CYB+200+Module+Three+Case+Study+Colby

docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

200

Subject

Information Systems

Date

Oct 30, 2023

Type

docx

Pages

5

Uploaded by DukeFog10607

Report
CYB 200 Module Three Case Study Template After reviewing the scenario in the Module Three Case Study Activity Guidelines and Rubric document, fill in the table below by completing the following steps: 1. Specify which Fundamental Security Design Principle applies to the control recommendations by marking the appropriate cells with an X . 2. Indicate which security objective (confidentiality, availability, or integrity) applies best to the control recommendations. 3. Explain your choices in one to two sentences with relevant justifications. Control Recommendations Isolation Encapsulation Complete Mediation Minimize Trust Surface (Reluctance to Trust) Trust Relationships Security Objective Alignment (CIA) Explain Your Choices (1–2 sentences) Deploy an automated tool on network perimeters that monitors for unauthorized transfer of sensitive information and blocks such transfers while alerting information security professionals. X I This would be an example of using a resource as it was designed to be used while determining if unauthorized transfers are happening. This is integrity in the CIA Triad. Monitor all traffic leaving the organization to detect any unauthorized use. X C This would be an example of Complete Mediation as it monitors all the traffic to make sure there isn’t any issues, and that the data is safe. This is considered Confidentiality. Use an automated tool, such as host-based data loss prevention, to X I This would be an example of Encapsulation as it is
Control Recommendations Isolation Encapsulation Complete Mediation Minimize Trust Surface (Reluctance to Trust) Trust Relationships Security Objective Alignment (CIA) Explain Your Choices (1–2 sentences) enforce access controls to data even when data is copied off a system. using a tool as intended to enforce access control to data. This would be considered integrity. Physically or logically segregated systems should be used to isolate higher-risk software that is required for business operations. X A This would be considered isolation because it individualizes the processes or tasks running in their own space. Under CIA triad, it would be under Availability. Make sure that only the resources necessary to perform daily business tasks are assigned to the end users performing such tasks. X C This would be an example of minimizing trust surfaces as it reduces the degree in which the user or component depends on the reliability of another. This would fall under confidentiality. Install application firewalls on critical servers to validate all traffic going in and out of the server. X I This would be Complete Mediation because the firewalls are checking all traffic to verify its safe to
Control Recommendations Isolation Encapsulation Complete Mediation Minimize Trust Surface (Reluctance to Trust) Trust Relationships Security Objective Alignment (CIA) Explain Your Choices (1–2 sentences) enter. This falls under integrity. Require all remote login access and remote workers to authenticate to the network using multifactor authentication. X C Restricting all access to users not under certain access would be considered Complete Mediation as it only allows those who are fully vetted before entering the network. This is considered confidentiality. Restrict cloud storage access to only the users authorized to have access, and include authentication verification through the use of multi-factor authentication. X C Restricting access to only the users who are authorized to do so would fall under complete mediation as it only allows those who are authorized to access the network. This is another example of Confidentiality. Make sure all data-in- motion is encrypted. X C This would be an example of minimize trust surfaces because all the data is encrypted which
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help
Control Recommendations Isolation Encapsulation Complete Mediation Minimize Trust Surface (Reluctance to Trust) Trust Relationships Security Objective Alignment (CIA) Explain Your Choices (1–2 sentences) reduces the degree to which the user depends on the information. This would fall under Confidentiality. Set alerts for the security team when users log into the network after normal business hours, or when users access areas of the network that are unauthorized to them. X I This would be Trust relationships because it shows privileges being shared with another. This would fall under integrity.
After you have completed the table above, respond to the following short questions: 1. Is it possible to use DataStore and maintain an isolated environment ? Explain your reasoning. DataStore is a public, cloud-based platform that is used in the sharing of information with the public and customers. Employees can make mistakes and there is no way to use DataStore in an isolate environment since it is a shared platform. 4. How could the organization have more effectively applied the principle of minimizing trust surface with DataStore to protect its confidential data? Explain your reasoning. The organization could minimize trust surface by only letting certain users who are more vetted to upload information to the platform. For example, the employees or users trying to gain access can send info to the security team to make sure there is a review process prior to allowing access to upload. 5. How can the organization build a more security-aware culture from the top down to prevent mistakes before they happen? Explain your reasoning. By only allowing employees access to the information as needed and checking to make sure those employees are using encrypted devices that are authorized. Training for employees new and old on being aware of any potential security risks or issues. Also, with training on a regular basis, mistakes will tend to happen less.

Browse Popular Homework Q&A

Q: Problem #4: Use the divergence theorem to find the outward flux F.n dS of the vector field F =…
Q: A negative value for slack indicates: the problem is feasible O the problem is infeasible there may…
Q: If an excitatory neurotransmitter binds to the post-synaptic neuron, what type of an event will that…
Q: Complete ventricular filling occurs during what phase of the cardiac cycle? a. when the atria are…
Q: Evaluate the double integral. 4y 1634², 0-{(x,x108281,0882²} D = {(x, y) 1 0 ≤ x ≤ 1,0 ≤ y ≤ x²} 5x5…
Q: A. Baylor University hospital plan
Q: The scatter chart below displays the residuals verses the dependent variable, x. Which of the…
Q: Outside a home, there is a 5-key keypad with letters A, B, C, D and, E that can be used to open the…
Q: 11. A unit mass hangs in equilibrium from a spring with constant k = 1/16. Starting at t = 0, a…
Q: In 2015, Addison Group and Kelton surveyed the work preferences and attitudes of 1006 working adults…
Q: Table 3. Descriptive Statistics for Points Scored by Your Team in Away Games Statistics for the Nets…
Q: Find the volume of the region bounded below by the plane z = 0, laterally by the cylinder x2 + y2 =…
Q: Under stressful conditions epinephrine is released from the adrenal medulla. The release of…
Q: = You see Michael and Nikita agree on a secret key using the Diffie-Hellman key exchange. Michael…
Q: Configure Linux to log security events of interest. Pick 3 events to log and explain why you chose…
Q: Finding an Equation of a Tangent Line In Exercises43–46, find an equation of the tangent line to the…
Q: Men were allowed to attend the 1848 Women's Rights Convention at Seneca Falls, New York.  true or…
Q: Between 1790 and 1850, the United States saw A. its population grow by nearly 600 percent B. the…
Q: I need the line to be a thin black line so the scatterplot does not "disappear".  How to I format…
Q: Write a short analysis of the similarities and differences between managers and leaders on a unit of…
Q: 5 4 3 2 1 T/2 Зп/2 2n -1 -2 -3 -4 -5 The graph of the function f(x): for the interval x E 0, 27…
Q: Raw Materials Inventory Debit Credit 46,400 25,650 9,400 Work in Process Inventory Debit Credit…