Blumenstein_E_CST610_Project_4
docx
keyboard_arrow_up
School
University of Maryland *
*We aren’t endorsed by this school
Course
610
Subject
Information Systems
Date
Jan 9, 2024
Type
docx
Pages
9
Uploaded by afeeblemind
CST 610 Project 4
Cyberspace and Cybersecurity Foundations
Technical Controls Report
for FICBank
Prepared By: Elliott Blumenstein
Version 1.0
CST610
Page ii
Table of Contents
Table of Contents
.......................................................................................................................
ii
1.
Executive Summary
..........................................................................................................
3
2.
Technical Control Scope
...................................................................................................
3
3.
Technical Control Implementation Details
.......................................................................
3
4.
Test and Evaluation Methodology
....................................................................................
3
5.
T&E Findings
....................................................................................................................
3
6.
Conclusion
.........................................................................................................................
3
CTEC610
Page 3
1.
Executive Summary
Provide a brief summary of what you were asked to do, what did, and what results
were obtained. Be certain to indicate how many controls you implemented, how many
passed your test and evaluation.
The advancement of technology has improved society significantly. But, with the
advancement comes the risks. Technical controls are a necessity for any company.
FICBank is looking to determine what technical controls would be the most
appropriate. 2.
Technical Control Scope
Also, include your Predictions here in a separate paragraph.
The scope of my technical control implementation for FICBank would encompass a range of measures designed to ensure security, compliance, and efficient operations. The common elements of this scope would include:
1.
Cybersecurity measures:
a.
Firewall and Intrusion Detection system to monitor and protect the network from unauthorized access.
b.
Installing and maintaining antivirus and anti-malware programs to protect the systems.
c.
Conduct security audits and vulnerability assessments to identify and reduce potential risks.
2.
Data Protection and Privacy:
a.
Encryption of sensitive data, both in transit and at rest, to safeguard customer information.
b.
Implement data privacy policies in compliance with relevant regulations (like GDPR, if applicable).
c.
Secure data backup and disaster recovery procedures to prevent data loss and ensure
business continuity.
3.
Access Controls:
a.
Strong authentication mechanisms, possibly including multi-factor authentication, to
control access to systems and data.
b.
Role-based access controls to ensure employees have only the necessary access rights to perform their duties.
c.
Regularly review and update access rights, significantly when employees change roles or leave the bank.
4.
Compliance with Banking Regulations:
a.
Compliance with financial regulations such as Basel III, Sarbanes-Oxley Act, or local banking regulations.
b.
Regular reporting and audits to demonstrate compliance with these regulations.
5.
Network Management and Monitoring:
a.
Continuous monitoring of network traffic to detect and respond to unusual activities that could indicate a security threat.
b.
Regular updates and patches to network infrastructure to address security vulnerabilities.
c.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
CTEC610
Page 4
6.
Employee Training and Awareness:
a.
Regular training programs for employees on cybersecurity best practices and awareness of phishing and other social engineering attacks.
b.
Policies and procedures for reporting security incidents.
7.
Customer-facing Technologies:
a.
Secure online banking platforms with robust authentication methods.
b.
Implementation of secure mobile banking apps with regular updates for security enhancements.
8.
Vendor and Third-Party Risk Management:
a.
Procedures to assess and manage risks associated with third-party vendors, especially those who handle sensitive data or critical banking functions.
b.
9.
Incident Response Plan:
a.
A well-defined incident response plan to address and mitigate the impact of security breaches or data loss incidents.
b.
System
Services/Application
EC2AMAZ-O8AHUB0
Cloud Computing
CodeMeter Runtime Web application: Used for software licensing and protection
X-Server
Display graphical problems from a UNIX/Linux
machine on your local computer.
X11 server
Remote Desktop Protocol
Cipher Suites
Set of cryptographic algorithms; create keys and
encrypt information
Splunk-free detection system
Intrusion Detection System: The infrastructure monitoring tool runs on the remote host and is protected using default administrator credentials.
Transport Layer Security
Security protocol designed to facilitate privacy and data security.
SSH
Secure Shell
MSRPC
Microsoft Remote Procedure Call
NETBIOS-SSN
Network BIOS Session Service
MICROSOFT-DS
Used by Server Message Block; network protocol used in Windows networks for sharing resources over a network
SENTINELSRM
Software license protection system
VMRDP
Virtual Machine Remote Desktop Protocol
MS-WBT-SERVER
Microsoft Web Based Terminal Server
VNC-HTTP
Virtual Network Computing remote desktop protocol for use over HTTP
VNC
Virtual Network Computing
HTTP-ALT Alternate HTTP port
CTEC610
Page 5
3.
Technical Control Implementation Details
Refer to previous project reports for indications of where systems within the control scope have vulnerabilities or indicators of attack. For each control, you must include the following:
Control number: start at 001 and increment
Type: preventative, detective, recovery
System: the system name, ip address, and operating system
Application or Service: the application or service name, version number
Implementation Procedure: list the exact steps followed to implement the control
4.
Test and Evaluation Plan
Write a concise test plan for each control listed in the previous section. Document the plan using the following outline:
Control number: use the control number from section 3 above
Test procedure: use a numbered list containing the exact steps to be followed in carrying out the control test
5.
Test and Evaluation Findings
Document how you tested each control after implementation and the results of the test
. You can use the following outline:
Control number: use the control number from section 3 above
Test outcomes: indicate the set of possible test outcomes
Screenshot: include a screenshot of the test results with the current day and time clearly visible
Testing the technical controls of a small bank involves a combination of regular audits, simulations, and continuous monitoring to ensure that the controls are effective and compliant with industry standards and regulations. Here’s a structured approach to testing these controls:
Vulnerability Assessment and Penetration Testing (VAPT):
Conduct regular vulnerability assessments to identify potential weaknesses in the bank's systems and network.
Perform penetration testing by simulating cyber attacks to test the effectiveness of security measures.
Security Audits:
Engage external auditors to conduct comprehensive security audits. This includes reviewing policies, procedures, and technical controls.
Ensure the audit covers compliance with relevant regulations and standards, like PCI DSS for payment
CTEC610
Page 6
processing, GDPR for data protection, etc.
Access Control Reviews:
Periodically review and verify access controls and privileges to ensure they are appropriate and adhere to the principle of least privilege.
Conduct mock scenarios to test the effectiveness of role-based access controls.
Disaster Recovery and Business Continuity Testing:
Test the disaster recovery plan to ensure the bank can quickly resume operations after an incident. This may include simulated drills of various scenarios (e.g., data center outage).
Review and test backup systems to ensure data integrity and recoverability.
Network Security Monitoring and Analysis:
Regularly monitor network traffic and analyze logs to identify unusual patterns or potential breaches.
Use intrusion detection systems (IDS) and intrusion prevention systems (IPS) to test real-time security monitoring.
Employee Training and Phishing Simulation:
Conduct regular training sessions on cybersecurity best practices.
Simulate phishing attacks to test employees’ awareness and response to social engineering tactics.
Application Security Testing:
Perform security testing on internal and customer-facing applications, including static and dynamic application security testing (SAST and DAST).
Check for common vulnerabilities like SQL injection, cross-site scripting, and ensure secure coding practices are followed.
Physical Security Checks:
Test physical access controls to data centers and other sensitive areas to ensure they are secure and functioning as intended.
Conduct regular inspections of facilities for compliance with physical security measures.
Compliance Review:
Regularly review compliance with banking and financial regulations.
Update and test controls in response to changes in regulatory requirements.
Incident Response Drill:
Conduct simulated cybersecurity incident response drills to test the effectiveness and timeliness of the bank’s incident response plan.
Review and improve the incident response plan based on drill outcomes.
Third-Party and Vendor Risk Assessment:
Evaluate the security and compliance postures of third-party vendors and partners, especially those with access to sensitive data.
Customer Feedback and Interface Testing:
Collect and analyze customer feedback on online banking services to identify potential security or usability issues.
Test the security of customer interfaces, including online and mobile banking platforms.
Regular testing and updating of these controls are crucial for maintaining a robust security posture in the rapidly evolving landscape of cybersecurity threats and regulatory requirements.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help
CTEC610
Page 7
6.
Conclusion
Document your reflections here in a numbered list. Refer back to your predications! Also,
include the source question with your response in the format: What is a reflection
question? A reflection is an opportunity.
CTEC610
Page 8
CTEC610
Page 9
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help