HND in Computing and Systems Development Higher Nationals Internal verification of assessment decisions – BTEC (RQF) INTERNAL VERIFICATION – ASSESSMENT DECISIONS Programme title HND in Computing Miss. Priscilla Steno Assessor Internal Verifier Unit 05: Security Unit(s) EMC Cloud Solutions Assignment title UTHAYAKUMARAN RANGITH | JAF/A-008181 Student’s name List which assessment Pass Merit criteria the Assessor has awarded. INTERNAL VERIFIER CHECKLIST Do the assessment criteria awarded match those shown in the assignment brief? Y/N Is the Pass/Merit/Distinction grade awarded justified by the assessor’s Y/N comments on the student work? Has the work been assessed accurately? Is the feedback to the student: Give details: Y/N Distinction HND in Computing and Systems Development • Constructive? • Linked to relevant assessment Y/N criteria? Y/N • Identifying opportunities for Y/N improved performance? • Agreeing actions? Y/N Does the assessment decision need Y/N amending? Assessor signature Date Internal Verifier signature Date Programme Leader signature (if Date required) Confirm action completed Remedial action taken Give details: Assessor signature Date Internal Date Verifier signature Programme Leader signature required) (if Date HND in Computing and Systems Development Higher Nationals - Summative Assignment Feedback Form Student Name/ID UTHAYAKUMARAN RANGITH | JAF/A-008181 Unit Title Unit 05: Security Assignment Number 1 04 – 07 – 2021 Submission Date Assessor Date 06 – 06 – 2021 Received 1st submission Date Received 2nd 12 – 06 – 2021 Re-submission Date submission HND in Computing and Systems Development Grade: Assessor Signature: Date: Resubmission Feedback: Grade: Assessor Signature: Date: Internal Verifier’s Comments: Signature & Date: * Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have been agreed at the assessment board. HND in Computing and Systems Development C Grading Rubric Grading Criteria LO1 Assess risks to IT security P1 Identify types of security risks to organizations. P2 Describe organizational security procedures. M1 Propose a method to assess and treat IT security risks. LO2 Describe IT security solutions P3 Identify the potential impact to IT security of incorrect configuration of firewall policies and third party VPNs. Achieved Feedback HND in Computing and Systems Development P4 Show, using an example for each, how implementing a DMZ, static IP and NAT in a network can improve Network Security. M2 Discuss three benefits to implement network monitoring systems with supporting reasons. D1 Investigate how a ‘trusted network’ may be part of an IT security solution. LO3 Review mechanisms to control organizational IT security P5 Discuss risk assessment procedures. P6 Explain data protection processes and regulations as applicable to an organization. M3 Summarize the ISO 31000 risk management methodology and its application in IT security. HND in Computing and Systems Development M4 Discuss possible impacts to organizational security resulting from an IT security audit. D2 Consider how IT security can be aligned with organizational policy, detailing the security impact of any misalignment. LO4 Manage organizational security P7 Design and implement a security policy for an organization. P8 List the main components of an organizational disaster recovery plan, justifying the reasons for inclusion. M5 Discuss the roles of stakeholders in the organization to implement security audit recommendations. D3 Evaluate the suitability of the tools used in an organizational policy. HND in Computing and Systems Development Pearson Higher Nationals in Computing Unit 05: Security Assignment 01 HND in Computing and Systems Development General Guidelines 1. A cover page or title page should be attached to your assignment. Use page 1 of this assignment brief as your cover page and make sure all details are accurately filled. 2. The entire assignment brief should be attached as the first section of your assignment. 3. The assignment should be prepared using a word processing software. 4. The assignment should be printed single sided in an A4 sized paper. 5. Allow 1” margin on top, bottom and right sides of the paper and 1.25” on the left side (for binding). Word Processing Rules 1. The font size should be 12 point, and should be in the style of Time New Roman. 2. Set line spacing to 1.5. Justify all paragraphs. 3. Ensure that all headings are consistent in terms of size and font style. 4. Use footer function on the word processor to insert your name, unit, assignment no, and page number on each page. This is useful if individual sheets get detached from the submission. 5. Use the spell check and grammar check function of the word processing application to review the use of language on your assignment. HND in Computing and Systems Development Important Points: 1. Carefully check carefully the hand in date and the instructions given with the assignment. Late submissions will not be accepted. 2. Ensure that sufficient time is spent to complete the assignment by the due date. 3. Do not wait till the last minute to print or bind the assignment. Such excuses will not be accepted for late submissions. 4. You must be responsible for efficient management of your time. 5. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing) for an extension. 6. Failure to achieve at least a PASS grade will result in a REFERRAL grade. 7. Non-submission of work without valid reasons will lead to an automatic REFERRAL. You will then be asked to complete an alternative assignment. 8. If you use other people’s work or ideas in your assignment, it must be properly referenced, using the HARVARD referencing system, in your text or any bibliography. Otherwise, you’ll be found guilty of committing plagiarism. 9. If you are caught plagiarising, your grade will be reduced to a REFERRAL or at worst, you could be excluded from the course. HND in Computing and Systems Development Student Declaration I hereby, declare that I know what plagiarism entails, namely to use another’s work and to present it as my own without attributing the sources in the correct form. I further understand what it means to copy another’s work. 1. I know that plagiarism is a punishable offence because it constitutes theft. 2. I understand the plagiarism and copying policy of Edexcel UK. 3. I know what the consequences will be if I plagiarise or copy another’s work in any of the assignments for this program. 4. I declare therefore that all work presented by me for every aspect of my program, will be my own, and where I have made use of another’s work, I will attribute the source in the correct way. 5. I acknowledge that the attachment of this document signed or not, constitutes a binding agreement between myself and Edexcel UK. 6. I understand that my assignment will not be considered as submitted if this document is not attached to the assignment. U.rangith@gmail.com Date: 12.05.2021 (Provide E-mail ID) (Provide Submission Date) HND in Computing and Systems Development Assignment Brief Student Name /ID Number UTHAYAKUMARAN RANGITH | JAF/A-008181 Unit Number and Title Unit 5- Security Academic Year 2020/2021 Unit Tutor Miss Priscilla Steno Assignment Title EMC Cloud Solutions Issue Date 12.05.2021 Submission Date 12.05.2021 IV Name & Date Submission Format: The submission should be in the form of an individual written report written in a concise, formal business style using single spacing and font size 12. You are required to make use of headings, paragraphs and subsections as appropriate, and all work must be supported with research and referenced using Harvard referencing system. Please provide in- text citation and an end list of references using Harvard referencing system. Section 4.2 of the assignment required to do a 15 minutes presentation to illustrate the answers. U. Rangith 1|Page Security |Assignment1 HND in Computing and Systems Development Assignment Brief and Guidance: Scenario EMC Cloud Solutions is reputed as the nation’s most reliable Cloud solution provider in Sri Lanka. A number of high-profile businesses in Sri Lanka including ESoft Metro Campus network, SME Bank Sri Lanka and WEEFM are facilitated by EMC Cloud Solutions. EMC Cloud provides nearly 500 of its customers with SaaS, PaaS & IaaS solutions with high-capacity compute and storage options. Also, EMC is a preferred contractor for Sri Lanka, The Ministry of Defense for hosting government and defense systems. EMC’s central data center facility is located at Colombo Sri Lanka along with its corporate head-office in Bambalapitiya. Their premises at Bambalapitiya are a six-story building with the 1st floor dedicated to sales and customer services equipped with public Wi-Fi facilities. Second-floor hosts HR, Finance and Training & Development departments and the third-floor hosts a boardroom and offices for senior executives along with the IT and Data center department. Floor 4,5,6 hosts computer servers which make up the data center. With the rapid growth of information technology in Kandy area in recent years, EMC seeks an opportunity to extend its services to Kandy, Sri Lanka. As of yet, the organization is considering the nature of such an extension with what to implement, where it is to be a suitable location and other essential options such as security are actually being discussed. You are hired by the management of EMC Solutions as a Security Analyst to evaluate the security-related specifics of its present system and provide recommendations on security and reliability related improvements. Furthermore, you have to plan the establishment of the extension on a solid security foundation. Activity 01 1.1. Assuming the role of External Security Analyst, you need to compile a report focusing on following elements to the board of EMC Cloud Solutions; 1.1 Identify types of security risks EMC Cloud is subject to its present setup and the impact that they would make on the business itself. Evaluate at least three physical and virtual U. Rangith 2|Page Security |Assignment1 HND in Computing and Systems Development security risks identified and suggest the security measures that can implemented in order to improve the organization’s security. 1.2 Develop and describe security procedures for EMC Cloud to minimize the impact of issues discussed in section (1.1) by assessing and rectifying the risks. Activity 02 2.1 Identify how EMC Cloud and its clients will be impacted by improper/ incorrect configurations that are applicable to firewalls and VPN solutions. It security can include a network monitoring system. Discuss how EMC cloud can benefit by implementing a network monitoring system. 2.2 Explain how the following technologies would benefit EMC Cloud and its Clients by facilitating a ‘trusted network’. (Support your answer with suitable examples). i) DMZ ii) Static IP iii)NAT Activity 03 3.1 Discuss suitable risk assessment procedures for EMC Cloud solutions and impact an IT security audit will have on safeguarding organization and its clients Your discussion furthermore should include how IT security can be aligned with an organizational IT policy and how misalignment of such a policy can impact on organization’s security. 3.2 Explain the mandatory data protection laws and procedures which will be applied to data storage solutions provided by EMC Cloud. You should also summarize ISO 31000 risk management methodology. Activity 04 4.1 Design a security policy for EMC Cloud to minimize exploitations and misuses while evaluating the suitability of the tools used in an organizational policy. U. Rangith 3|Page Security |Assignment1 HND in Computing and Systems Development 4.2 Develop and present a disaster recovery plan for EMC Cloud for all venues to ensure maximum uptime for its customers. Discuss how critical the roles of the stakeholders in the organization to successfully implement the security policy and the disaster recovery plan you recommended as a part of the security audit. (Students should produce a 15 minutes PowerPoint presentation which illustrates the answer for this section including justifications and reason for decisions and options used). U. Rangith 4|Page Security |Assignment1 HND in Computing and Systems Development Unit Learning Outcomes: LO1 Assess risks to IT security. LO2 Describe IT security solutions. LO3 Review mechanisms to control organizational IT security. LO4 Manage organizational security. U. Rangith 5|Page Security |Assignment1 HND in Computing and Systems Development Acknowledgment I truly express my thanks to my lectures and ESOFT campus, Jaffna, which also helped me to know a lot of new think and increase my knowledge. First, I would like to say my special thanks of gratitude to our lecturer Miss Priscilla Steno whose guidance and encouragement was very useful to finish this assignment successfully. And also, thanks to Coordinator of ESOFT campus, Jaffna. I am thanking very much to respected sir, Miss Priscilla Steno for her guide and support of the knowledge for the related subject, it was very essential to me to achieve so far and heartful thanks belongs to the Respected. B. Gajanan Manager of the institution for given me a chance to conduct the course and his support to my career. Thank you. U. Rangith U. Rangith 1|Page Security |Assignment1 HND in Computing and Systems Development Table of Contents LO1 Assess risks to IT security. ............................................................................................ 6 Introduction ........................................................................................................................... 6 Relationship between Vulnerabilities Threats Assets and Risk ............................................. 6 Assuming the role of External Security ................................................................................. 7 Physical damages .................................................................................................................. 7 Equipment malfunction ......................................................................................................... 7 Misuse of data ....................................................................................................................... 8 Loss of data ........................................................................................................................... 8 1.2. Develop ....................................................................................................................... 8 Property damage claim procedure ......................................................................................... 8 Regular inspection procedure ................................................................................................ 8 Monitor user action procedure .............................................................................................. 8 Create backup procedures ..................................................................................................... 9 1.3 What is risk management process? ................................................................................. 9 1.3.1 What is Risk Treatment? ............................................................................................ 10 1.3.2 Risk treatment related to scenario. ............................................................................. 10 LO2 Describe IT security solutions..................................................................................... 11 2.1. Identify ...................................................................................................................... 11 2.1.1 What is Firewalls ........................................................................................................ 11 2.1.2 What is a firewall Policy? .......................................................................................... 12 2.1.3 What is Virtual private network (VPN)? .................................................................... 13 2.1.4 What is VPN policy? .................................................................................................. 13 2.1.5 How improper firewalls and VPNs impact to the EMC company? ........................... 14 2.2 Explain ...................................................................................................................... 15 2.2.1 U. Rangith Static IP.................................................................................................................. 15 2|Page Security |Assignment1 HND in Computing and Systems Development What are static IPs? ............................................................................................................. 15 What is DHCP IPs? ............................................................................................................. 15 Advantages of DHCP IPs .................................................................................................... 16 Disadvantages of DHCP IPs................................................................................................ 16 2.2.1 DMZ ...................................................................................................................... 16 2.2.3 Real function of the DMZ ........................................................................................... 16 2.2.4 Architecture of DMZs network .................................................................................. 17 2.2.2 NAT ....................................................................................................................... 17 2.2.5 What is NAT (Network Address Translation) ........................................................... 17 2.2.6 How Static IPs, DMZ, NAT helps to the EMC company? ........................................ 18 2.2.7 Trusted Network system? ........................................................................................... 19 2.3 What is Network Monitoring System. ........................................................................... 20 LO3 Review mechanisms to control organizational IT security. ........................................ 21 3.1 Risk Assessment Procedures. ........................................................................................ 21 3.1.1 What is Risk Management .......................................................................................... 21 Identify the risk ................................................................................................................... 22 Analyzing the Risk .............................................................................................................. 22 Mitigating Risks .................................................................................................................. 22 Monitor the risk ................................................................................................................... 22 Reporting ............................................................................................................................. 23 What is a risk? ..................................................................................................................... 23 What is Risk Assessment? ................................................................................................... 23 3.2 Data protection process that applicable to an organization. .......................................... 23 • The type of the customers they have............................................................................. 23 • Number of costumers they have ................................................................................... 24 • Banking information ..................................................................................................... 24 • Information about the assets ......................................................................................... 24 U. Rangith 3|Page Security |Assignment1 HND in Computing and Systems Development Fixing of CCTV cameras .................................................................................................... 24 Employee monitoring .......................................................................................................... 24 Risk Assessment of EMC Cloud Solutions ......................................................................... 25 3.1 Explain ...................................................................................................................... 28 3.3.1 What is Law? .............................................................................................................. 28 3.3.2 Data Prevention Act 1998 (DPA1998) ....................................................................... 29 The 8 guiding principles of the Act are as follows; ............................................................. 29 3.3.3. Principle 1 - Fair and Lawful .................................................................................... 29 3.3.4. Principle 2 - Purposes ................................................................................................ 29 3.3.3. Principle 3 - Adequacy .............................................................................................. 30 3.3.4. Principle 4 - Accuracy ............................................................................................... 30 3.3.5. Principle 5 - Retention ............................................................................................... 30 3.3.6. Principle 6 - Rights .................................................................................................... 30 3.3.7. Principle 7 - Security ................................................................................................. 31 3.3.8. Principle 8 - International transfers ........................................................................... 31 Comparing these guiding principles with the DPA 2018’s ................................................. 31 3.4.1 Summarization of ISO 31000: 2018 related to EMC company ................................. 33 3.4.2 ISO 31000: 2018 Risk Management .......................................................................... 33 3.5 What is Audit? ............................................................................................................... 34 3.5.1 What is IT security Audit? ......................................................................................... 34 3.5.2 What an IT security Audit does for the company. ..................................................... 35 3.5.3 IT security Audits can identify the Vulnerable points and problem areas in the company .............................................................................................................................. 35 3.6 How IT security aligned with organization policy? ...................................................... 35 3.6.1 Aligning Security with company objectives .............................................................. 36 3.6.2 How IT security Misaligned with organization policy? ............................................. 36 LO4 Manage organizational security. ................................................................................. 37 U. Rangith 4|Page Security |Assignment1 HND in Computing and Systems Development 4.1 suitability of the tools used in the polices ...................................................................... 37 4.1.1 Creating disaster recovery plan. ................................................................................. 37 Disaster Management Plan .................................................................................................. 38 Disaster Recovery Plan ....................................................................................................... 39 Disaster Recovery Plan – Continue ..................................................................................... 40 Creating a Disaster Recovery Plan – Steps ......................................................................... 40 Creating a Disaster Recovery Plan Steps– Continue........................................................... 41 Resources involved - DRP .................................................................................................. 41 Effective DRP with Additional Resources .......................................................................... 42 4.2 Develop ..................................................................................................................... 48 4.3.1 Who is a stake holder?................................................................................................ 48 4.3.2 Role of a security stake holder related to the company. ............................................. 49 What is Security Policy ........................................................................................................ 51 Design a Security Policy ..................................................................................................... 52 Conclusion ........................................................................................................................... 55 References ........................................................................................................................... 56 U. Rangith 5|Page Security |Assignment1 HND in Computing and Systems Development LO1 Assess risks to IT security. Introduction EMC is a well reputed cloud solution provider in Sri Lanka. Normally EMC is providing their services to SME bank in Sri Lankan and WEEFM company. EMC cloud solution Company provides SAAS, PAAS, LAAS to their customers. And nearly their customer rate is five hundred roughly. The head office of EMC company is situated in Bambalapitiya. The building exists with six stories. In this building the first floor is dedicated to customer services, second floor is for the HR and the finance and training department in the third floor. Four, five, six floors are the computer servers. But unfortunately, in this compony there is no proper security system physically wise or computerized. Security system is Highly important feature to a company. Because without a security system the specific company faces to various kinds of risks. According to the current situation of EMC cloud solution company there is no security system at all. Relationship between Vulnerabilities Threats Assets and Risk Vulnerabilities are the reasons that is helping to start risk. Vulnerability is a function that all the company may face because of that many users and network personals trying to protect their computer systems from vulnerabilities by keeping software security patches up to date. Threats can be caused to the company from inside of the company and may be from the outside the company. Normally most of the threats are affected from the outside the company. Threats are potentials for vulnerability to turn into attacks on computer systems, network and more. They can put individual’s computer system and business computers at risks. According to some of the common threats are Hacking, Malware, Spam, Phishing, Botnets etc. Assets are the physical resources that company has. Normally company measures the profit from the remaining assets. Assets are the resources which has an economic value that an individual, corporation or country owns with the expectation that it will provide a future benefit. U. Rangith 6|Page Security |Assignment1 HND in Computing and Systems Development Risks are the darkness situations that going to be happen to that business in near future. Basically, the risks are defined as the external and internal vulnerabilities that occurs negatively. Assuming the role of External Security Assuming the role of External Security Analyst, you need to compile a report focusing on following elements to the board of EMC Cloud Solutions; In a business risks are the darkness situations that going to be happen that business in near future. Basically, the risk is defined as the external and internal vulnerabilities that occurs negatively to the business for an example possibility of occurring damages to the business, Increase of liabilities, loss rea certain kind of risks to a business. When we talk about the EMC company there are various kinds of risks that can occur to the company because there is no proper security system. 1.1.Identify types of security risks EMC Cloud is subject to its present setup and the impact that they would make on the business itself. Evaluate at least three physical and virtual security risks identified and suggest the security measures that can implemented in order to improve the organization’s security. Physical damages Physical damages basically known as the damages that can happen to the physical properties. There is a loss of physical security system to the EMC company because of that the possibility of happening security damages is high to the company. When a company facing to a physical damage it will Couse huge loss to the company because the properties that used by the company gets damaged after that the company can’t perform well as in the past Equipment malfunction Equipment malfunction means when there are no any virus guards to the computers or any other electronics it’s get effected by viruses and it gradually get malfunctioning so without any security, Equipment malfunction is also certain type of risk to the EMC company. U. Rangith 7|Page Security |Assignment1 HND in Computing and Systems Development Misuse of data Misuse of data is a result of loss of security system. Misusing data is badly Couse to the company. By this rate of assets will get low in the company. Sometimes the company will get bankrupt due to this reason. So, misusing of data is highly affected to the company. Loss of data Loss of data is a part of risks that can be affected to company. When there is no security. Of the people may doing frauds to the business. These data loss is any process or event that results in data being corrupted or deleted and badly unreadable by the user. 1.2.Develop and describe security procedures for EMC Cloud to minimize the impact of issues discussed in section (1.1) by assessing and rectifying the risks. Property damage claim procedure When we talk about the first risk in the list of risks, to reduce the physical damages that can happen to the physical properties we can use a good security system but basically the best method is to maintain a property damage claim procedure. This means when something unfortunately happens to our property, we can claim our loss according to the loss we gain by using this property damage claim procedure. Regular inspection procedure As in the list of risk the second risk that the EMC company is facing to equipment mal function to reduce it, we can implement a new procedure called regular inspection procedure by this we can reduce regular equipment mal functioning when we starting to implement this procedure, we have created an inspection schedule according to that we have inspect our equipment in a regular basis then we can reduce equipment mal function. Monitor user action procedure The third risk that EMC company is facing to data misuse to avoid that we create a new procedure called Monitor user action procedure it is a one of the best ways to avoid the data mis use It is very important to monitor actions of users working with sensitive information. Misuse of such data can open organization to a very high damage control and huge loss of U. Rangith 8|Page Security |Assignment1 HND in Computing and Systems Development costs and even potential lawsuits. Users with high privileges also pose additional threat. So, reducing data misusing is very important to the EMC company. Create backup procedures To reduce the loss of data risk we can create the backup of every data we are inputting to the computers. By that we can reduce the risk of data loss. When a specific company reduce their risk of data loss that company can enlarge its business area become that company can get ideas from past situation that company has faced. 1.3 What is risk management process? To continue a company to a long type period we have to maintain our company in a good manner. So, we have to protect our company from security breaches, data losses, cyber-attacks, system failures and natural disasters. To manage those risks there is a risk management process. Risk management process means monitoring and managing potential risks in order to minimize the negative impact they may have on an organization. From the security breaches, data losses, cyber-attacks, system failures and natural disasters the effective risk management process will help identify which risks pose the biggest threat to an organization and provide guidelines for handling them. To possess the risk management process effectively there are three steps. They are, Risk Assessment and Analysis – The primary step of the risk management process is called as the risk assessment and analysis stage. A risk assessment assesses an organization experience to uncertain events that could impact its day-to-day actions and estimates the damage those events could have on an organization income and status. Risk Evaluation – After the risk assessment or analysis has been completed, a risk evaluation should take place. A risk evaluation compares valued risk against the risk principles that the organization has already recognized. Risk criteria can include associated cost and benefits, socio economic factors, legal requirement and system malfunctions. Risk Treatment and Response – The last step in the risk management process is risk treatment and response. Risk treatment is the Implementation of policies and U. Rangith 9|Page Security |Assignment1 HND in Computing and Systems Development procedures that will help avoid or minimize risks. Risk treatment also extends to risk transfer and risk financing. 1.3.1 What is Risk Treatment? When there are any risks occurring to the company, we have to minimize those or avoid those kinds of risks, to avoid those or reduce those risks we have to use certain kind of strategies. By using strategies, the avoiding of risks can be known as the risk’s treatments. Specific treatment strategies can be created to treat specific risks which have been identified. Treatment strategies may differ, depending on the risk context. Purpose of the Risk treatment – The purpose of the risk treatment is to reduce, remove or transfer risk from the company. It is often better for a company to plan ahead and prevent a risk from occurring than it is for them to take the chance and face that risk. Planning ahead can help to save a company a lot of time and money because some risks may prove to be very damaging to a business. When we talk about the risk treatments there two main types of risk treatments, they are Avoidance strategies – These tactics seek to totally stop a potential risk from happening or impacting on a company at all. Main subdivisions of the avoidance strategies group contain transfer and changings. Minimize strategies – These tactics seek to reduce the influence of risk on a product or organization, so that as little as possible damage is done. Reduce tactics are frequently used when avoidance strategies are not possible, or have already unsuccessful. 1.3.2 Risk treatment related to scenario. When there are any risks occurring to the company, we have to minimize those or avoid those kinds of risks, to avoid those or reduce those risks we have to use certain kind of strategies. By using strategies, the avoiding of risks can be known as the risk’s treatments. To the EMC company also there are many risks that can be affected they are physical damages that can be occurred to the EMC company, Equipment malfunctioning, data misusing and data losing for these kinds of risks there are many treatment or procedures that can implemented to overcome those risks they are property damage claim procedure, regular inspection procedure, Monitor user action procedure, U. Rangith 10 | P a g e Security |Assignment1 HND in Computing and Systems Development creating backup procedures by using these kinds of strategies EMC company can treat the risk and can overcome those risks LO2 Describe IT security solutions. 2.1.Identify how EMC Cloud and its clients will be impacted by improper/ incorrect configurations that are applicable to firewalls and VPN solutions. IT security can include a network monitoring system. Discuss how EMC cloud can benefit by implementing a network monitoring system. 2.1.1 What is Firewalls Many of the reputed It companies is used to install a firewall system to the servers because it like security system that using to protect the important information’s. When we broadly talk about the firewall it’s a software program that used prevents unauthorized access to or from a private network. When there is a access from a unauthorized network or from a another private network it’s a risks to the company because they can take all the internal information through that so to prevent those stuffs most companies are using firewall system. Firewalls are the tools that can be used to enhance the security of the computers connected to a network. By installing a firewall system, it makes the computer unique in other words the firewall absolutely isolates our computer from internet using a Wall of cod. Firewalls has various abilities the main ability it has was it can enhance the security by enabling granular control over what type of system functions. Some people think that the firewall is a system that is used to controls the traffic that passes through the network system but it’s actually software that is used to prevent unauthorized access of network systems. Normally these are the things that is done by the firewall system. • Defend resources • Validate access • Manage and control network traffic • Record and report on events U. Rangith 11 | P a g e Security |Assignment1 HND in Computing and Systems Development 2.1.2 What is a firewall Policy? Firewall policy is a set of rules that includes how to use this software so it’s easy to handle the software. This an application that is designed to control the flow of internet protocol (IP). And the firewall policy is contained the types of firewalls and Firewall Architectures. When we talk about the types of firewalls there are various kinds types, they are, • Packet filters • Proxy servers • Application gateways Packet Filters: A packet filter is a firewall that reviews each packet for user-defined filtering rules to control whether to pass or block it. For example, the filtering rule might need all Telnet requests to be dropped. Using this information, the firewall will block all packets that have a port number 23 (the default port number for Telnet) in their header. Filtering rules can be built on source IP address, destination IP address, Layer 4 (that is, TCP/ UDP) source port, and Layer 4 destination port. Thus, a packet filter makes decisions based on the network layer and the transport layer. Proxy Servers: A proxy service is an application that redirects users’ requests to the real services based on an organization’s security policy. All message between a user and the actual server occurs through the proxy server. Thus, a proxy server performs as a communications broker between clients and the real application servers. Because it performs as a checkpoint where requests are validated against specific applications, a proxy server is usually processing intensive and can become a bottleneck under heavy traffic conditions Application Gateways: An application gateway is a proxy server that offers access control at the application layer. It performs as an application-layer gateway between the protected network and the untrusted network. Because it works at the application layer, it is talented to examine traffic in detail and, therefore, is considered the most secure type of firewall. It can stop certain applications, such as FTP, from incoming the U. Rangith 12 | P a g e Security |Assignment1 HND in Computing and Systems Development protected network. It can also log all network actions according to applications for both accounting and security audit purposes. 2.1.3 What is Virtual private network (VPN)? When we browse something or search something from network system their web traffic from snooping, interfaces, and censorship to avoid this we can use VPN (Virtual private networks). VPN is a Secure tunnel between two or more devises to prevent from web traffic, snooping, interference, and censorship. A VPN uses data encryption and other security mechanisms to prevent unauthorized users from accessing data, and to ensure that data cannot be modified without detection as it flows through the Internet. It then uses the tunneling process to transport the encrypted data across the Internet. Tunneling is a mechanism for encapsulating one protocol in another protocol. In the context of the Internet, tunneling allows such protocols as IPX, AppleTalk, and IP to be encrypted and then encapsulated in IP. Similarly, in the context of VPNs, tunneling disguises the original network layer protocol by encrypting the packet and enclosing the encrypted packet in an IP envelope. This IP envelope, which is an IP packet, can then be transported securely across the Internet. At the receiving side, the envelope is removed and the data it contains is decrypted and delivered to the appropriate access device, such as a router. 2.1.4 What is VPN policy? VPN policy is a set of rules that includes how to use this secure tunnel so it’s easy to handle interference and censorship. And the VPN policy is contained the types of VPNs and VPN Architectures. When we talk about the types of VPN there are various kinds types, they are Access VPNs provide remote users such as road warriors (or mobile users), telecommuters, and branch offices with reliable access to corporate networks. U. Rangith 13 | P a g e Security |Assignment1 HND in Computing and Systems Development Intranet VPNs allow branch offices to be linked to corporate headquarters in a secure manner. 2.1.5 How improper firewalls and VPNs impact to the EMC company? EMC is a well reputed cloud solution provider in Srilankan. Normally EMC is providing their services to SME bank in Srilankan and WEEFM company. EMC cloud solution Company provides SAAS, PAAS, LAAS to their customers. Not only in srilanka EMC company is doing transactions with external countries when doing those transactions firewalls and VPNs are the two software that is very important to install. Because when doing transaction through networks some unauthorized accesses can be attacked to the network system, not only that some other private networks also can attack to the network system. When it gets attacked by other accesses, they can get important information of EMC company, specially by the competitors. If the competitors EMC company get the details about the company it’s a huge risk to the company to prevent these kinds of risks the firewalls are very important to install. And if there are improper firewalls also, we have to face these risks. The other reason was the existing of improper VPNs it’s the other problem that arise when doing online transactions because when we doing online transactions without using a proper VPNs sometimes there might have web traffic, snooping and interference by these webs traffics transaction can’t do properly it may buffer. From the improper VPNs the reputation of the EMC company might get damaged because of that we have to install proper VPNs. U. Rangith 14 | P a g e Security |Assignment1 HND in Computing and Systems Development 2.2 Explain how the following technologies would benefit EMC Cloud and its Clients by facilitating a ‘trusted network’. (Support your answer with suitable examples). 2.2.1 Static IP What are static IPs? A static Internet Protocol (IP) address (static IP address) is a permanent number assigned to a computer by an Internet service provider (ISP). IP addresses are useful for gaming services, website hosting or Voice over Internet Protocol (VoIP). Speed and reliability are key advantages. According to a static address is constant, systems with static IP addresses are vulnerable to data extraction and higher security risks. Advantages of Static IPs • It’s good for creating Computer servers • It makes it easier for geolocation • It’s also better for dedicated services Disadvantages of static IPs • Static IP address could be security risk • Static IPs are preferred for hosting servers • The process to set a static IP is complex What is DHCP IPs? A DHCP server is used to import other IP addresses and automatically configure another network information. In most homes and small businesses, the router works as the DHCP server. In large networks, a single computer may act as the DHCP server. In short, the process goes like this: A device (the client) requests an IP address from a router (the host), after which the host assigns an available IP address to allow the client to communicate on the network. A bit more detail below ... U. Rangith 15 | P a g e Security |Assignment1 HND in Computing and Systems Development Advantages of DHCP IPs • Easy to manages DHCP IPs • We can create a tailored configuration for clients • Clients can use DHCPs to obtain the information needed Disadvantages of DHCP IPs • There are many security issues in DHCP IPs • It’s gets failure when there is single DHCP server • There are problems in DHCP server if we are using older Microsoft Servers. 2.2.1 DMZ DMZ means demilitarized zone this refers to host or another network system that exists as a secure and intermediate network system in other words we define it as path between two or more organizations internal network and the external. DMZ is mainly realized to safe an internal network from communication with and exploitation and access by external nodes and networks. DMZ can be a logical sub-network, or a physical network substitute as a safe bridge between an interior and exterior network. A DMZ network has restricted access to the internal network, and all of its communication is scanned on a firewall before being transported internally. If an attacker plans to breach or attack an organization’s network, a successful attempt will only result in the compromise of the DMZ network not the core network behind it. DMZ is considered more secure, safer than a firewall, and can also work as a proxy server. 2.2.3 Real function of the DMZ The over-all idea is that you put your public faced servers in the "DMZ network" so that you can separate them from your private, trusted network. The use case is that because your server has a public face, it can be greatly rooted. If that happens, and a hateful party gains access to your server, he should be lonely in the DMZ network and not have direct access to the private hosts. U. Rangith 16 | P a g e Security |Assignment1 HND in Computing and Systems Development 2.2.4 Architecture of DMZs network There are many ways to plan a network with a DMZ. The two basic approaches are to use either one or two firewalls, though most modem DMZs are planned with two firewalls. The basic method can be prolonged on to create complex constructions, depending on the network requirements. A solo firewall with at least three network interfaces can be used to make a network architecture containing a DMZ. The outside network is formed by joining the public internet. Different sets of firewalls rules for traffic among the internet and the DMZ, the LAN and the DMZ, and the LAN and the internet firmly control which ports and types of traffic are permitted into the DMZ from the internet, limit connectivity to specific hosts in the inside network and prevent unrequested connections either to the internet or the inside LAN from the DMZ. 2.2.2 NAT 2.2.5 What is NAT (Network Address Translation) Network Address Translation is the procedure where a network device, usually a firewall, allocates a public address to a computer inside an isolated network. The key use of NAT is to limit the number of public IP addresses an organization or company must use, for both economy and security purpose. However, to access resources outside the network, like the internet, these computers have to have a public address in order for replies to their requests to return to them. This is where NAT comes into play Internet needs that require Network Address Translation (NAT) are quite compound but happen so quickly that the end user hardly knows it has occurred. A workstation inside a network makes a request to a computer on the internet. Routers within the network identify that the request is not for a resource inside the network, so they send the request to the firewall. The firewall sees the request from the computer with the internal IP. IT then makes the same request to the internet using its own public address, and returns the response from the internet resource to the computer inside the private network. From outlook of the workstation, it appears that communication is directly with the site on the internet. When NAT is used in this way, all users inside the private network access the internet have the same public IP address when they use the internet. There are many Benefits we can get from the Network Address Translation (NAT). they are U. Rangith 17 | P a g e Security |Assignment1 HND in Computing and Systems Development • Reuse of private IP addresses • Enhance security for private networks by keeping internal address private from the external network • Connecting a large number of hosts to the global internet using a smaller number of public (external) IP address, there by conserving IP address space. 2.2.6 How Static IPs, DMZ, NAT helps to the EMC company? Static IPs – It is a permanent number assigned to a computer through internet service provider. Static IPs are useful to web hosting or voice over internet protocol (VOIP). The main advantage of using static IPs is speed and reliability. So, when EMC company is doing transaction with external countries it needs a fast internet connection for these kinds of activities the static IPs are highly help full to the EMC company. DMZ – This refers to host or another network system that exists as a secure and intermediate network system, in other words we can define it as a path between two or more organizations internal network and the external. When EMC company dealing with their clients some external network system might be attacked to the EMCs network work system. To prevent these kinds of attacks the EMC company can use DMZ network systems NAT – Network address translation is used to the limits the number of public IP address that EMC company must use, for both economically and security purposes. When there is public IP address the network system of the EMS company is used to reply to the requests that comes through unknown IP address. To prevent these activities NAT is highly help full to the EMC company. U. Rangith 18 | P a g e Security |Assignment1 HND in Computing and Systems Development 2.2.7 Trusted Network system? A Trusted network system is a network of plans that are linked to each other, and it can expose only to official users, and allows for only protected data to be transmitted. A Trusted Network System architecture uses current standards, protocols and hardware plans to implement “trust.” Trusted Network System deliver vital security services such as user authentication, complete network device admission control, end-device status checks, policy-based access control, traffic filtering, automated remediation of non-compliant devices and auditing. The Trusted Computing Group has broadcast industry standards for Trusted Network System. Several profitable Trusted Network System technologies have been advanced, including Cisco Trust Sec, Cisco Clean Access (formerly known as Cisco Network Admission Control, and Microsoft Network Access Protection. Components of the trusted network system • Network Access Device: All connectivity to a Trusted Network System is implemented via a network admission device, which applies policy. NAD functionality may exist in devices such as switches, routers, VPN concentrators and wireless access points. • Posture Remediation Servers: These servers deliver remediation choices to a client device in case of non-compliance. For example, a server may keep the latest virus signatures and need a non-compliant client device to load the signatures before joining a Trusted Network System. • Directory Server: This server validates client devices based on their identities or roles. • Posture Validation Servers: Posture validation servers assess the compliance of a client before it can join a TN. A PVS is typically a specialization for one client attribute • Other Servers: These contain trusted versions of Audit, DNS, DHCP and VPN servers. • Client Device: Every client device must be assessed prior to admission to a Trusted Network System. • Authorization and Access Control Server: The authorization and access control server upholds the policy and provides rules to NADs based on the results of authentication and posture validation. U. Rangith 19 | P a g e Security |Assignment1 HND in Computing and Systems Development 2.3 What is Network Monitoring System. Network monitoring is a computer network's systematic effort to detect slow or failing network mechanisms, such as overloaded or stopped/frozen servers, failing routers, failed switches or other difficult devices. In the event of a network disappointment or similar outage, the network monitoring system alerts the network administrator. Network monitoring is a subset of network management. Network monitoring is generally carried out through software applications and tools. Network monitoring services are broadly used to detect whether a given Web server is operative and connected properly to networks worldwide. Many servers that make this job provide a more complete visualization of both the Internet and networks. And there many benefits in Network monitoring system the main three benefits are Protecting your network against attackers – Network monitoring system is able to identify distrustful traffic, there by authorizing owners to act fast. A network monitoring service is able to provide a broad overview of an SMB’s entire IT infrastructure, so that nothing is misused. Today, exploits are more sophisticated and advanced, and are able to target a system in a diversity of ways. Monitoring antivirus and firewall solutions separately firewalls solutions separately may leave security gaps Keeping Informed without inhouse staff – A network monitoring service will send warnings and information to an SMB owner as issues arise. Otherwise, an SMB may need to either effort to monitoring their network security themselves or hire a full-time IT employee- Which could be very costly. Data breaches can be More harmful and more expensive the longer they go without being noticed. Optimizing and monitoring your network – Many small business owners are expected towards rapid growth. This growth cannot be possible if parts of their IT infrastructure are over- loaded or slowed. Network monitoring services will map out the infrastructure of a small business, showing an SMB owner area of development and any issues that currently need to be addressed. U. Rangith 20 | P a g e Security |Assignment1 HND in Computing and Systems Development LO3 Review mechanisms to control organizational IT security. 3.1. Discuss suitable risk assessment procedures for EMC Cloud solutions and impact an IT security audit will have on safeguarding organization and its clients Your discussion furthermore should include how IT security can be aligned with an organizational IT policy and how misalignment of such a policy can impact on organization’s security. 3.1 Risk Assessment Procedures. Identify Potential Risk Monitoring & Reviewing the Risk Analysing the Risk Treating the Risk Evaluating the Risk Figure 1 Five Steps of Risk Management Process 3.1.1 What is Risk Management Risk management encompasses the identification, analysis, and response to risk factors that form part of the life of a business. Effective risk management means attempting to control, as much as possible, future outcomes by acting proactively rather than reactively. Therefore, effective risk management offers the potential to reduce both the possibility of a risk occurring and its potential impact. (corporatefinanceinstitute, 2021). U. Rangith 21 | P a g e Security |Assignment1 HND in Computing and Systems Development Steps of Risk Management Process • Identify the risk • Analyze the risk • Mitigating Risks • Monitor the risk • Reporting Identify the risk First think we have to do in this process is Identify the Risk, by this identification we can get a clear view of the risk status in the particular organization with a clear picture of the risk. Analyzing the Risk After got the clear picture of the Identified Risk, we are able to analyze all of them by the impact on the particular organization. Mitigating Risks Risk Mitigation includes action which is need to take to reduce an organization’s exposure to essential risks and reduce the possibility of the risk which is not going to happened again. Monitor the risk Risk monitoring is the process which tracks and evaluates the levels of risk in an organization. The findings which are produced by risk monitoring processes can be used to help to create new strategies and update older strategies which may have proved to be ineffective. (Skillmaker, 2013) U. Rangith 22 | P a g e Security |Assignment1 HND in Computing and Systems Development Reporting Risk reporting is the vehicle for communicating the value that the Risk function brings to an organization. It allows for proactive risk management as organizations identify and escalate issues either as they arise, or before they are realized to take a proactive approach to managing risks. (PWC, 2011) What is a risk? Risk means a darkness situation that we will face in future. IT occurring over a relatively short time. These risks may occur due to the results of mankind. Most of the risks can happen to the organization due to the faults of the workers in the organization so as an owner of the organization the owner should assess the risks. What is Risk Assessment? So, as we talk above risks are common thing to various big organization communities, companies ETC. So, risk assessment means the term used to the overall process for identify and analysis the hazards and risk that going to occur to the company or organization, Analysis and evaluate the risk associated with that hazard. So, by identify and analysis the risk we have to determine the appropriate or control the risk when the hazards cannot be eliminated. We can identify certain kinds of risks through looking our work place by identify the things, situation, process etc. That may Couse harm to the people. After we identify the risk to avoid this risk from the organization when this determination is mad, we can next decide what measures should be there or in the organization to effectively eliminate or control the harm happening to the organization. 3.2 Data protection process that applicable to an organization. Data protection is very useful things to do in an organization because in any organization or in big companies there many useful data in it so when those data got leaked to their competitors the organization or the company will get bank rapt for sure. These are some of the uses full information that reputed companies have • The type of the customers they have U. Rangith 23 | P a g e Security |Assignment1 HND in Computing and Systems Development • Number of costumers they have • Banking information • Information about the assets So, these kinds of information got leaked from the business or organization that may occur a huge risk to that organization. So, there are many ways to protect these kinds of important data they are • Fixing CCTV cameras • Employee monitoring system Fixing of CCTV cameras As an owner in big organization Fixing of CCTV cameras is knowledgeable decision that taking by him because use of CCTV cameras must comply with state criminal’s eave dropping status which require posting signs where video monitoring is taking place and another useful that we get from the CCTV cameras are when some stealers or robbers attacked to the organization, we can monitor it from the cameras and we can take necessary decisions Employee monitoring This is also a method of data protection because some of the workers or employees may do Froud activities to the company So as an owner we have to aware about that So frequently monitoring the employees or workers is an important task to do. But there are limits to monitor the employees. Because their privacy things that employee also protecting so monitoring of the employees is permitted where the monitoring of the employees make a clear disclosure regarding the type of the scope of the monitoring in which its engaged. U. Rangith 24 | P a g e Security |Assignment1 HND in Computing and Systems Development Risk Assessment of EMC Cloud Solutions Assessment Scale (Probability of threat occurrence) Level of Percentage Remarks Probability [%)] Minor 0-20 Low probabilities Moderate 20-60 Normal probabilities Major 60-60 Moderate probabilities Critical 90-100 Critical stage of probabilities Assessment Scale (Impact of the threat to the organization) Level of Percentage Impact [%] Minor 0-20 Remarks Normal Level of impact to the particular organization Moderate 20-60 Moderate Level of impact to the particular organization Major 60-60 High Level of impact to the particular organization Critical 90-100 Critical Level of impact to the particular organization Figure 2 Five Steps of Risk Management Process U. Rangith 25 | P a g e Security |Assignment1 HND in Computing and Systems Development Identified Risk R01 Category Non-Physical Risk description DDoS Attacks Probability Moderate Impact Critical Rating Moderate Risk Countermeasures • Install a network monitoring system. • Identify the normal network traffic. • Configure firewalls and routers to block malformed traffic well. • Appoint a person to monitor the network regularly. Identified Risk R02 Category Non-Physical Risk description Virus Attacks Probability Moderate Impact Major Rating Moderate Risk Countermeasures • Install firewall device. • Install suitable antivirus software. • Run virus scan regularly. • Get windows security updates. U. Rangith 26 | P a g e Security |Assignment1 HND in Computing and Systems Development Identified Risk R03 Category Physical Risk description Power supply Failure Probability Minor Risk Impact Major Rating Minor Risk Countermeasures • Maintaining an emergency generator. • Maintaining an alternative server in a different location. • Fixing solar panels on the roof of the building. Identified Risk R04 Category Non-Physical Risk description Data Breach Probability Moderate Impact Very High Rating Moderate Risk Countermeasures • Secure the accessing methods • Encrypting Data so that the authorized person which possess the unique key only can access it. • Keep updating software regularly. • Use biometrical devices for access • Install and configure a suitable firewall U. Rangith 27 | P a g e Security |Assignment1 HND in Computing and Systems Development 3.1 Explain the mandatory data protection laws and procedures which will be applied to data storage solutions provided by EMC Cloud. You should also summarize ISO 31000 risk management methodology. 3.3.1 What is Law? For everything there must be lows and regulations that we should fallow. If not that organization or company can’t do it for continuously. First, we have to see what is the meaning of law. Low means a certain kind of order that is implemented by the head of the organization to minimize the mistakes, frauds, federations among the workers who are working in the organization Implementing lows is a difficult task that is done by the CEO of the company because he should know how to implement the suitable laws for the workers. When the low gets high some employee might not work properly or when there is less laws also the worker might not properly. Forget the work done by the workers the CEO must think from his perspective, the company’s perspective and employee’s perspective then he can continue his organization or the company peacefully without any mistakes, frauds and faverations Every CEO is looking for reduce the risks that coming towards his organization for that he should implement lows and regulations continuously but there are guidelines when implementing lows for the risks, that guidelines when are in ISO 31000 – 2018 U. Rangith 28 | P a g e Security |Assignment1 HND in Computing and Systems Development 3.3.2 Data Prevention Act 1998 (DPA1998) The Data Protection Act 1998 was an act of Parliament designed to protect personal data stored on computers or in organized paper filing systems. It enacted the EU Data Protection Directive, 1995’s provisions on the protection, processing and movement of personal data. (Rose, 2019) There are 8 principles of the Act guided its purpose and the data protection policies of organizations. At its core, the DPA 1998 has eight principles which were used by organizations to design their own data protection policies. Complying with these was essential for organizations to meet their obligations. Data Protection Act 1998 principles The 8 guiding principles of the Act are as follows; 3.3.3. Principle 1 - Fair and Lawful Personal data should be controlled and processed lawfully and fairly in relation to individuals. A Fair Processing Notice is included in the Act, which requires the controller to notify the subject of the following information: • The identity of the data controller • The purposes for which the personal data are intended to be processed • To whom the personal data may be disclosed to. The first data protection principle gave individuals the right for their personal data to be processed fairly and lawfully by any organization. 3.3.4. Principle 2 - Purposes Personal data should only be obtained if it will be used for a lawful purpose. It should not be processed for any means incompatible with the purpose. The second data protection principle placed a specific obligation on the controller to only use personal data for a lawful and justifiable purpose. U. Rangith 29 | P a g e Security |Assignment1 HND in Computing and Systems Development 3.3.3. Principle 3 - Adequacy Personal data should only be adequate to the purpose it will be used for. It must not be excessive to the purpose it will be used. The third data protection principle placed an obligation on the controller to only collect the minimum amount of information required. 3.3.4. Principle 4 - Accuracy Personal data should be accurate and up to date. If personal data becomes inaccurate, it can no longer be used for the purpose. The fourth data protection principle demanded the controller only collect, store and keep accurate information on the individual. 3.3.5. Principle 5 - Retention Personal data should not be kept longer than it is needed for. Personal data cannot be stored indefinitely until such a time it may serve a purpose. The fifth data protection principle placed a limit on the amount of time the controller can keep personal information on the individual. 3.3.6. Principle 6 - Rights Personal data should be processed in accordance with the rights of individuals. The following rights are mentioned in the legislation: • Access to personal data • Preventing process likely to cause damage or distress • Prevent direct marketing • Automated decision making • Correcting inaccurate personal data • Compensation U. Rangith 30 | P a g e Security |Assignment1 HND in Computing and Systems Development The sixth data protection principle gave individuals the right to choose how their personal data would be used. People now had a say in how organizations who held data about them used that data in their activities. 3.3.7. Principle 7 - Security Personal data should be protected using reasonable and practical means to maintain its integrity and people’s rights and freedoms. The Act specifically states that controllers must adopt measures to prevent the following: · Unauthorized processing of personal data · Unlawful processing of personal data · Accidental destruction, damage or loss to personal data The seventh data protection principle placed a legal obligation on the controller to secure data against unauthorized or unlawful processing and against accidental loss or destruction. 3.3.8. Principle 8 - International transfers Personal data should not be transferred outside the EU unless the country it is being transferred to can ensure adequate protection of the data in order to maintain the rights and freedoms of data subjects and their personal data. The eighth data protection principle requires the controller to inform the individual of their intent to transfer their data overseas and to ensure the country it is being transferred to can adequately protect the data under their own laws. Comparing these guiding principles with the DPA 2018’s Now that the Data Protection Act 1998 has been replaced by the Data Protection Act 2018, a comparison can be made between the two Acts. The new principles are as follows: · Lawfulness, fairness and transparency U. Rangith 31 | P a g e Security |Assignment1 HND in Computing and Systems Development · Purpose limitation · Data minimization · Accuracy · Storage limitation · Integrity and confidentiality (security) · Accountability There’s seven principles now, with ‘international transfers’ and ‘security’ being covered separately in legislation. A new accountability principle features here, making it the legal obligation of the organization to comply with the other principles – and being able to prove this compliance through the creation of documented policies that must be produced on demand. This is one of the biggest differences between the two Acts. As you can see, the principles are markedly similar to those of the Data Protection Act 1998, although the legislation behind them is very different and individuals’ rights around the processing of their data being enhanced. Perhaps the biggest difference is the Information Commissioner’s Office (ICO) now has the power to fine both the controller and processor. Under the DPA 1998, they only had powers to pursue the controller for infringement. So, there we have it, a summary of the 8 guiding principles of the now defunct Data Protection Act 1998. Many of the Act’s nuances live on in the Data Protection Act 2018, but any data protection policy based on the DPA 1998 will need updating to be compliant with the GDPR. Organizations who don’t do this now risk the effects of non-compliance, whether that be the loss of business if unable to produce appropriate policies, or action from the ICO. (Rouse, 2019) U. Rangith 32 | P a g e Security |Assignment1 HND in Computing and Systems Development 3.4.1 Summarization of ISO 31000: 2018 related to EMC company When we talk about the ISO 31000: 2018 this is consisting of risk management guidelines, providing principles and frame works to manage risks in EMC company. When the CEO of the EMC company is following those ISO 31000: 2018 low it easy to handle the EMC company. Because all the guidelines and frameworks are in it. Any business-like small scale and large-scale business or companies can use this ISO 31000: 2018 low. By using this ISO 31000: 2018 low it can help the EMC company to increase the likely hood of achieving objectives. And can easily identify the strength and weakness of the EMC company. These things are involved to the vision and mission of the EMC company. However, ISO 31000: 2018 act cannot be used for certification purposes. But it provides guidance for internal and external audit programs By maintain or following this ISO 31000: 2018 low the owner of the EMC company can compare the risks, Threats that comes towards the EMC company. In other words, the CEO of the EMC company can compare the threats that he faced in the past with the new threats that comes towards. And other benefit the owner of the EMC company has was it can compare their risk management practices with an internationally recognized Benchmark providing sound principals for effective management and corporate governance. Another benefit It has was the Owner of the EMC company can identify the risks before it effected to the company. From these benefits EMC company can move forward without any threats and risks. And owner of the EMC company can take decisions before there is risks attack or threat attack. 3.4.2 ISO 31000: 2018 Risk Management If the EMC company is affected with the risks the EMC company can have consequences in terms of economic performance and professional reputation as well as the environment safely and social out comes. If the threats or risks get effected to the economic performance of the EMC company it a huge loss for the company because customers will reject the company and the banks who giving loans to the company may rejected and the finally the U. Rangith 33 | P a g e Security |Assignment1 HND in Computing and Systems Development employees who are depend from the EMC company get affected. After the economic performances it get affected to the professional reputation. If the EMC company is dealing or doing transaction with the foreign countries the professional reputation is highly important. If it gets damaged due to the threats or risks attacks those countries also starting to reject the company. Because of these reasons managing risks effectively helps the EMC company to perform well in an environment full of uncertainty. 3.5 What is Audit? In Every huge scale company, there is Audit firm to examine the current situation of the company. If the employees did any frauds, illegal business they get caught in this situation. That is the benefit of an audit firm. If there no any department called audit firm the company must get bank rapt because no one is there to find out the frauds and other wrong things that is happening in the company. In some companies there are security audits, that means this audit is there to check weather security system is working in proper manner. If there is no audit system to examine the security system the security system also might get corrupted by the above things and points, we can tell that there is a huge impact to the organization security from the IT security audits. 3.5.1 What is IT security Audit? An IT security Audit involves an IT specialist examining an organization existing IT infrastructure to identify the strength of its current arrangements and any potential vulnerabilities. IT security is very important to the EMC company because by handling or maintain IT security audits it ensures the cyber defenses are up to date as they can be effectively detecting or giving response to any kind of threats possess by the hackers and other criminals who manipulate IT systems for their own ends. When the EMC company is dealing with external countries cyber defenses are very important, if it fails, very dangerous hackers attacked to the servers and take all the important information but if the cyber defenses are up to date there is no risk. U. Rangith 34 | P a g e Security |Assignment1 HND in Computing and Systems Development 3.5.2 What an IT security Audit does for the company. When all the IT services connected with the IT security audit the organization can have more formidable IT system in place. There are many departments in the company when the IT security audit connect to each department the function of the IT security audit may range from database management to resource planning as a chain network. For a company data is the one of the key assets that requires top security control. If the data get released or hacked by the competitors or other firm it is a main reason to the company get bank rapt or the company get a bad reputation, because of these reasons we have to protect our data. IT security auditors determine the type of information we have. How it flows in and out of organization and who has access to the information. 3.5.3 IT security Audits can identify the Vulnerable points and problem areas in the company. The special feature of IT security audits system has, it can identify the vulnerable points and problem areas easily. The IT system is a vast one with several components including hardware, software, data and procedures but the IT security system can find out the vulnerable areas easily. From the IT security system, we can check weather our hardware or software tools are configured properly and working properly. And security audits are retracing the security incidents or the dangerous situation that company faced in the past from the previous that might have exposed our security weak points. The other main thing that is done by the audit was the focus on the carrying out tests in terms of network weaknesses, operating system, access control and security applications. 3.6 How IT security aligned with organization policy? Security purposes aligned with the company’s goals and documented in company policies and procedures. company policies and procedures are not just paperwork—they are the basis of a strong security plan. Once the company policies and procedures have been advanced or updated with the company staffs help, your organization’s security basis will be more current, sound and in compliance. Companies’ cybersecurity experts: U. Rangith 35 | P a g e Security |Assignment1 HND in Computing and Systems Development • Cooperate with your organization to grow the strategies for successfully communicating policies, standards and procedures for measuring good security practices and agreements • Provide current management of the company policies, procedures and standards to safeguard those documents are kept current and relevant 3.6.1 Aligning Security with company objectives Aligning security with the organization’s greater business needs is becoming gradually important, but how do you really do it? What it comes down to is being talented to map security to business purposes. Done right, security can be a main business driver. Today, everyone from finance to Develops to sales and engineering has security top of mind, at least if they know what’s good for them. In this post, we’ll offer numerous ways to tie the gap between security and the rest of the company, allowing you to successfully bring it into the organization in order to meet any number of business purposes. 3.6.2 How IT security Misaligned with organization policy? Misalignment rises when the future purposes or plan is somewhat conflicting with the actual result. The idea of alignment in IS has been travelled specially in IT business alignment. The idea of alignment has also been examined in software expansion to address issues around alignment between growth and testing. The concept of alignment particularly in IT is complex as it is quite disjointed and relates to different surfaces. Hence in order to achieve suitable alignment, it is important to safeguard focused is on specific components of alignment rather than on the general alignment. For this reason, the lack of alignment which is mentioned to in this study as misalignment, is discussed in the setting of firstly, Outside entities such as customers, standards, and guidelines, regulations and third-party software, the different roles involved in the software growth process, the current and mandatory skills for integrating security requirements and lastly the general system reequipments. All the recognized forms of misalignment pose as challenges to the integration of security supplies in mobile application development. The section that follows gives an impression of the different form’s alignment. U. Rangith 36 | P a g e Security |Assignment1 HND in Computing and Systems Development LO4 Manage organizational security. 4.1 Design a security policy for EMC Cloud to minimize exploitations and misuses while evaluating the suitability of the tools used in an organizational policy. 4.1 suitability of the tools used in the polices Organizational design is measured in policy works as a forceful policy tool to put policy to action. However, earlier research has not examined the project organization as an exact form of organizational design and, hence, has not given much care to such organizations as a planned choice when choosing policy tools. The purpose of the article is to examine the project as a policy tool; how do such impermanent organizations function as a specific form of organization when public policy is applied? The article is based on a framework of policy operation and is demonstrated with two welfare reforms in the Swedish public sector, which were prepared and applied as project organizations. The case studies and the examination show that it is vital that a project organization fits into the overall governance structure when used as a policy tool. If not, the project will remain summarized and will not have sufficient influence on the permanent organizational structure. The concept of encapsulation indicates a need to defend the project from a potential hostile environment. The implication of this is that organizational design as a policy tool is a matter that rates more attention in the planned discussion on implementing public policies and on the suitability of using certain policy tools. The overall idea is to develop a plan that will allow the IT department to recover enough data and system functionality to allow a business or organization to operate. 4.1.1 Creating disaster recovery plan. An organization can start its DRP plan with an instant of vital action steps and a list of important contacts, so the most vital information is quickly and easily available. The plan should describe the roles and tasks of disaster recovery team members and outline the criteria to launch the plan into action. The plan then specifies, in detail, the incident response and recovery activities. U. Rangith 37 | P a g e Security |Assignment1 HND in Computing and Systems Development Disaster Management Plan Title Slide What is a Disaster – Understanding the Disaster U. Rangith 38 | P a g e Security |Assignment1 HND in Computing and Systems Development Type of Disasters Disaster Recovery Plan U. Rangith 39 | P a g e Security |Assignment1 HND in Computing and Systems Development Disaster Recovery Plan – Continue Creating a Disaster Recovery Plan – Steps U. Rangith 40 | P a g e Security |Assignment1 HND in Computing and Systems Development Creating a Disaster Recovery Plan Steps– Continue Resources involved - DRP U. Rangith 41 | P a g e Security |Assignment1 HND in Computing and Systems Development Effective DRP with Additional Resources Benefits of Creating DRP U. Rangith 42 | P a g e Security |Assignment1 HND in Computing and Systems Development Benefits of Creating DRP – Continue Key Components of DRP U. Rangith 43 | P a g e Security |Assignment1 HND in Computing and Systems Development Understanding the Structure Risk Management of DRP U. Rangith 44 | P a g e Security |Assignment1 HND in Computing and Systems Development DRP and Process Progress – Analyzed Infrastructure U. Rangith 45 | P a g e Security |Assignment1 HND in Computing and Systems Development Risk Impact on Organization Risk Impact on Organization – Continue U. Rangith 46 | P a g e Security |Assignment1 HND in Computing and Systems Development Team of DRP Test the DRP by Verifying it U. Rangith 47 | P a g e Security |Assignment1 HND in Computing and Systems Development Be Prepared for Ever (Infor Tech Researchers, 2007) 4.2 Develop and present a disaster recovery plan for EMC Cloud for all venues to ensure maximum uptime for its customers. Discuss how critical the roles of the stakeholders in the organization to successfully implement the security policy and the disaster recovery plan you recommended as a part of the security audit. 4.3.1 Who is a stake holder? Definition of the term "stakeholder": "A person, group or organization that has attention or concern in an organization. Stakeholders can affect or be affected by the organization's actions, objectives and policies. Some examples of key stakeholders are creditors, directors, employees, government (and its agencies), owners (shareholders), suppliers, unions, and the community from which the company’s attractions its resources. Not all stakeholders are equivalent. A company's customers are permitted to fair trading practices but they are not allowed to the same consideration as the company's employees. The stakeholders in a corporation are the individuals and constituencies that contribute, either willingly or unwillingly, to its wealth-creating volume and activities, and that are therefore its potential receivers and or risk bearers. U. Rangith 48 | P a g e Security |Assignment1 HND in Computing and Systems Development Types of the Stake Holders • Primary Stakeholders – Usually interior stakeholders, are those that involve in financial dealings with the business (for example stockholders, customers, suppliers, creditors, and employees). • Secondary stake holders – Usually outside stakeholders, are those who although they do not engage in direct financial conversation with the business – are affected by or can affect its activities (for example the general public, communities, activist groups, business support groups, and the media). • Excluded stake holders – Those such as children or the unbiassed public, initially as they had no financial impact on the company. Now as the concept takes an anthropocentric viewpoint, while some groups like the general public may be documented as stakeholders’ others remain excluded. Such a viewpoint does not give plants, animals or even geology a voice as stakeholders, but only an active value in relation to human groups or individuals. 4.3.2 Role of a security stake holder related to the company. We can view Security’s customers from two viewpoints: the roles and tasks that they have, and the security assistances they obtain. The roles and tasks aspect is vital because it controls how we should interconnect to our various security customers, based on allowing and swaying them to perform their roles in security, even if that role is a humble one, such as using an access card to gain admission to the facility. It is also vital because fulfilling their roles and tasks as employees, managers, contractors or partners is the way that security’s customers “pay for” the security that they obtain. If they do not see or understand the value of security or are not joyful about how much they have to pay for it (i.e. how much trouble they have to go through for security), they may select to bypass security, such as by following to enter the ability. While some individuals in our company or organization pay for security by assigning or approving security project funding, the popular of individuals pay for security by fulfilling their roles and tasks, and that is dangerous to establishing sound security throughout the organization or company. Due to the importance of the roles that our workers play in U. Rangith 49 | P a g e Security |Assignment1 HND in Computing and Systems Development security as well as the assistances security provides to them, we refer to the security’s customers as stakeholders. Security Stakeholders Exercise In last month’s column we started with making of a personal Lean Journal, and a first exercise of identifying the security stakeholders. Why performs this exercise? There are many assistances for security staff and majors as well as for security managers and directors who perform it. It helps to start with a small group first and then enlarge out using the results of the first workout to refine your efforts. Begin at the uppermost level of security and work down, such as the headquarters or local level for large organizations, and security manager, staff, managers and officers at the site level. Here are some of the benefits of this exercise: • Transfer’s knowledge and insights from more experienced personnel. • Shares knowledge between shifts and functions. • Can reveal security value not immediately apparent to security personnel. • Expands security personnel awareness of the value of their jobs. • Increases sensitivity of security personnel to security stakeholders’ concerns. • Provides a check on the effectiveness and scope of security personnel training. • Helps to reinforce the common purpose and build camaraderie. U. Rangith 50 | P a g e Security |Assignment1 HND in Computing and Systems Development What is Security Policy At its core, a security policy is a written document that states how an organization plans to protect the company’s information technology assets. The policy outlines the protections that should be enacted to ensure that the organization’s assets face minimal risks. A security policy, along with the accompanying procedures, standards, and guidelines, is key to implementing information security in an organization. Having a written security policy empowers an organization to take appropriate action to safeguard its data. An information security policy organization can serve several functions: • • • • • • • • It may be an intention and overall orientation, which is formally expressed by the organization. Privacy policy is a means to convey a culture of information security and to accept information security behaviors. It details the specific risks and how to address them, and thus provides controls that executives can use to guide employee behavior. It can help create an organizational culture of security awareness. It can help ensure that employee behavior is directed and monitored in compliance with security requirements. An effective security policy must carefully balance two key elements: trust and control. There are three approaches to trust: Trust everyone all the time. This is the easiest model to implement because there are no restrictions. However, this model is impractical because it makes systems vulnerable to attack. Trust no one at any time. This model is the most restrictive, but also unrealistic. Very few individuals will work for an organization that does not trust its employees. Trust some people some time. This approach takes prudence in the amount of faith given. Access is provided as needed, with technical controls to ensure trust is not compromised. The privacy policy strives to provide a consistent amount of trust by balancing distrust and too much trust. It does this by trusting some people for some time and providing the right level of access to resources for employees to perform their job functions, but not more than that. Determining the level of trust can be a delicate matter; Too much trust can lead to security issues, while too little trust can make it difficult to find and keep good employees. Control is the second factor that must be balanced. One of the goals of the privacy policy is to exercise control. The decision about the degree of control over a particular policy is not always clear. The security and cultural needs of an organization play a key role when deciding which level of control is appropriate. If policies are too restrictive or too difficult to enforce and U. Rangith 51 | P a g e Security |Assignment1 HND in Computing and Systems Development comply with, employees will ignore them or try to break the controls. Management must commit to the appropriate level of control that the privacy policy needs to address. Because privacy policies are a balancing act between trust and control, not all employees have a positive attitude towards them. Employees sometimes view security policies as a barrier to their productivity, a way to control their behavior, or as a list of rules that are difficult to follow. This is especially true if in the past, policies did not exist or were loosely enforced. Design a Security Policy When designing a security policy, you can consider a standard set of rules. They can be divided into what a policy must do and what a policy should do. Security policy must do Security policy should do • Be implementable and enforceable • • Be concise and easy to understand • • Balance protection with productivity • State reasons why the policy is necessary Describe what is covered by the policy Outline how violations will be handled The design of a security policy is not the work of one or two security personnel but rather of a group or a group. The security policy development team is responsible for developing the initial draft of the policy, determining which team is required to review each part of the policy, completing the required approval process, and determining how policy implementation. The group should have these representatives. • • • • • Senior-level administrator Management board members can enforce the policy Management board members can enforce the policy Representative from user community Member of legal staffs U. Rangith 52 | P a g e Security |Assignment1 HND in Computing and Systems Development Polices Policy Description What it will do PN001 Acceptable encryption policy Defines requirements for using cryptography. PN001 Antivirus policy Create guidelines to minimize the risk of Number computer viruses on the organization's network and computers. PN002 Audit vulnerability scanning Outline the requirements and provide authority policy for one information security team to conduct audits and risk assessments, investigate incidents, ensure compliance with privacy policies or track user activity. PN003 Automatically forwarded Specifies that no email will be automatically email policy forwarded to external destination without prior approval from the appropriate manager or director. PN004 PN005 Database credentials coding Define requirements for storing and retrieving policy database usernames and passwords. Router security policy Outlines the standards for the minimumsecurity configuration for routers and switches PN006 Server security policy Create standards for minimum security configurations for servers PN007 VPN security policy stablishes requirements for remote access virtual private network (VPN) connections to the organization’s network U. Rangith 53 | P a g e Security |Assignment1 HND in Computing and Systems Development In addition to the privacy policies listed in the table above, most organizations have a privacy policy that addresses the use, privacy, data, human resources related to security and ethics, password management and complexity. • • • • • • • Acceptable Use Policy (AUP) Human Resource Policy Password Management Policy Privacy Policy Disposal and Destruction Policy Service-Level Agreement (SLA) Policy Compliance Monitoring and Evaluation Incidence Response Policy Outlines actions to be performed when a security breach occurs Most policies outline composition of an incidence response team (IRT) Should be composed of individuals from • • • Senior management – IT Professional Corporate council – Human Resources Public relations Ethics Policy Ethical policies are guidelines for all employees of a company to do the right thing and behave at high standards at all times. Good ethical policies create a good culture based on trust and transparency. Main purpose of an ethics policy is to state the values, principles, and ideals each member of an organization must agree to. U. Rangith 54 | P a g e Security |Assignment1 HND in Computing and Systems Development Conclusion EMC is a well reputed cloud solution provider in Srilanka. Normally EMC is providing their services to SME bank in Srilankan and WEEFM company. EMC cloud solution Company provides SAAS, PAAS, LAAS to their customers. And nearly their customer rate is five hundred roughly. The head office of EMC company is situated in Bambalapitiya. But in the EMC company there is a poor security system as physically and networkcally. So, by Implanting new security procedures we can make new system for EMC company and by using firewalls, VPNs, DMZ, NAT we can make a good network security system to the EMC company. So, from the things we learn above we know how to maintain the company without any risks and if there are any risks, we know how to overcome those. Other than that, finally we know about audit, importance about audit, who are stakeholder and role of the stakeholders. U. Rangith 55 | P a g e Security |Assignment1 HND in Computing and Systems Development References (2021). Retrieved from corporatefinanceinstitute. Anon. (2019, 02 13). https://www.researchgate.net/publication/266686928_Classification_of_Security_Thr eats_in_Information_Systems. Retrieved from www.researchgate.net: https://www.researchgate.net/publication/266686928_Classification_of_Security_Thr eats_in_Information_Systems Beal, V. (2015, MAY 15). entity-relationship diagram (model). Retrieved from webopedia: https://www.webopedia.com/TERM/E/entity_relationship_diagram.html Elmasri, R. (2013, JUNE 28). Database Management System . Retrieved from techopedia: https://www.techopedia.com/definition/24361/database-management-systems-dbms Hq.nasa.gov. (2019, 2 13). Hq.nasa.gov. Retrieved from https://www.hq.nasa.gov: https://www.hq.nasa.gov Infor Tech Researchers, I. (2007, June 20). https://www.infotech.com. Retrieved from https://www.infotech.com/research/drp-analysis-risk-and-businessimpact#:~:text=DRP%20Analysis%3A%20Risk%20and%20Business%20Impact%20 In%20many,communicates%20with%20the%20business%20owners%20of%20those %20assets. Investopedia. (2019, 02 13). www.investopedia.com. Retrieved from Return on Assets - ROA: https://www.investopedia.com/terms/r/returnonassets.asp Navathe, S. B. (2011). FUNDAMENTALS OF DATABAE SYSTEMS. New York San Francisco: Addison-Wesley. PWC. (2011, Sep). https://www.pwc.com.au. Retrieved from https://www.pwc.com.au/industry/banking-capital-markets/assets/insight-intoeffective-risk-reporting-sep11.pdf Rose. (2019). https://www.privacyhelper.co.uk/knowledge-hub-articles. Retrieved from www.privacyhelper.co.uk: https://www.privacyhelper.co.uk/knowledge-hub- articles/data-protection-act-1998-a-summary-of-the-8-guiding-principles U. Rangith 56 | P a g e Security |Assignment1 HND in Computing and Systems Development Rouse. (2019). https://www.privacyhelper.co.uk. Data Protection Act. Retrieved from https://www.privacyhelper.co.uk: https://www.privacyhelper.co.uk/knowledge-hub- articles/data-protection-act-1998-a-summary-of-the-8-guiding-principles Schudy, R. (2016). Microsoft SQL Server Installation Guide. Massachusetts: Boston University. Skillmaker. (2013, Dec). Rrisk-Monitoring/. Retrieved from https://www.skillmaker.edu.au/risk-monitoring/ Techopedia. (2018). Techopedia. Retrieved march 12, 2018, from 12, 2018, from 12, 2018, from 28, 2018, from https://www.techopedia.com/definition/1221/normalization Techopedia. (2018). Techopedia. Retrieved march https://www.techopedia.com/definition/19504/functional-dependency TechTarget. (2000). TechTarget. Retrieved march http://searchsqlserver.techtarget.com/definition/normalization Techwalla. (2018). Techwalla. Retrieved february https://www.techwalla.com/articles/what-is-relational-database-schema U. Rangith 57 | P a g e Security |Assignment1