SlideShare a Scribd company logo
1 of 14
UNIT 11.
P4
Security plan:(definitionfromwiki.internet2.edu) adocumentedapproachthataddresseshow an
organizationwill implementsecuritymeasures.
But in the case of the I.Tworld: (definitionfromgarlic.com) a documentthatispublishedbythe line
managerof an IT systemandpresentsthe meansbywhichthatmanagerintendstosecure the
system.
An (I.T) securityplanfora business,wouldinclude several,if notall of the securitymeasures
describedinthe previousPowerPointsforthe unit,the tasksP3, andM2 coverthiswell.
Purpose
The purpose of thisreport isto showthe “standard operatingprocedures”relatingto“cyber
security”.Itcontainsa comprehensive overview of the differentsecuritymeasures, plansand
procedures.Thisrelatestoabusinesswithlotsof online activity,aswell asotheractivities,like
phone,andface-to-face communication;anexampleof thiswouldbe asolicitorscompany.
Current security measures
The businessthatI am talkingaboutwill be asolicitorscompany,asa solicitorscompanytheywill
have a branch for face-to-face communicationwithcustomers,andasa place to store information
and conductday-to-daybusiness.Asabuildingseveral physical securitymeasuresare alreadyin
place.Aswell assome cyber-securitymeasures.
Cameras
There are 2 outdoorsecuritycameras,coveringthe frontandback exit.There are also2 indoor
cameras,coveringthe manager’soffice andthe workersarea.The camerasare checkedwhen
necessary.
Virus protection
The businesshasa firewall tothe computers,butitnotupdatedregularly.Theyall have Avastanti-
viruspaidversion.Thiscoversspam-filters,andvirusprotection.
Updates
Software isnotupdatedregularly;itisupdatedwhenthe employee remembers.A servercouldfix
this,butit isnot usedproperly.
Backups
Backupsare completedbutnotregularly. Theycontainabackupof the previousserverstate,this
includesall data,butno data isback up to the cloud.
Internet
The internetissetup to be wireless,andhasno passwords,thisallowsanyone toaccessthe
network.NoMAC filtering issetup
UNIT 11.
Assets
Assetsof a businesscanvary,but forsolicitors,the assetscouldbe the customerdata,and the trade
secrets.The businesscouldhave itsfiguresforitsfinancial department.Itcouldalsohave itsown
marketingstrategies.Assetsshouldbe secured securely.
Differentassetsare:
1. Computers
2. Customerdata
3. Businessdocuments
4. Electrical equipment
5. Premises
Risks
In a businessthe risksshouldbe minimised,todothisa risk assessmentmustfirstbe carriedout,an
example isbelow.
1. Physical threats
 Theft of data
 Damage to hardware
2. Cyber-threats
 Malware---Spam
 Hardware failure
 Spyware
 Viruses
 Hackers
3. Natural disasters
4. Staff
a. Give up passwords through ‘social engineering’
b. Personal vendetta against you
UNIT 11.
Security Measures
1. Prevention
a. Firewall
b. Anti-Virusprogram
i. Spyware removal
ii. Virusremoval
c. OperatingSystem
i. UpdatingO.S
d. Removal of data
e. Staff
i. Stoppingpossible theft opportunities
2. Protection
a. Staff
i. Limitingtheiraccess
ii. Correct training
iii. Forcingpoliciesonstaff
b. Encryption
c. Backups
3. AccessControl
a. Administratorrights
b. DAC
c. MAC
d. PrioritisingRAM
4. Cloud
UNIT 11.
M3/D2 (and P5)
Prevention
Firewall
The use of a firewall,is thatof a preventativemeasure.The firewall,isdesignedtofilteroutwhatis
authorisedandwhatisnot. The internettraffic,goingthroughthe computer(s) isfilteredbythe
firewall,itstopsunauthorisedaccesstothe system, butallowsthe access of the webpage youwere
tryingto load.
Anysingle computerhasa firewall,butanetworkof computers,linkedthroughthe use of aserver.
Is able touse the networkfirewall,thisallowsgreatercontrol of whatispermittedandwhatisnot,
so the playingof gamesbythe employees,couldbe stoppedonthe networkfirewall,insteadof
individuallygoingroundtoeachcomputerto blockit.
OperatingsystemslikeWindowshave abuiltinfirewall,butthe router(huborswitch) youare using,
alsoprovidesone. Thisisthe waythe serversimmediatelyblockunwantedinternetaccess,and
trafficwhichmaypotentiallyslowdownthe bandwidthof yournetwork.
A firewall shouldbe updatedtothe mostrecentversion;thisensuresthatitisworkingtothe bestof
itsability.A firewallshouldbe includedforanyonline activity.
Due to the fact thatno viruseshave beenfoundoveradurationof time (A full systemscanwas
regularlyconductedtocheckforthe presence of viruses),the firewall hasandcontinuestodoitsjob
of keepingthe systemsafe.
Anti-Virus software
Spyware removal
The use of spyware isfromthat of a hacker;it allowshim/heraccessintoyoursystem, toread on
files,inmostcases,the affectedisunaware of this.Ina businessworldthiscanbe tragicas it allows
a competitordetailsaboutyouandyourcustomers,andit alsobreachesthe data protectionact.
Thiscouldleadto a fine,orevena court sentence.
UNIT 11.
Most anti-virussoftware comesbuiltintoremove all typesof malware,whichincludesspyware.But
for itto do thisyoumust update the software tothe latestversion.
In a businessworld,the employeemaypurposelyorforgetfullynotdothe regularupdates,soanti-
virusfor businesses(aserver) isrequired,itallowsaccess tothe anti-virus,fromremote access.The
benefitof serveranti-virusisthatitupdatesand scans,accordingto the servermanager,sono
sabotage ispermitted.
Virus Removal
As itwas statedbefore,the use of anti-virusincludes the removalof spyware,andviruses.Viruses
can affectan all mannerof differentthings,because ‘virus’isabroadterm, itencompassesmany
typesof threats,but itcouldinclude the removal,of sensitive datawhistalsotakingitforitself.
The use of a server-wideanti-virusisusuallyapayfor option,butitis ultimatelyworthit,if itkeeps
your andyour customersdatasafe.
The software shouldbe regularlyupdatedandbe made to doroutine scans,to make sure nothing
goesontothe systemandno virusislefton the system.Anyinternetactivityshouldresultinthe
anti-virusprogramspresence.
Afterroutine scanswere completed,noviruseswere found,otheritems,suchastrackingcookies
were foundandwere removedeasily.Thisshowsthatthe anti-virussoftwarehasdone itsjob
effectively.
UNIT 11.
Operating System
The OS containsitsown setof defencesagainstattacks,suchas a firewall,andconstantpatches(see
below).
Updating OS
Patchesforflawsinthe OSand the securityof the systemare free andare rolledoutbythe provider,
theyare usuallyself-updating. Buttheycanbe changedto notdo-so.Thiscan be stoppedbyone of
twothings,administratorrightsforeachcomputer,orby havingthe entire systemlinkedupvia
server,the serveradminwould control the updates,thisisaformof the administratormethod(it’sa
formof admininitself).Butithasone benefit,itcancontrol all the computersat one,insteadof
goingroundeach one individually.
Afterthe updateswere installed,there werelittle tonone forreportedbugs,andnosecurityflaws
that people are aware of.
Althoughanupgrade to a laterO.S maybe neededinthe nearfuture asWindows7 will eventually
run out of supportfromMicrosoft.
Removal of Data
The removal of data properly, iskeytoaverting,accidentallylosingcustomerorbusiness
data/secrets. Fora businessdataiseitherstoredonthe cloudand/ora HDD, the HDD can be wiped
of anydata by eitherdestroyingthe drive,orbydeletingthe partitionthatitisheldon.For the sake
of cash-flow,re-usingthe drive wouldbe wiser.
If data is storedon the cloud,a simple delete woulderase the data,because the datawouldbe held
by large companies,the chancesof anyattack of theirservicesisminimal.
UNIT 11.
Althoughthisprogramwas installedonanUSB stick,it isan easy to use example usinganapplication
to be able to securelyremove files,soastheyare notable to be broughtback by a hacker
(comparedtobeingputin the normal ‘recyclingbin’).
Staff
Staff isa bigsecurityflawamongbusinesses,andsopart of itis describedhere underthe prevention
section,andthe otherpart is underthe protectionsection.
Preventing possible theft opportunities
Staff can eitherbe bribedintogoingagainstyou,ortheycan be trickedintogivingawayinformation,
otherreasonslike apersonal vendettaare aroundbutare notas commonas the firsttworeasons
mentioned.
If a rival companywantedinformationfromyou,theycouldbribe yourstaff,thiscouldbe togive
theiraccount passwords,orto retrieve informationanddeleteitafterwards.Whatthe rival
companydoeswiththe informationisuptothem, but itcouldbe tosteal a patentedtechnology,or
to informall of theircustomersabouttheircheaperrates.
To stop the informationtheft,constantpasswordchangesmustbe enforced,aswell asDACaccess
control (showninlaterpages),othersystemslike MACandAdministratorrights,thesecouldhelp
preventtheft.
Social engineeringiswhenanemployeeis trickedintogivingawayinformation,passwordsor
securityquestionsare possibilities,waystocounterthisare to use a worke-mail thatyouset upand
change passwordsautomatically,andtotrainyourstaff intoresistingsocial engineering.
UNIT 11.
Protection
Staff
Limiting their usage
For full details,thisiscoveredabove underthe section‘Prevention---Staff---Preventingpossible theft
opportunities”
Under the parental settingsfunction,thiscannotbe accessedbythe standarduser,onlythe
administratorcanuse thisfunction.Withthisyoucan control the time limitswhichthe usercanlog
on.But much more can be done,asshownbelow.
Correct training
For full details,thisiscoveredabove underthe section‘Prevention---Staff---Preventingpossible theft
opportunities”
UNIT 11.
Forcing policies on staff
For full details,thisiscoveredabove underthe section‘Prevention---Staff---Preventingpossible theft
opportunities”
Encryption
If data is to be transferredforsome reason,viaa removable orportable media(USBmemorysticks,
portable HDD’s,laptops,etc.).Thenincase of theftor loss,of the data; it mustbe encrypted.
Encryptionisa processof encodinginformationsoasonlyauthorisedpartiescanaccessthe media.
Unfortunately,mediacanbe decoded,sothe informationisreadabletounauthorisedusers.Strong
encryptions(sometimesmilitarygrade maybe needed) wouldbe needed,thisiswhere the
encryptionisalsoencrypted,againandagain.Mediaisnotrecommendedtobe movedabout, thisis
whymuch data isstoredon the cloud,where there isstrongencryptionsandthe mediaisaccessible
to the authorisedusersanywhere.
If data is transportedbya portable mediastorage.Thenitmustbe encryptedwithappropriate
encryptionsoftware.
All USB sticksusedbythe companyare now Lexardrivesthatcome with‘Secure 2’ free of charge.
Thisallowsanencryptionof data.But for more sensitive datathatmustbe moved,a more secure
applicationisneeded(of course the databeing transportedshouldalsobe savedtoanother,secure
location).Secure 2isa wayof encryptingdatawitha passwordtostop hackersand theifsfrom
seeingyourdata.
Backups
Sometimesanattackmay notbe to steal data,but to just delete itoff of yoursystems,if your
businessisverycustomeroriented (likeasolicitors),thencustomerdetaillosscouldpotentiallyruin
UNIT 11.
your business,andputitona standstill.Havingrecentbackupsof yourdata can ensure thatan
attack doesnot ruinyourbusiness.A recentbackupcouldmeanonlyminimal data(ornone) islost.
Thiswouldonlyhaltyourbusinessfora few hours,notweeks!
All businessesthathave acomputersystemshouldbe requiredtokeepregularbackupsinthe case
of a cyber-attack.
Thisscreenshotwastakenbefore itwasconfigured,todoautomaticbackups(asshown),butitcan
alsobe usedtorestore data,and if for some reasonthe mostrecentbackup iscorrupt, thena prior
backupcan be used!
It has beenankeyway of protectingagainst theft.
UNIT 11.
Access Control
Administrator rights
All companiesthathave a computersystemshoulduse the administratorfunctionality(admin).
Adminisa way of stoppingregularusersof changingsettingsandaccessingunwantedfiles.With
modernO.S’s like ‘Windows7’youcan not onlystopthe reversal of the changestosettingsbutyou
can onlyallowthe login,andusage of functionswithinacertaintime period,sothere wouldbe no
access to the computersoverlunch,orafter hourswhere there isno-one tosupervisethe staff.
Adminrightshave a huge range of possibilities,andshouldbe usedaccordinglywithall businesses.
A usercan be made administrator,thisgrantsmore poweroverthe otherusers,anditalsogrants
more depthintothe system. Noactual data shouldbe kepton the adminaccount,as it the account
firstto be attackedby hackers.
DAC
DAC (Discretionaryaccesscontrol);isamethodof controllingthe accessof filesandsettingsamong
a server.DACis discretionary,soitisupto the author of the documentwhomhasrightsand whom
doesn’t.A usercan be set usingthe useraccountson the OS, or the actual MAC addressof the
computer.A DAC setupwouldbe essential foramulti-tieredbusiness,withdifferentbranchesof
products.
A solicitorscompanymaynotneedtouse DAC, butif there are several branches,withashared
server,thenaDAC setupmay be worthwhile.
The DAC setupforthe server,isshownbelow.Itcanbe usedfromprograms suchas Microsoft
Office.Itallows the authortochoose userwhomcan read and/orwrite.
UNIT 11.
MAC
MAC (mandatoryaccesscontrol),isbetterdescribedonthe P3PowerPointforthe unit.Thiswould
be good fora companywhohas staff on roughlythe same level of expertise,withnotmanylevels,to
theirbusinesshierarchy.Thisisbecause the userisgivenalevel suchas“secret”or “top secret”,and
wouldthenbe able toaccess fileswiththe correspondingorlowersecuritytag.Soa solicitors
companycouldhave all of the basicemployeesable toaccessbasicfiles,whereasthe managercould
access all of that plusevenmore secretfiles.
MAC and DAC can be usedtogetherwhere necessary.
Thishas beenusedwell inthe servertostopstaff compromisingthe integrityof the businessescyber
security,andassets.
Prioritising RAM
If the systemallowsyoucanprioritise RAMforcertaintasks,thiswouldallow youtoisolate
privilegedprocessesfromnon-privilegedprocesses,thiscouldallow youtoonlyallow RAMfor
certainapplications,and sonounauthorisedapplicationswhichcouldpossiblybe aviruscanbe used
effectively.
Thiswouldbe an essential piece forasbusinesswhomisusingthe internetandcomputersformost
day-to-dayoperations.Itcouldpreventpotentialproblems,savingyoutime andmoney.
UNIT 11.
Cloud
The cloud isa useful tool tonegate the costsof any maintenance andrepairstoa small local server.
Usingthe cloudfromtrustedsourceslike Google,andMicrosoft,couldsave moneyastheylookafter
your data foryou,and as theyare verybigcorporations,the software usedtoprotecttheirdatais
immense.The businesscouldalsobenefitfromthe extrasthathavingthe cloudserverbrings.
Althoughif the businessinternetisdownfora periodof time,resultscouldbe catastrophicasno
data couldbe accessed.
Weighingupthe prosand cons.If the companyhas trust intheirISP,thenusinga cloudbasedserver
couldbe the bestwayto go.
UNIT 11.
P6
The securityplanput inplace. Has improvedthe securityof the businessdramatically.Fromthe side
of physical security,analarmsystemshouldhave putintoplace,aswell aslocksforthe computers
to stopthemfrom beingstolen.
Whenit comesto cyber-security,the updatesinstalledstoppedall knownsecurityflaws,andthe use
of an antivirusfoundandremovedviruseswhenplacedontothe computer(aspartof a test),italso
made usingthe webmuch safer.
The use of encryptionsoftware wasexcellent,butjustasa precaution,if more sensitive datawasto
be transported,thena betterpiece of software wouldbe used,togive ‘militarygrade encryption’.
The backups were good,astheyprovide acheap,quickmeansof restoringdata.
The access control methodshave workedperfectly amongthe server.The DACandMAC system
workswell,tostopunwantedeyeslookingintobusinessdocuments.
Usinga cloudbasedsystem,the dataisnow safe fromany majordisasters,suchasearthquakesand
tsunamis.Thisisbecause everythingstoredonthe cloudisstoredinseveral placesaroundthe globe.
The level of protectionfromthese servicesisimmense,anddoesnotneedtesting.

More Related Content

What's hot

Bring your own-computer_to work
Bring your own-computer_to workBring your own-computer_to work
Bring your own-computer_to workNetIQ
 
Secure Trustworthy Enterprise
Secure Trustworthy EnterpriseSecure Trustworthy Enterprise
Secure Trustworthy EnterpriseDMIMarketing
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowNuuko, Inc.
 
業界需求之資訊技術相關知識
業界需求之資訊技術相關知識業界需求之資訊技術相關知識
業界需求之資訊技術相關知識Ray James X
 
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...Chris Ross
 
Norman Patch and Remediation
Norman Patch and  RemediationNorman Patch and  Remediation
Norman Patch and RemediationKavlieBorge
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack
 
unistal in-Protegent Security - Home Business 1
unistal in-Protegent Security - Home  Business 1unistal in-Protegent Security - Home  Business 1
unistal in-Protegent Security - Home Business 1Vijay Kumar
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”IRJET Journal
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityUltraUploader
 
Network and network security
Network and network securityNetwork and network security
Network and network securityRuchi Gupta
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityIAEME Publication
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET Journal
 

What's hot (15)

Bring your own-computer_to work
Bring your own-computer_to workBring your own-computer_to work
Bring your own-computer_to work
 
Secure Trustworthy Enterprise
Secure Trustworthy EnterpriseSecure Trustworthy Enterprise
Secure Trustworthy Enterprise
 
Security technology
Security technologySecurity technology
Security technology
 
Dr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should KnowDr. Eric Cole - 30 Things Every Manager Should Know
Dr. Eric Cole - 30 Things Every Manager Should Know
 
業界需求之資訊技術相關知識
業界需求之資訊技術相關知識業界需求之資訊技術相關知識
業界需求之資訊技術相關知識
 
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...Data-centric Security: Using Information Protection and Control (IPC) Tools t...
Data-centric Security: Using Information Protection and Control (IPC) Tools t...
 
Norman Patch and Remediation
Norman Patch and  RemediationNorman Patch and  Remediation
Norman Patch and Remediation
 
ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012ClubHack Magazine issue 26 March 2012
ClubHack Magazine issue 26 March 2012
 
Security on z/OS
Security on z/OSSecurity on z/OS
Security on z/OS
 
unistal in-Protegent Security - Home Business 1
unistal in-Protegent Security - Home  Business 1unistal in-Protegent Security - Home  Business 1
unistal in-Protegent Security - Home Business 1
 
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”IRJET-  	  Review on “Using Big Data to Defend Machines against Network Attacks”
IRJET- Review on “Using Big Data to Defend Machines against Network Attacks”
 
Beyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus securityBeyond layers and peripheral antivirus security
Beyond layers and peripheral antivirus security
 
Network and network security
Network and network securityNetwork and network security
Network and network security
 
A honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network securityA honeynet framework to promote enterprise network security
A honeynet framework to promote enterprise network security
 
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...IRJET-  	  Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
IRJET- Image Steganography using Pixel Pattern Matching in Cloud Data Sto...
 

Similar to IT Security Plan Guide

Todd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfaquazac
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Ajay Jassi
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control AddressAngie Lee
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)Amare Kassa
 
Managing i.t security
Managing i.t securityManaging i.t security
Managing i.t securityOriginalGSM
 
Deployment websese
Deployment webseseDeployment websese
Deployment websesethanglx
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURESakshiSolapure1
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...Dana Gardner
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksEmmanuel Oshogwe Akpeokhai
 
[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...TI Safe
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsAnthony Daniel
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...IOSR Journals
 
Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Kenneth Regalado
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection SystemIJMTST Journal
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-ITIdan Hershkovich
 

Similar to IT Security Plan Guide (20)

Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
Todd Deshane's PhD Proposal
Todd Deshane's PhD ProposalTodd Deshane's PhD Proposal
Todd Deshane's PhD Proposal
 
Network security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdfNetwork security architecture is the planning and design of the camp.pdf
Network security architecture is the planning and design of the camp.pdf
 
Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices Security Plan for Small Networks/Offices
Security Plan for Small Networks/Offices
 
The Media Access Control Address
The Media Access Control AddressThe Media Access Control Address
The Media Access Control Address
 
CSEC630 individaul assign
CSEC630 individaul assignCSEC630 individaul assign
CSEC630 individaul assign
 
Security assignment (copy)
Security assignment (copy)Security assignment (copy)
Security assignment (copy)
 
Managing The Virtualized Enterprise New Technology, New Challenges
Managing The Virtualized Enterprise New Technology, New ChallengesManaging The Virtualized Enterprise New Technology, New Challenges
Managing The Virtualized Enterprise New Technology, New Challenges
 
Managing i.t security
Managing i.t securityManaging i.t security
Managing i.t security
 
PROJECT REPORT.docx
PROJECT REPORT.docxPROJECT REPORT.docx
PROJECT REPORT.docx
 
Deployment websese
Deployment webseseDeployment websese
Deployment websese
 
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPUREFIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
FIREWALL PROJECT.pptx BY SAKSHI SOLAPURE
 
BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...BriefingsDirect Transcript--How security leverages virtualization to counter ...
BriefingsDirect Transcript--How security leverages virtualization to counter ...
 
How Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External AttacksHow Organizations can Secure Their Database From External Attacks
How Organizations can Secure Their Database From External Attacks
 
[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...[White paper] detecting problems in industrial networks though continuous mon...
[White paper] detecting problems in industrial networks though continuous mon...
 
Enterprise firewalls feature and benefits
Enterprise firewalls feature and benefitsEnterprise firewalls feature and benefits
Enterprise firewalls feature and benefits
 
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...Protecting the movable Endeavor with Network-Based validation and Virtual Com...
Protecting the movable Endeavor with Network-Based validation and Virtual Com...
 
Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!Ge powerpoint presentation group 4!
Ge powerpoint presentation group 4!
 
Cloud Based intrusion Detection System
Cloud Based intrusion Detection SystemCloud Based intrusion Detection System
Cloud Based intrusion Detection System
 
10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT10-ways-the-dissolving-perimeter-kills-IT
10-ways-the-dissolving-perimeter-kills-IT
 

More from OriginalGSM

UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2OriginalGSM
 
UNIT 2 P5 part 2
UNIT 2 P5 part 2UNIT 2 P5 part 2
UNIT 2 P5 part 2OriginalGSM
 
UNIT 2 P4 and m2
UNIT 2 P4 and m2UNIT 2 P4 and m2
UNIT 2 P4 and m2OriginalGSM
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1OriginalGSM
 
UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2OriginalGSM
 
ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2OriginalGSM
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1OriginalGSM
 
ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2OriginalGSM
 
ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1OriginalGSM
 
ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1OriginalGSM
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breachesOriginalGSM
 
Software preparation
Software preparationSoftware preparation
Software preparationOriginalGSM
 
Personalising desktop
Personalising desktopPersonalising desktop
Personalising desktopOriginalGSM
 

More from OriginalGSM (20)

UNIT 2 P8
UNIT 2 P8UNIT 2 P8
UNIT 2 P8
 
UNTI 2 P7
UNTI 2 P7UNTI 2 P7
UNTI 2 P7
 
UNIT 2 P6
UNIT 2 P6UNIT 2 P6
UNIT 2 P6
 
UNIT 2 P6 part 2
UNIT 2 P6 part 2UNIT 2 P6 part 2
UNIT 2 P6 part 2
 
UNIT 2 P5
UNIT 2 P5UNIT 2 P5
UNIT 2 P5
 
UNIT 2 P5 part 2
UNIT 2 P5 part 2UNIT 2 P5 part 2
UNIT 2 P5 part 2
 
UNIT 2 P4 and m2
UNIT 2 P4 and m2UNIT 2 P4 and m2
UNIT 2 P4 and m2
 
UNIT 2 P3 and d1
UNIT 2 P3 and d1UNIT 2 P3 and d1
UNIT 2 P3 and d1
 
UNIT 2 P2
UNIT 2 P2UNIT 2 P2
UNIT 2 P2
 
UNIT 2 P1
UNIT 2 P1UNIT 2 P1
UNIT 2 P1
 
UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2UNIT 2 M3 and d2 v2
UNIT 2 M3 and d2 v2
 
UNIT 2 M1
UNIT 2 M1UNIT 2 M1
UNIT 2 M1
 
ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2ICT BTEC UNIT 2 P4 and M2
ICT BTEC UNIT 2 P4 and M2
 
ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1ICT BTEC UNIT 2 P3 and D1
ICT BTEC UNIT 2 P3 and D1
 
ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2ICT BTEC UNIT 2 P2
ICT BTEC UNIT 2 P2
 
ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1ICT BTEC UNIT 2 P1
ICT BTEC UNIT 2 P1
 
ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1ICT BTEC UNIT 2 M1
ICT BTEC UNIT 2 M1
 
Impact of i.t system breaches
Impact of i.t system breachesImpact of i.t system breaches
Impact of i.t system breaches
 
Software preparation
Software preparationSoftware preparation
Software preparation
 
Personalising desktop
Personalising desktopPersonalising desktop
Personalising desktop
 

Recently uploaded

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024BookNet Canada
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptxLBM Solutions
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 

Recently uploaded (20)

Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
Transcript: #StandardsGoals for 2024: What’s new for BISAC - Tech Forum 2024
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Key Features Of Token Development (1).pptx
Key  Features Of Token  Development (1).pptxKey  Features Of Token  Development (1).pptx
Key Features Of Token Development (1).pptx
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 

IT Security Plan Guide

  • 1. UNIT 11. P4 Security plan:(definitionfromwiki.internet2.edu) adocumentedapproachthataddresseshow an organizationwill implementsecuritymeasures. But in the case of the I.Tworld: (definitionfromgarlic.com) a documentthatispublishedbythe line managerof an IT systemandpresentsthe meansbywhichthatmanagerintendstosecure the system. An (I.T) securityplanfora business,wouldinclude several,if notall of the securitymeasures describedinthe previousPowerPointsforthe unit,the tasksP3, andM2 coverthiswell. Purpose The purpose of thisreport isto showthe “standard operatingprocedures”relatingto“cyber security”.Itcontainsa comprehensive overview of the differentsecuritymeasures, plansand procedures.Thisrelatestoabusinesswithlotsof online activity,aswell asotheractivities,like phone,andface-to-face communication;anexampleof thiswouldbe asolicitorscompany. Current security measures The businessthatI am talkingaboutwill be asolicitorscompany,asa solicitorscompanytheywill have a branch for face-to-face communicationwithcustomers,andasa place to store information and conductday-to-daybusiness.Asabuildingseveral physical securitymeasuresare alreadyin place.Aswell assome cyber-securitymeasures. Cameras There are 2 outdoorsecuritycameras,coveringthe frontandback exit.There are also2 indoor cameras,coveringthe manager’soffice andthe workersarea.The camerasare checkedwhen necessary. Virus protection The businesshasa firewall tothe computers,butitnotupdatedregularly.Theyall have Avastanti- viruspaidversion.Thiscoversspam-filters,andvirusprotection. Updates Software isnotupdatedregularly;itisupdatedwhenthe employee remembers.A servercouldfix this,butit isnot usedproperly. Backups Backupsare completedbutnotregularly. Theycontainabackupof the previousserverstate,this includesall data,butno data isback up to the cloud. Internet The internetissetup to be wireless,andhasno passwords,thisallowsanyone toaccessthe network.NoMAC filtering issetup
  • 2. UNIT 11. Assets Assetsof a businesscanvary,but forsolicitors,the assetscouldbe the customerdata,and the trade secrets.The businesscouldhave itsfiguresforitsfinancial department.Itcouldalsohave itsown marketingstrategies.Assetsshouldbe secured securely. Differentassetsare: 1. Computers 2. Customerdata 3. Businessdocuments 4. Electrical equipment 5. Premises Risks In a businessthe risksshouldbe minimised,todothisa risk assessmentmustfirstbe carriedout,an example isbelow. 1. Physical threats  Theft of data  Damage to hardware 2. Cyber-threats  Malware---Spam  Hardware failure  Spyware  Viruses  Hackers 3. Natural disasters 4. Staff a. Give up passwords through ‘social engineering’ b. Personal vendetta against you
  • 3. UNIT 11. Security Measures 1. Prevention a. Firewall b. Anti-Virusprogram i. Spyware removal ii. Virusremoval c. OperatingSystem i. UpdatingO.S d. Removal of data e. Staff i. Stoppingpossible theft opportunities 2. Protection a. Staff i. Limitingtheiraccess ii. Correct training iii. Forcingpoliciesonstaff b. Encryption c. Backups 3. AccessControl a. Administratorrights b. DAC c. MAC d. PrioritisingRAM 4. Cloud
  • 4. UNIT 11. M3/D2 (and P5) Prevention Firewall The use of a firewall,is thatof a preventativemeasure.The firewall,isdesignedtofilteroutwhatis authorisedandwhatisnot. The internettraffic,goingthroughthe computer(s) isfilteredbythe firewall,itstopsunauthorisedaccesstothe system, butallowsthe access of the webpage youwere tryingto load. Anysingle computerhasa firewall,butanetworkof computers,linkedthroughthe use of aserver. Is able touse the networkfirewall,thisallowsgreatercontrol of whatispermittedandwhatisnot, so the playingof gamesbythe employees,couldbe stoppedonthe networkfirewall,insteadof individuallygoingroundtoeachcomputerto blockit. OperatingsystemslikeWindowshave abuiltinfirewall,butthe router(huborswitch) youare using, alsoprovidesone. Thisisthe waythe serversimmediatelyblockunwantedinternetaccess,and trafficwhichmaypotentiallyslowdownthe bandwidthof yournetwork. A firewall shouldbe updatedtothe mostrecentversion;thisensuresthatitisworkingtothe bestof itsability.A firewallshouldbe includedforanyonline activity. Due to the fact thatno viruseshave beenfoundoveradurationof time (A full systemscanwas regularlyconductedtocheckforthe presence of viruses),the firewall hasandcontinuestodoitsjob of keepingthe systemsafe. Anti-Virus software Spyware removal The use of spyware isfromthat of a hacker;it allowshim/heraccessintoyoursystem, toread on files,inmostcases,the affectedisunaware of this.Ina businessworldthiscanbe tragicas it allows a competitordetailsaboutyouandyourcustomers,andit alsobreachesthe data protectionact. Thiscouldleadto a fine,orevena court sentence.
  • 5. UNIT 11. Most anti-virussoftware comesbuiltintoremove all typesof malware,whichincludesspyware.But for itto do thisyoumust update the software tothe latestversion. In a businessworld,the employeemaypurposelyorforgetfullynotdothe regularupdates,soanti- virusfor businesses(aserver) isrequired,itallowsaccess tothe anti-virus,fromremote access.The benefitof serveranti-virusisthatitupdatesand scans,accordingto the servermanager,sono sabotage ispermitted. Virus Removal As itwas statedbefore,the use of anti-virusincludes the removalof spyware,andviruses.Viruses can affectan all mannerof differentthings,because ‘virus’isabroadterm, itencompassesmany typesof threats,but itcouldinclude the removal,of sensitive datawhistalsotakingitforitself. The use of a server-wideanti-virusisusuallyapayfor option,butitis ultimatelyworthit,if itkeeps your andyour customersdatasafe. The software shouldbe regularlyupdatedandbe made to doroutine scans,to make sure nothing goesontothe systemandno virusislefton the system.Anyinternetactivityshouldresultinthe anti-virusprogramspresence. Afterroutine scanswere completed,noviruseswere found,otheritems,suchastrackingcookies were foundandwere removedeasily.Thisshowsthatthe anti-virussoftwarehasdone itsjob effectively.
  • 6. UNIT 11. Operating System The OS containsitsown setof defencesagainstattacks,suchas a firewall,andconstantpatches(see below). Updating OS Patchesforflawsinthe OSand the securityof the systemare free andare rolledoutbythe provider, theyare usuallyself-updating. Buttheycanbe changedto notdo-so.Thiscan be stoppedbyone of twothings,administratorrightsforeachcomputer,orby havingthe entire systemlinkedupvia server,the serveradminwould control the updates,thisisaformof the administratormethod(it’sa formof admininitself).Butithasone benefit,itcancontrol all the computersat one,insteadof goingroundeach one individually. Afterthe updateswere installed,there werelittle tonone forreportedbugs,andnosecurityflaws that people are aware of. Althoughanupgrade to a laterO.S maybe neededinthe nearfuture asWindows7 will eventually run out of supportfromMicrosoft. Removal of Data The removal of data properly, iskeytoaverting,accidentallylosingcustomerorbusiness data/secrets. Fora businessdataiseitherstoredonthe cloudand/ora HDD, the HDD can be wiped of anydata by eitherdestroyingthe drive,orbydeletingthe partitionthatitisheldon.For the sake of cash-flow,re-usingthe drive wouldbe wiser. If data is storedon the cloud,a simple delete woulderase the data,because the datawouldbe held by large companies,the chancesof anyattack of theirservicesisminimal.
  • 7. UNIT 11. Althoughthisprogramwas installedonanUSB stick,it isan easy to use example usinganapplication to be able to securelyremove files,soastheyare notable to be broughtback by a hacker (comparedtobeingputin the normal ‘recyclingbin’). Staff Staff isa bigsecurityflawamongbusinesses,andsopart of itis describedhere underthe prevention section,andthe otherpart is underthe protectionsection. Preventing possible theft opportunities Staff can eitherbe bribedintogoingagainstyou,ortheycan be trickedintogivingawayinformation, otherreasonslike apersonal vendettaare aroundbutare notas commonas the firsttworeasons mentioned. If a rival companywantedinformationfromyou,theycouldbribe yourstaff,thiscouldbe togive theiraccount passwords,orto retrieve informationanddeleteitafterwards.Whatthe rival companydoeswiththe informationisuptothem, but itcouldbe tosteal a patentedtechnology,or to informall of theircustomersabouttheircheaperrates. To stop the informationtheft,constantpasswordchangesmustbe enforced,aswell asDACaccess control (showninlaterpages),othersystemslike MACandAdministratorrights,thesecouldhelp preventtheft. Social engineeringiswhenanemployeeis trickedintogivingawayinformation,passwordsor securityquestionsare possibilities,waystocounterthisare to use a worke-mail thatyouset upand change passwordsautomatically,andtotrainyourstaff intoresistingsocial engineering.
  • 8. UNIT 11. Protection Staff Limiting their usage For full details,thisiscoveredabove underthe section‘Prevention---Staff---Preventingpossible theft opportunities” Under the parental settingsfunction,thiscannotbe accessedbythe standarduser,onlythe administratorcanuse thisfunction.Withthisyoucan control the time limitswhichthe usercanlog on.But much more can be done,asshownbelow. Correct training For full details,thisiscoveredabove underthe section‘Prevention---Staff---Preventingpossible theft opportunities”
  • 9. UNIT 11. Forcing policies on staff For full details,thisiscoveredabove underthe section‘Prevention---Staff---Preventingpossible theft opportunities” Encryption If data is to be transferredforsome reason,viaa removable orportable media(USBmemorysticks, portable HDD’s,laptops,etc.).Thenincase of theftor loss,of the data; it mustbe encrypted. Encryptionisa processof encodinginformationsoasonlyauthorisedpartiescanaccessthe media. Unfortunately,mediacanbe decoded,sothe informationisreadabletounauthorisedusers.Strong encryptions(sometimesmilitarygrade maybe needed) wouldbe needed,thisiswhere the encryptionisalsoencrypted,againandagain.Mediaisnotrecommendedtobe movedabout, thisis whymuch data isstoredon the cloud,where there isstrongencryptionsandthe mediaisaccessible to the authorisedusersanywhere. If data is transportedbya portable mediastorage.Thenitmustbe encryptedwithappropriate encryptionsoftware. All USB sticksusedbythe companyare now Lexardrivesthatcome with‘Secure 2’ free of charge. Thisallowsanencryptionof data.But for more sensitive datathatmustbe moved,a more secure applicationisneeded(of course the databeing transportedshouldalsobe savedtoanother,secure location).Secure 2isa wayof encryptingdatawitha passwordtostop hackersand theifsfrom seeingyourdata. Backups Sometimesanattackmay notbe to steal data,but to just delete itoff of yoursystems,if your businessisverycustomeroriented (likeasolicitors),thencustomerdetaillosscouldpotentiallyruin
  • 10. UNIT 11. your business,andputitona standstill.Havingrecentbackupsof yourdata can ensure thatan attack doesnot ruinyourbusiness.A recentbackupcouldmeanonlyminimal data(ornone) islost. Thiswouldonlyhaltyourbusinessfora few hours,notweeks! All businessesthathave acomputersystemshouldbe requiredtokeepregularbackupsinthe case of a cyber-attack. Thisscreenshotwastakenbefore itwasconfigured,todoautomaticbackups(asshown),butitcan alsobe usedtorestore data,and if for some reasonthe mostrecentbackup iscorrupt, thena prior backupcan be used! It has beenankeyway of protectingagainst theft.
  • 11. UNIT 11. Access Control Administrator rights All companiesthathave a computersystemshoulduse the administratorfunctionality(admin). Adminisa way of stoppingregularusersof changingsettingsandaccessingunwantedfiles.With modernO.S’s like ‘Windows7’youcan not onlystopthe reversal of the changestosettingsbutyou can onlyallowthe login,andusage of functionswithinacertaintime period,sothere wouldbe no access to the computersoverlunch,orafter hourswhere there isno-one tosupervisethe staff. Adminrightshave a huge range of possibilities,andshouldbe usedaccordinglywithall businesses. A usercan be made administrator,thisgrantsmore poweroverthe otherusers,anditalsogrants more depthintothe system. Noactual data shouldbe kepton the adminaccount,as it the account firstto be attackedby hackers. DAC DAC (Discretionaryaccesscontrol);isamethodof controllingthe accessof filesandsettingsamong a server.DACis discretionary,soitisupto the author of the documentwhomhasrightsand whom doesn’t.A usercan be set usingthe useraccountson the OS, or the actual MAC addressof the computer.A DAC setupwouldbe essential foramulti-tieredbusiness,withdifferentbranchesof products. A solicitorscompanymaynotneedtouse DAC, butif there are several branches,withashared server,thenaDAC setupmay be worthwhile. The DAC setupforthe server,isshownbelow.Itcanbe usedfromprograms suchas Microsoft Office.Itallows the authortochoose userwhomcan read and/orwrite.
  • 12. UNIT 11. MAC MAC (mandatoryaccesscontrol),isbetterdescribedonthe P3PowerPointforthe unit.Thiswould be good fora companywhohas staff on roughlythe same level of expertise,withnotmanylevels,to theirbusinesshierarchy.Thisisbecause the userisgivenalevel suchas“secret”or “top secret”,and wouldthenbe able toaccess fileswiththe correspondingorlowersecuritytag.Soa solicitors companycouldhave all of the basicemployeesable toaccessbasicfiles,whereasthe managercould access all of that plusevenmore secretfiles. MAC and DAC can be usedtogetherwhere necessary. Thishas beenusedwell inthe servertostopstaff compromisingthe integrityof the businessescyber security,andassets. Prioritising RAM If the systemallowsyoucanprioritise RAMforcertaintasks,thiswouldallow youtoisolate privilegedprocessesfromnon-privilegedprocesses,thiscouldallow youtoonlyallow RAMfor certainapplications,and sonounauthorisedapplicationswhichcouldpossiblybe aviruscanbe used effectively. Thiswouldbe an essential piece forasbusinesswhomisusingthe internetandcomputersformost day-to-dayoperations.Itcouldpreventpotentialproblems,savingyoutime andmoney.
  • 13. UNIT 11. Cloud The cloud isa useful tool tonegate the costsof any maintenance andrepairstoa small local server. Usingthe cloudfromtrustedsourceslike Google,andMicrosoft,couldsave moneyastheylookafter your data foryou,and as theyare verybigcorporations,the software usedtoprotecttheirdatais immense.The businesscouldalsobenefitfromthe extrasthathavingthe cloudserverbrings. Althoughif the businessinternetisdownfora periodof time,resultscouldbe catastrophicasno data couldbe accessed. Weighingupthe prosand cons.If the companyhas trust intheirISP,thenusinga cloudbasedserver couldbe the bestwayto go.
  • 14. UNIT 11. P6 The securityplanput inplace. Has improvedthe securityof the businessdramatically.Fromthe side of physical security,analarmsystemshouldhave putintoplace,aswell aslocksforthe computers to stopthemfrom beingstolen. Whenit comesto cyber-security,the updatesinstalledstoppedall knownsecurityflaws,andthe use of an antivirusfoundandremovedviruseswhenplacedontothe computer(aspartof a test),italso made usingthe webmuch safer. The use of encryptionsoftware wasexcellent,butjustasa precaution,if more sensitive datawasto be transported,thena betterpiece of software wouldbe used,togive ‘militarygrade encryption’. The backups were good,astheyprovide acheap,quickmeansof restoringdata. The access control methodshave workedperfectly amongthe server.The DACandMAC system workswell,tostopunwantedeyeslookingintobusinessdocuments. Usinga cloudbasedsystem,the dataisnow safe fromany majordisasters,suchasearthquakesand tsunamis.Thisisbecause everythingstoredonthe cloudisstoredinseveral placesaroundthe globe. The level of protectionfromthese servicesisimmense,anddoesnotneedtesting.