this from occurring again.
3.
How can the organization build a more security-aware culture
from the top down to prevent mistakes before they happen? Explain your reasoning.
To build a more security-aware culture, the organization should understand how and where the data is stored with each vendor, they do business with. They should conduct annual training, conduct phishing tests to test employee’s knowledge and understanding of the information security policy. IT departments should reassess their policies once they are made aware of any breaches or mistakes. Employees should feel empowered to notify their IT team when they think something is wrong and not keep it to themselves. This would build trust within the departments, employees, and the organization as a whole.