Uploaded by Thịnh Huỳnh

[123doc] - asm-2-security-1623-fpt-greenwich-merit-super-sale

advertisement
ASSIGNMENT 2 FRONT SHEET
Qualification
BTEC Level 5 HND Diploma in Computing
Unit number and title
Unit 5: Security
Submission date
Date Received 1st submission
Re-submission Date
Date Received 2nd submission
Student Name
Student ID
Class
Assessor name
Michael Omar
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the consequences of plagiarism. I understand that
making a false declaration is a form of malpractice.
Student’s signature
Grading grid
P5
P6
P7
P8
M3
M4
M5
D2
D3
1
 Summative Feedback:
Grade:
Lecturer Signature:
 Resubmission Feedback:
Assessor Signature:
Date:
1
Table of Contents
Table of Contents ............................................................................................................................................................ 2
List of Figures.................................................................................................................................................................. 4
List of Tables ................................................................................................................................................................... 4
INTRODUCTION ........................................................................................................................................................... 5
TASK 1 - DISCUSS RISK ASSESSMENT PROCEDURES (P5) ................................................................................ 6
I.
DEFINE A SECURITY RISK AND HOW TO DO RISK ASSESSMENT ....................................................... 6
1.
Definition Of Security Risks............................................................................................................................. 6
2.
Risk Assessment Procedures ............................................................................................................................ 6
II.
DEFINE ASSETS, THREATS, AND THREAT IDENTIFICATION PROCEDURES, AND GIVE
EXAMPLES ................................................................................................................................................................ 9
1.
Definition of Assets .......................................................................................................................................... 9
2.
Definition of Threats ......................................................................................................................................... 9
3.
Threat Identification Process ............................................................................................................................ 9
4.
Examples of Threats Identification procedures .............................................................................................. 10
III.
EXPLAIN THE RISK ASSESSMENT PROCEDURE ................................................................................. 10
a)
Asset Identification ......................................................................................................................................... 11
b)
Threat identification ........................................................................................................................................ 11
c)
Assessment of Vulnerability ........................................................................................................................... 11
d)
Risk assessment .............................................................................................................................................. 11
IV.
LIST RISK IDENTIFICATION STEPS ........................................................................................................ 12
V. SUMMARISE THE ISO 31000 RISK MANAGEMENT METHODOLOGY AND ITS APPLICATION IN
IT SECURITY(M3) ................................................................................................................................................... 13
1.
Definition ........................................................................................................................................................ 13
2.
Contents of ISO 31000 ................................................................................................................................... 13
3.
Who Should use ISO 31000............................................................................................................................ 15
4.
Applications of ISO 31000 in IT Security ...................................................................................................... 16
TASK 2 - EXPLAIN DATA PROTECTION PROCESSES AND REGULATIONS AS APPLICABLE TO AN
ORGANIZATION (P6) ................................................................................................................................................. 18
I.
DEFINITION OF DATA PROTECTION ......................................................................................................... 18
2
II.
EXPLAIN THE DATA PROTECTION PROCESS IN AN ORGANIZATION ........................................... 18
III.
WHY ARE DATA PROTECTION AND SECURITY REGULATION IMPORTANT? ............................. 19
IV. DISCUSS POSSIBLE IMPACTS ON ORGANISATIONAL SECURITY RESULTING FROM AN IT
SECURITY AUDIT (M4) ......................................................................................................................................... 20
1.
Definition of IT Security Audit ...................................................................................................................... 20
2.
Systems That An IT Security Audit covers .................................................................................................... 21
3.
The Possible Impacts To Organisational Security Resulting From An IT Security Audit ............................. 21
TASK 3 - DESIGN AND IMPLEMENT A SECURITY POLICY FOR AN ORGANIZATION (P7) ....................... 23
I.
DEFINE A SECURITY POLICY AND DISCUSS IT ...................................................................................... 23
1.
Define Security Policy: ................................................................................................................................... 23
2.
Discussion on policies: ................................................................................................................................... 24
II.
GIVE AN EXAMPLE FOR EACH OF THE POLICIES .............................................................................. 28
III.
GIVE THE MOST AND SHOULD THAT MUST EXIST WHILE CREATING A POLICY..................... 31
IV.
EXPLAIN AND WRITE DOWN ELEMENTS OF A SECURITY POLICY ............................................... 32
V. GIVE THE STEPS TO DESIGN A SECURITY POLICY ............................................................................... 35
TASK 4 - LIST THE MAIN COMPONENTS OF AN ORGANIZATIONAL DISASTER RECOVERY PLAN,
JUSTIFYING THE REASONS FOR INCLUSION (P8) ............................................................................................. 37
I.
DISCUSS WITH AN EXPLANATION ABOUT BUSINESS CONTINUITY ................................................ 37
1.
Definition: ....................................................................................................................................................... 37
2.
The Importance of Business Continuity ......................................................................................................... 38
II.
LIST THE COMPONENTS OF THE RECOVERY PLAN .......................................................................... 39
III.
ALL THE STEPS REQUIRED IN THE DISASTER RECOVERY PROCESS ........................................... 41
IV. EXPLAIN SOME OF THE POLICIES AND PROCEDURES THAT ARE REQUIRED FOR BUSINESS
CONTINUITY ........................................................................................................................................................... 43
V. DISCUSS THE ROLES OF STAKEHOLDERS IN THE ORGANISATION TO IMPLEMENT SECURITY
AUDIT RECOMMENDATIONS (M7) .................................................................................................................... 45
CONCLUSION ............................................................................................................................................................. 46
References ..................................................................................................................................................................... 46
3
List of Figures
Figure 1: Security Risk .................................................................................................................................................... 6
Figure 2: Risk assessment Procedures ............................................................................................................................. 7
Figure 3:Security Threats ................................................................................................................................................ 9
Figure 4: ISO 31000 ...................................................................................................................................................... 13
Figure 5: ISO 31000 Principles ..................................................................................................................................... 14
Figure 6: Data Protection............................................................................................................................................... 18
Figure 7: IT security audit ............................................................................................................................................. 20
Figure 8: Security Policy ............................................................................................................................................... 23
Figure 9: business continuity ......................................................................................................................................... 38
List of Tables
Table 1: ROLES OF STAKEHOLDERS IN THE ORGANISATION TO IMPLEMENT SECURITY AUDIT RECOMMENDATIONS ............... 46
4
INTRODUCTION
In today's data-driven and internationally networked culture, data routinely moves freely between individuals,
organizations, and businesses. Cybercriminals are fully aware that data has a high monetary value. As a result of the
continuous growth in cybercrime, the demand for security specialists to safeguard and defend a business is expanding.
To help me get deeper knowledge in this field, this report will discuss some fundamentally basic theories of security
including discussing Risk assessment procedures; explaining data protection processes and regulations as applicable
to an organization and designing a security policy for an organization. Additionally, it also discusses list the main
components of an organizational disaster recovery plan, justifying the reasons for inclusion.
5
TASK 1 - DISCUSS RISK ASSESSMENT PROCEDURES (P5)
I.
DEFINE A SECURITY RISK AND HOW TO DO RISK ASSESSMENT
1. Definition Of Security Risks
The likelihood of exposure, loss of key assets and sensitive information, or reputational harm as a result
of a cyber assault or breach within an organization's network is known as security risks. Cybersecurity
must remain a key priority across industries, and businesses should endeavour to create a cybersecurity
risk management plan to guard against ever-evolving cyber threats.
Figure 1: Security Risk
2. Risk Assessment Procedures
2.1. Definition:
A security risk assessment finds, evaluates, and applies important application security measures. It
also focuses on preventing security flaws and vulnerabilities in applications. An enterprise may see
its application portfolio holistically—from the standpoint of an attacker—by conducting a risk
assessment. It aids managers in making well-informed decisions about resource allocation, tools,
and security control implementation. As a result, completing an evaluation is an important aspect
of a company's risk management strategy.
6
Figure 2: Risk assessment Procedures
2.2. How Does Risk Assessment Works:
The depth of risk assessment models is affected by factors like size, growth rate, resources, and
asset portfolio. When faced with money or time restrictions, organizations might conduct generic
evaluations. Generalized evaluations, on the other hand, may not always include precise mappings
of assets, related threats, recognized risks, effects, and mitigation mechanisms. A more in-depth
evaluation is required if the findings of the generalized assessment do not offer enough of a link
between these areas.
2.3. Risk Assessment Steps
 Step 1: Determine the dangers. The first stage of a risk assessment is to identify any possible
risks that would have a negative impact on the organization's capacity to do business if they
occurred. Natural catastrophes, utility outages, cyberattacks, and power outages are all
potential dangers that might be evaluated or discovered during a risk assessment.
 Step 2: Figure out what or who could be damaged. After the risks have been determined, the
following stage is to assess which business assets would be harmed if the risk materialized.
Critical infrastructure, IT systems, business operations, company reputation, and even
employee safety are all considered to be in danger from these threats (Cole, 2021).
7
 Step 3: Assess the threats and devise countermeasures. Risk analysis may assist in determining
how risks will affect company assets, as well as the steps that can be implemented to reduce or
eliminate the effects of these hazards on business assets. Property damage, company
interruption, financial loss, and legal fines are all possible risks.
 Step 4: Keep a record of your results. The company's risk assessment results should be
documented and filed as formal records that are easily accessible. Details on possible dangers,
their related risks, and measures to avoid the hazards should be included in the records.
 Step 5: Regularly review and update the risk assessment. In today's corporate world, potential
dangers, risks, and the controls that go along with them can alter quickly. It is critical for
businesses to update their risk assessments on a frequent basis in order to keep up with these
developments (Cole, 2021).
2.4. The goals of Risk Assessment
 Creating a risk profile that includes a quantitative examination of the hazards that the company
confronts.
 Creating a comprehensive inventory of IT and data assets.
 Justifying the expense of risk and vulnerability mitigation security remedies.
 Creating a comprehensive inventory of IT and data assets.
 Risks, threats, and known vulnerabilities to the organization's production infrastructure and
assets are identified, prioritized, and documented.
 Creating a budget to address or reduce the risks, hazards, and vulnerabilities that have been
identified.
 If money is invested in infrastructure or other corporate assets to mitigate possible risk, it's
important to understand the return on investment.
8
II.
DEFINE ASSETS, THREATS, AND THREAT IDENTIFICATION PROCEDURES, AND GIVE
EXAMPLES
1. Definition of Assets
Any data, gadget, or another component of the framework that supports information-related actions is
an asset in information security, computer security, and network security. Hardware (such as servers
and switches), software (such as mission-critical applications and support systems), and secret
information are all examples of assets. Assets must be protected from unauthorized access, use,
disclosure, alteration, destruction, and/or theft, which might result in a financial loss (Haldenby, 2016).
2. Definition of Threats
Software assaults, loss of intellectual property, identity theft, theft of equipment or information,
sabotage, and information extortion are all examples of information security threats.
Anything that can exploit a vulnerability to breach security and negatively change, delete, or injure an
item or object of interest is considered a threat. In this tutorial series, we'll define a threat as a potential
hacker attack that allows someone to obtain unauthorized access to a computer system
Figure 3:Security Threats
3. Threat Identification Process
 Pre-work meetings should be held to discuss the daily tasks to be completed.
 Encourage employees to be aware of potential dangers and to report them.
 Conduct workplace audits and safety inspections
 Perform a JSA
 HAZOPS should be used.
9
 Any novel procedures, materials, or buildings should be evaluated.
 Examine the product's safety information.
 Examine data that is freely available.
 Look for the previous incident and near-miss reports.
4. Examples of Threats Identification procedures
Identification threat in Asset: digital document/data:
 Threat identification: storage data failure and there is no document backup (possible availability
loss)
 Threat identification: Virus, caused vulnerability is when the anti-virus software is not up to date
or contains many security holes(possible confidentiality, integrity and availability loss)
 Threat identification: Unauthenticated access from an unidentified site; the access control strategy
isn't adequately established is a vulnerability, SQL injection from an unidentifiable party(possible
confidentiality, integrity and availability loss)
 Threat identification: Unauthorized access is a threat. Access was granted to far too many persons,
which created a vulnerability (possible confidentiality, integrity and availability loss)
Identification threat of Asset: physical document:
 Threat identification: Fire, hurricanes; the vulnerability is that the document is not housed in a
fire-proof safety box(the threat is that the availability of the document will be lost).
 Threat identification: Earthquakes, fire, etc.. and there is no backup of these document paper
(possible availability loss)
 Threat identification: Unauthorized access; the important document is not locked and assured in
a safety box (possible confidentiality loss) is a weakness.
III.
EXPLAIN THE RISK ASSESSMENT PROCEDURE
A risk assessment procedure should be carried out by a competent person or group of people who have a
thorough understanding of the subject under investigation. Supervisors and workers who work with the
10
process under evaluation should be included on the team or used as sources of information because they
are the most familiar with it. Here are procedures of risk assessment:
a) Asset Identification
 The assets inventory
Completed objects, components, or raw materials that an organization intends to sell are referred
to as inventory assets. In accounting, inventory is documented as a current asset on a company's
balance sheet. Manufacturing inventory assets serve as a buffer in the case of an increase in
demand (Cole, 2021).
 Attribute of assets to be recorded
 Calculate the asset's relative worth.
b) Threat identification
 Sort threats into categories.
A security threat is a malicious act undertaken to steal or damage data or disrupt an organization's
systems or the entire enterprise.
c) Assessment of Vulnerability
 Determine the asset's present weakness.
Organizations employ internal controls to protect themselves and maintain compliance with
industry norms and regulations when it comes to managing financial risks.
Effective controls help ensure that financial reporting is accurate and that investment, capital, and
credit requirements are satisfied.
 Vulnerability scanners should be used on both hardware and software.
A vulnerability scanner is a software that detects security problems in computers, networks,
operating systems, and other software applications. It's important to note that the same technology
may be utilized both proactively by system administrators and maliciously by cybercriminals.
d) Risk assessment
 Calculate the organization's vulnerability impact
Due to a variety of hazards, all facilities are in some danger. These dangers might arise as a result
of natural disasters, accidents, or deliberate operations meant to cause harm. Regardless of the
11
nature of the danger, facility owners must limit or control the risks caused by these hazards as
much as possible.
 Determine the expectancy of a loss.
 Calculate the probability that the vulnerability will be exploited.
We observed that using probability in more traditional risk analysis has sparked a lot of curiosity.
This section teaches some basic concepts in probability and illustrates how to apply them to
perform 7 operations (Cole, 2021).
 Make a decision about what to do with the risk.
It's crucial to note that the evaluation must consider not just the existing status of the workplace, but also
any possible circumstances.
The employer and the health and safety committee (where applicable) can determine if and to what extent
a control program is necessary by evaluating the degree of risk associated with the hazard.
IV.
LIST RISK IDENTIFICATION STEPS
 Step 1 - Template specification: This is a risk statement based on information provided concerning
causes, consequences, impacts, risk regions, and occurrences. A well-structured template can assist
you in capturing this information in a consistent manner.
 Step 2 - Basic Identification: Answering two questions regarding prospective risks: why or why not
us, and whether or not they have previously been encountered. The former may be acquired through a
SWOT analysis process, whereas the latter is a statement that should be sourced from a project
postmortem or lessons learned library.
 Step 3 - Detailed identification: This stage takes longer than the others, but it provides the information
you need to correctly analyze risk. PMI recommends the following five tools for use:
o Interviewing
o Analysis of Assumptions
o Examining documents
o The Delphi method
o Brainstorming
12
 Step 5 - Internal Cross-check: At this step, begin to build an opinion on which project parts are riskier
than others, as well as what mitigation methods to use.
 Step 6 - Statement Finalization: compiles results into a set of graphics that include dangerous
locations, causes, and consequences.
V.
SUMMARISE THE ISO 31000 RISK MANAGEMENT METHODOLOGY AND ITS
APPLICATION IN IT SECURITY(M3)
1. Definition
ISO 31000 is a security analysis technique (also known as a risk management process) that is utilized
in a variety of risk management programs in a variety of sectors. It aids in the standardization of the
procedures users take to assess and manage risk, resulting in a formal and consistent process (Anon.,
2016).
Figure 4: ISO 31000
Risk management may be applied to a full company, as well as individual departments, projects, and
activities, at any time and at various levels.
2. Contents of ISO 31000
a) Scope
ISO 31000 is an international risk management standard that may be implemented by any business,
regardless of size or industry (Lashin, n.d.).
13
At all levels and departments of a company, ISO 31000 may be used to achieve any and all sorts of
objectives.
It may be applied to all sorts of operations and can be utilized at a strategic or organizational level
to aid decision-making.
It may be used to assist manage processes, operations, functions, projects, programs, goods,
services, and assets; however, how an organization applies ISO 31000 is up to them and will be
determined by their goals, objectives, and problems, and should represent what they do and how
they operate.
b) Terms and Definitions
c) Principles
Figure 5: ISO 31000 Principles
d) Frameworks
The efficacy of the management framework provides the foundations and arrangements that will
integrate risk management across the business at all levels, according to ISO 31000.
The framework is as follows:
 Guarantees that information concerning risk obtained from the risk management process is
appropriately reported;
 Ensures that this information is utilized as a foundation for decision making and
accountability at all relevant organizational levels.
14
This section defines the framework for risk management's required components and how they
interact in an iterative manner:
 Mandate and commitment
 Design of framework for managing risk
 Implementing risk management
 Monitoring and review of the framework
 Continual improvement of the framework
 Risk assessment
 Risk treatment
 Monitoring and review
 Recording the risk management process:
e) Process
According to ISO 31000, the success of risk management is determined by the management's
efficacy.
The risk management process should be:
 An important component of management;
 Embedded in the organization's culture and practices;
 Tailored to the organization's business operations.
The following activities are included in the risk management process:
 Consultation and communication: All stages of the risk management process should include
communication and interaction with external and internal stakeholders.
 Creating the context: The organization articulates its objectives, identifies the external and
internal elements to be considered when managing risk, and establishes the scope and risk
criteria for the remaining process by establishing the context.
3. Who Should use ISO 31000
ISO 31000 can be utilized by a variety of persons, including those who need to:
 Create a risk management policy (top management).
 Review risk management procedures and practices (assessors).
15
 Managing and controlling risk within a company (managers).
 Describe the methods for managing and controlling risk (trainers - consultants).
 Create risk management policies and procedures (implementers).
 Develop related standards and norms of conduct (experts).
4. Applications of ISO 31000 in IT Security
a) Risk management creates and protects the value
Risk management helps to accomplish measurable goals and enhance performance in areas such as
human health and safety, security, legal and regulatory compliance, public acceptance,
environmental protection, product quality, project management, operational efficiency, governance,
and reputation (Lashin, 2016).
b) Risk management is an integral part of all organizational processes
Risk management is not a stand-alone activity distinct from the organization's major operations and
procedures. Risk management is an element of management's duties and an essential component of
all organizational operations, such as strategic planning and project and change management.
c) Risk management is part of decision making
Risk management aids decision-makers in making well-informed decisions, prioritizing activities,
and distinguishing between different options.
d) Risk management explicitly addresses uncertainty
Uncertainty, the nature of that uncertainty, and how it might be managed are all addressed directly
in risk management.
e) Risk management is systematic, structured and timely
Risk management that is systematic, timely, and organized leads to efficiency as well as consistent,
comparable, and trustworthy results.
16
f) Risk management is based on the best available information
The information sources used in the risk management process include historical data, experience,
stakeholder feedback, observation, projections, and expert judgment. However, decision-makers
should be aware of and consider any limits of the data or modelling employed, as well as the
likelihood of expert divergence.
g) Risk management takes human and cultural factors into account
Risk management is based on the organization's external and internal contexts, as well as its risk
profile.
h) Risk management is transparent and inclusive
Risk management takes into account the capabilities, attitudes, and intentions of external and
internal stakeholders who might help or impede the organization's goals.
i) Risk management is transparent and inclusive
Risk management stays relevant and up-to-date with appropriate and timely participation of
stakeholders and, in particular, decision-makers at all levels of the organization. Stakeholder
involvement also ensures that they are adequately represented and that their opinions are taken into
consideration when setting risk criteria.
j) Risk management is dynamic, iterative and responsive to change.
Change is constantly sensed and responded to by risk management. As external and internal events
occur, context and knowledge shift, risks are monitored and reviewed, new hazards develop, some
shift, and others vanish.
k) Risk management facilitates continual improvement of the organization.
Along with all other parts of their business, organizations should design and implement methods to
improve their risk management maturity.
17
TASK 2 - EXPLAIN DATA PROTECTION PROCESSES AND REGULATIONS AS APPLICABLE TO AN
ORGANIZATION (P6)
I.
DEFINITION OF DATA PROTECTION
"Data protection" is the process of protecting data and involves the relationship between the collection and
dissemination of data and technology, the public perception and expectation of privacy and the political
and legal underpinnings surrounding that data. It aims to strike a balance between individual privacy rights
while still allowing data to be used for business purposes (Crocetti, 2021).
Figure 6: Data Protection
Data protection is also known as data privacy or information privacy.
II.
EXPLAIN THE DATA PROTECTION PROCESS IN AN ORGANIZATION
1) Assessing Risks
The riskier the data get, the more the security required. Sensitive data should be protected as much as
possible, whereas low-risk data can be granted less security. The main rationale for these evaluations is
the financial benefit since stronger data security means higher costs.
2) Backup Data
18
Backup is always a way of preventing data loss, which can occur as a result of user mistakes or
technological failure. Low-importance data does not need to be backed up as frequently as sensitive
data. Tape storage technologies are still (by two-thirds) less expensive than hard drives.
3) Data Encryption
High-risk data is the ideal choice for encryption at every stage of the process. Data that has been
adequately encrypted is inherently secure; even if a data breach occurs, attackers will render the data
useless and unrecoverable. Encryption is particularly mentioned in the GDPR as a data security
measure.
4) Pseudonymization
Another method recommended by the GDPR for improving data security and individual privacy is
pseudonymization. It works well with larger data sets and involves deleting personally-identifying
information from data snippets. The notification duties in the event of pseudonymized data breaches
have been greatly reduced.
5) Access Controls
The fewer people who have access to the data, the smaller the risk of (inadvertent) data leak or loss.
Keep track of previous data handling education courses and refreshers on a regular basis. Create a clear
and explicit data protection policy.
6) Destruction
On-site data destruction is recommended for sensitive data. The most frequent method for damaged
hard drives is degaussing. Paper, CDs, and tape drives are all shredded into minute pieces. By deleting
the decryption keys, encrypted data may be easily wiped.
III.
WHY ARE DATA PROTECTION AND SECURITY REGULATION IMPORTANT?
Data exists in every company and organization, including personnel files, customer data, product
information, financial transactions, and so on. This data is used to inform management decisions as well as
employee work procedures in order to produce high-quality products and services. In fact, data is one of a
company's most valuable assets. Data security should be a top concern for every firm for this reason alone.
This involves safeguarding the data's accessibility to personnel who require it, its integrity (keeping it
correct and up-to-date), and its confidentiality (the assurance that it is available only to people who are
authorized).
19
Customers will expect firms they do business with or invest money in to keep their data protected. Data
governance that is adequate fosters confidence. It protects your company's image by establishing you as a
brand that customers can trust with their personal information.
The data protection and security regulation elevated data security to a new level of importance, making it
not just a business but a legal need. A controller must 'take suitable technological and organizational means
to guarantee and be able to show that processing is carried out in compliance with the Regulation,' according
to the GDPR. Security awareness training is an important aspect of such measures: employees must
understand the need of adhering to data security rules and processes. Headlines about, and bad responses
to, a data breach, for example, may erode confidence built up over a decade in a matter of days (Besemer,
2011).
IV.
DISCUSS POSSIBLE IMPACTS ON ORGANISATIONAL SECURITY RESULTING FROM AN
IT SECURITY AUDIT (M4)
1. Definition of IT Security Audit
A security audit is a systematic assessment of a company's information system's security by determining
how well it complies with a set of criteria. The security of the system's physical setup and environment,
software, information handling processes, and user habits are normally assessed during a complete audit
(Gillis, 2021).
Figure 7: IT security audit
20
Security audits are often used to determine compliance with regulations such as the Health Insurance
Portability and Accountability Act, the Sarbanes-Oxley Act and the California Security Breach
Information Act that specify how organizations must deal with information.
2. Systems That An IT Security Audit covers
a) Network vulnerabilities: Security Audit searches for flaws in any network component that an
attacker may use to gain access to systems or information or inflict harm. Information is more
susceptible when it moves between two sites. Network traffic, including emails, instant messaging,
files, and other communications, is tracked through security audits and frequent network
monitoring.
b) Security controls: The auditor examines the effectiveness of a company's security controls in this
section of the audit. This involves assessing how well a company has executed the rules and
procedures it has put in place to protect its data and systems. An auditor, for example, may look to
verify if the firm still has administrative control over its mobile devices. The auditor examines the
company's controls to ensure that they are working properly and that it is adhering to its own rules
and procedures.
c) Encryption: This section of the audit ensures that a company's data encryption methods are under
control.
d) System software: Software systems are evaluated here to ensure that they are functioning correctly
and giving reliable data. They're also reviewed to see whether there are any restrictions in place to
prevent unauthorized people from accessing private information. Data processing, software
development, and computer systems are among the fields investigated.
e) Architecture management capabilities: Auditors check that IT management has put in place
organizational structures and processes to provide a regulated and efficient information processing
environment.
f) Telecommunications controls: Telecommunications controls are tested on both the client and server
sides, as well as the network that links them, by auditors.
g) Systems development audit: Audits in this area ensure that any systems in development fulfil the
organization's security objectives. This component of the audit is also carried out to check that
systems in development adhere to established guidelines.
h) Information processing: These audits ensure that security mechanisms for data processing are in
place.
3. The Possible Impacts To Organisational Security Resulting From An IT Security Audit
An IT security audit shows the organization's IT assets' underlying vulnerabilities and security threats.
Identifying hazards, on the other hand, has a positive ripple impact on the security of the company as a
whole. Here are some possible impacts of an IT security audit on organizational security resulting:
21
a) Identification of vulnerable areas and components of IT infrastructure and system
Networks, PCs, and servers are examples of IT infrastructure in organizations that may be hacked
or compromised. An IT security audit exposes vulnerable areas that can be readily exploited by
threats such as hackers.
Fraud and other accounting irregularities may be prevented and detected by the frequent study of
an organization’s operations and the deployment of stringent internal control systems. Internal
control systems, which are intended to prevent fraud, are designed and modified with the help of
auditing specialists.
Deterrence is an important part of prevention. A organization's reputation may discourage an
employee or supplier from attempting to cheat it if it is regarded to have an active and rigorous audit
system.
b) Reduction of threats and risks
Computer assaults or system flaws that may be exploited by hostile individuals such as hackers are
examples of threats. The identification of susceptible places in the system by an IT audit necessitates
improved security solutions.
Risk reduction may be achieved by implementing a stronger disaster management strategy, which
tries to reduce or avoid hazards to an IT system.
Following the assessment of the risks, the IT team is given a clear organizational vision on how to
eliminate, mitigate, or accept those risks as part of the working environment through the
implementation of IT audit controls.
Furthermore, without an audit system or internal controls, an organization would be unable to
allocate resources and determine which product lines are lucrative and which are not.
c) Implementation and enforcement of better security policies
Security policies assist to prevent unneeded dangers by enacting recommended laws, such as a
password policy that requires a password to be longer than eight characters and not include a user
name.
d) Outsourcing of security cyber security services
If security concerns necessitate additional expertise, an organization might choose to outsource
security management to a third party.
e) Better strategies of compliance with programs like HIPAA
Compliance seeks to ensure that specified security policies are followed in order to better secure an
organization's assets. Regulatory authorities, which might be state-run, are in charge of ensuring
compliance.
22
f) Enhances Communication in an Organization
An IT audit can help the organization's business and technology management communicate more
effectively. The conclusion of a computer audit necessitates immediate communication between
businesses and their IT departments. The internal or external auditor has the chance to test what is
occurring in an organization and check whether there is a large gap between computer theory and
what is happening while interviewing with the auditor.
The auditor's final step will be to prepare a thorough report for his superiors explaining the problems
with the company's computer system. This not only improves communication across departments,
but also fosters trust, boosts responsibility, and allows departments to track their goals.
As a result, it's critical to recognize that IT auditing is the most important aspect of management's
technological supervision. Technology is used to assist the company's roles, strategy, and
operations. Business and supporting technology alignment is critical, and IT auditing ensures that
alignment.
TASK 3 - DESIGN AND IMPLEMENT A SECURITY POLICY FOR AN ORGANIZATION (P7)
I.
DEFINE A SECURITY POLICY AND DISCUSS IT
1. Define Security Policy:
A security policy is a written statement of how a corporation intends to safeguard its physical and
information technology (IT) assets. Security policies are dynamic documents that are updated and
revised when new technologies, vulnerabilities, and security needs emerge.
Figure 8: Security Policy
23
An acceptable usage policy may be included in a company's security policy. These outline how the
organization intends to educate its staff about the importance of safeguarding the company's assets.
They also contain a description of how security measures will be implemented and enforced and a
method for assessing the policy's efficacy and making required modifications (Duigan, 2013).
2. Discussion on policies:
a) Discussion on HR policy:
HR policies are particular standards that a business follows while managing its people resources.
These are explicit guidelines for hiring, evaluating, training, and rewarding employees. These
are the structure and guiding forces that aid in making consistent judgments for the
organization's and its employees' wellbeing.
HR policies are an important aspect of every business since they serve to provide clear
guidelines for how the firm operates. It's a strategy to safeguard an organization’s business and
avoid future misunderstandings.
The importance of HR policy:
 It guarantees that the organization's employees' requirements are acknowledged and met.
 It guarantees that suitable benefits are offered to workers for their work; it assists in the
resolution of employee problems, complaints, and grievances; and it ensures that proper
training and development opportunities are presented to employees to fulfil the
organization's needs.
 It provides employees with protection from anybody in the corporation.
 They are necessary because they ensure that eligible employees are given paid vacations
and holidays when they are due.
 It is regarded as crucial since it aids in the organization's discipline.
 It guarantees that employees are compensated fairly.
b) Discussion on Incidence response Policy:
Incident Response (IR) Procedure: Provide the necessary procedures for incident
management, reporting, and monitoring, as well as incident response training, testing, and
24
support, to ensure that the is prepared to respond to cyber security incidents, secure State
systems and data, and avoid interruption of government services.
This type of policy usually includes information about:
(i)
The organization's incident response team;
(ii)
Each team member's role;
(iii)
The people in charge of testing the policy;
(iv)
How to put the policy into action;
(v)
The technological means, tools, and resources that will be used to identify and recover
compromised data.
Incident Response Policy Phases:
 Preparation phase
 Identification phase
 Containment phase
 Eradication phase
 Recovery phase
 Post-incident phase
c) Discussion on Acceptable Use Policy
Acceptable Use Policy(AUP): An AUP outlines the restrictions and procedures that employees
who use organizational IT assets must accept in order to have access to the business network
or the internet. For new employees, it is a typical onboarding protocol. Before being assigned
a network ID, they must read and sign an AUP. It is suggested that the IT, security, legal, and
HR departments of a firm consider what is included in this policy (Anon., 2008).
General Use and Ownership:
 This policy applies to any data produced or stored on the Organization's systems.
 All data including non-public personal information must be encrypted before being
electronically transmitted.
25
 Non-public personal information and other sensitive information shall be encrypted
following the Information Sensitivity Procedures in all other circumstances.
 For this policy, all information and data residing on the organization's systems and
networks are considered the organization's property.
 For any reason, at any time, with or without notice, the organization may monitor or
audit any information, including data files, emails, and information stored on
company-issued computers or other electronic devices, for testing and monitoring
compliance with these security procedures.
d) Discussion on Disposal Policy
Disposal policy refers to the disposal of any superfluous IT equipment and devices that have
reached the end of their useful lives, are broken, surplus, underused, or have become obsolete
as a result of an IT refresh.
To guarantee that any personal data is totally wiped, data-bearing devices should be safely
erased or destroyed.
The importance of Disposal Policy:
 Data Security – secure data erasure or data destruction to ensure that your sensitive
data does not get into the wrong hands.
 Environmental – ensuring that your assets do not end up in landfills or dumped in the
countryside.
 Audit Trail – provision of all necessary documentation and reports needed for an
environmental or data security audit.
 Maximise Return on Investment – saving time and money by avoiding unnecessary
purchases and recouping some costs.
 Keeping up with Advances in Technology – with the understanding that your old
devices will be reused or recycled.
26
e) Discussion on Business continuity policy
The goal of a business continuity system is to avoid, detect, and eliminate business interruption
risks and provide conditions for company recovery if one does occur.
One of the most important components of the organization is the business continuity policy,
which allows Softline to avoid and prevent business interruptions, maintain and enhance
Softline's image among customers, business partners, and government officials ("Parties
Concerned"), strengthen confidence in Softline and improve loyalty (Sullivan, 2020).
The business continuity plan's methods put the policy into effect. Both documents stress the
following elements:
 Contingency Planning: When a corporation makes a proactive effort to anticipate and
plan for potential events, it is known as contingency planning. This type of preparation
is typically used for bad occurrences, but it may also be used for favourable ones. The
difference between contingency planning and crisis management is how a corporation
responds to an issue.
 After an event, a company's attempts to save and resume vital processes are referred to
as recovery. After an interruption, a recovery strategy prescribes acceptable service
levels.
 The ability of a corporation to offer crucial products and services during and after a crisis
is referred to as resilience. Staff, other resources, and the brand are all protected by
resilience.
f) Discussion on Security Policy
The importance of Security Policy:
 Security policies are crucial because they safeguard an organization's physical and
digital assets. They include all of the company's assets as well as potential dangers to
those assets.
 Physical security rules are designed to safeguard a company's physical assets, such as
buildings and equipment, such as computers and other information technology. Data
27
security rules safeguard intellectual property from costly incidents like data breaches
and leaks.
Benefits of Security policy:
 Protect valuable assets
 Guard reputations
 Ensure compliance with legal and regulatory requirements
 Dictate the role of employees
Based on the scope and aim of the policy, security policy types may be categorized into three
categories:
 Organizational. These policies serve as a master plan for the complete security program
of the company.
 System-specific. Security measures for an information system or network are covered
by a system-specific policy.
 Issue-specific. These policies are focused on certain parts of the organization's overall
policy (Duigan, 2013).
II.
GIVE AN EXAMPLE FOR EACH OF THE POLICIES
a) HR Policy
Here is an example of a right HR Policy:
Company ABC's management realized that in order to remain competitive and grow market
share, it needed to boost productivity. For this reason, management devised a plan to place greater
focus on each individual's performance. Each department's manager or supervisor focused on
giving adequate training and development to each employee in order to make this transformation.
The supervisors grew more knowledgeable and began providing all pertinent work-related
information. They also provided enough incentives, awards, and recognition to motivate and
encourage staff to attain their goals. HR might set up training sessions for staff in order to educate
28
and inform them about the changes. This can help employees gain confidence and prevent
resistance to change.
b) Incidence response Policy
The person who finds the incident will contact the dispatch office via the grounds. Make a list of
potential sources for persons who could find out about the occurrence. Make a list of all possible
sources and mark them down if they provide contact information and processes. Contact
processes in the IT department may differ from those outside the IT department.
The IT staff member or impacted department staff member who receives the call (or discovers
the situation) will resort to their contact list to notify both management and incident response
professionals. Those on the list will be contacted by the staff person. The IT staff member will
send an email and a phone message to the incident response manager, as well as other relevant
and backup individuals and designated managers.
To identify how the incident occurred, team members will employ forensic techniques such as
checking system logs, looking for gaps in logs, reviewing intrusion detection logs, and
interviewing witnesses and the incident victim. Only authorized individuals should conduct
interviews or examine the evidence, and allowed persons may differ depending on the scenario
and the company.
Members of the team will provide recommendations to prevent the incident from reoccurring or
infecting other systems. Assess the damage to the organization and estimate the cost of the harm
as well as the cost of the containment measures.
Review and update policy, as well as plan and implement preventative measures to ensure that
the intrusion does not occur again.
c) Acceptable Use Policy
Example of Acceptable Use Policy In Online Banking Services:
Transferwise, currently known as Wise, is a financial technology business that enables clients to
have numerous bank accounts in different currencies, apply for a multi-currency credit card, and
send money throughout the world. Unlike typical banks, it does not have any physical premises
and hence only provides services through an internet platform.
29
Wise has a clear yet easy-to-understand Acceptable Use Policy that spells out the rules under
which users can access its services, which is unsurprising given the hazards inherent with the
handling of financial data (to be read in conjunction with its User Agreement which refers to its
other policies) (Anon., 2019).
In addition to limiting how its services may be used, Wise claims that it does not support a variety
of enterprises or transactions associated with the categories and industries because they are too
dangerous. It gives itself the power to immediately remove one’s access to its services, suspend
or cancel payment orders, remove user-uploaded material, issue warnings, take legal action
against perpetrators and report and disclose relevant information to law enforcement authorities.
d) Disposal Policy
For example, In order to preserve the network's confidentiality and data integrity of computer
systems and organizational assets, it is necessary for all employees and individuals with access
to organizational computer systems to follow the IT disposal control policy. The asset control
policy will provide not only for the tracking of organizational assets in terms of their location and
who is using them but also for the protection of any data held on those assets. The disposal of IT
assets is likewise covered by this asset policy.
All paper papers holding confidential information that are no longer needed in this organization
must be destroyed. Physical destruction of retired and/or abandoned archival storage media is
required. To delete state secrets or extremely sensitive data from a disk, secure deletion must be
used.
e) Business Continuity Policy
Here is an example of a well-executed business continuity Policy:
A fire broke out when lightning damaged an office building in Mount Pleasant, South Carolina,
in 2013. Cantey Technology, an IT firm that runs servers for more than 200 clients, called the
premises home.
Cantey's network infrastructure was destroyed by the fire, which melted cables and burned
computer systems. The office was useless and the equipment was ruined beyond repair. The
30
situation seems dismal for a corporation whose key function is hosting servers for other
companies. The whole infrastructure of Cantey was destroyed (Rock, 2022).
Cantey's clientele, on the other hand, was never aware of the distinction:
 Cantey had previously migrated its client servers to a faraway data centre as part of its
business continuity policy, where continuous backups were maintained.
 Despite the fact that Cantey's personnel was obliged to relocate to a temporary location,
its clients were never inconvenienced.
It was a situation where things could have gone very differently. The corporation had only kept
all of its client servers on-site for the last five years. However, creator Willis Cantey made the
correct decision in determining that this system posed too many hazards. One large on-site
interruption would be enough to wipe out his whole business, as well as his clients' enterprises,
potentially exposing him to legal consequences.
f) Security Policy
To access internal network resources over the public network and to send private data across the
public network, only secure connections such as VPN connections, SSL / HTTPS connections,
and encrypted mail messages should be used.
All confidential data on computers outside the business perimeter (laptops, home employees'
PCs) must be encrypted, as must all private data on hard drives. Encryption keys should be
duplicated and kept in a safe place.
The lowest key length allowed for symmetric encryption is 256 bits.
III.
GIVE THE MOST AND SHOULD THAT MUST EXIST WHILE CREATING A POLICY
a) The most must exist while creating a policy
 Possess the ability to put it into practice and enforce it
o Security rules are meant to be directive, leading and controlling employee behaviour.
Everyone, from the CEO to the newest employees, must adhere to the policies.
o Users must be exposed to security policies several times before the message is
understood and the policy's "why" is understood. Noncompliance with the policy,
according to various security standards, can result in administrative processes up to
31
and including termination of employment. If the policy is not applied, employee
behaviour will not be directed toward productive and secure computing habits.
 Be concise and easy to understand.
b) The most should exist while creating a policy
 Justify the need for the policy.
A security policy's main purpose is to keep the company and its employees secure.
The demands of the business must be known by security professionals. Think about how
this policy supports the mission of my company. Is it taking care of the concerns of top
management? Security policies should not be established in isolation. If we do, there's a
good chance it won't meet our company's needs. Writing security rules is an iterative process
that requires top-level management approval before being made public. To maintain and
monitor policy enforcement, more resources will undoubtedly be necessary.
 Describe the coverage provided by the insurance.
An exception to a security policy is commonly necessary for good reasons. The policy
should clarify how the exception to the policy is approved in certain situations. Exceptions
to security policies should be known by management.
 Specify how violations will be handled.
Security policies should not include everything but the kitchen sink. Procedures, baselines,
and recommendations can help you fill in the gaps in your policies' "how" and "when." Each
policy should address a specific problem (for example, permitted usage, access control, and
so on). It will make things simpler to manage and maintain.
IV.
EXPLAIN AND WRITE DOWN ELEMENTS OF A SECURITY POLICY
a) Purpose
First, state the policy's goal, which might be to:
 Create a comprehensive strategy for data security.
32
 Detect and prevent data security breaches, including network, data, application, and
computer system misuse.
 Maintain the organization's reputation while adhering to ethical and legal obligations.
 Respect customer rights, including how to respond to noncompliance queries and complaints
(Cassetto, 2022).
b) Information security objectives
Assist the management team in defining well-defined strategy and security objectives. The three
major goals of information security are:
 Confidentiality – Data and information assets can only be accessed by those who have
been given permission.
 Integrity – Data must be complete, accurate, and undamaged, and IT systems must remain
operating.
 Users should be able to access information or systems whenever they need them.
c) Authority and access control policy
A senior manager may have the ability to decide what data may be shared and with whom in a
hierarchical structure. A senior manager's security policy may differ from that of a junior
employee. Each organizational role's level of responsibility for data and IT systems should be
specified in the policy.
Users can only access business networks and servers through unique logins that need
authentication, such as passwords, biometrics, ID cards, or tokens, according to network security
policy.
d) Data classification
Data should be classified into categories such as "top secret," "secret," "confidential," and
"public," according to the guideline. When it comes to data classification, the goal is to:
To make sure that those with lesser clearance levels can't access important information
To safeguard highly sensitive data while avoiding unnecessary security measures for less
sensitive data
e) Data support and operations
33
Organizational standards, best practices, industry compliance standards, and relevant legislation
must all be followed when it comes to data protection regulations — systems that hold personal
data or other sensitive data. Encryption, a firewall, and anti-malware protection are all required
by most security requirements.
Data backup – Use industry best practices to encrypt data backups. Backup media should be kept
in a secure location, or backups should be moved to a secure cloud storage location.
Data transmission — Only use secure methods to send data. Any information copied to portable
devices or transferred over a public network should be encrypted.
f) Security awareness and behaviour
Employees should be aware of your IT security procedures. Conduct training sessions for staff
to learn about the security policies and mechanisms, such as data protection, access control, and
sensitive data categorization.
 Social engineering – Emphasize the hazards of social engineering assaults in particular
(such as phishing emails). Employees should be held accountable for detecting,
preventing, and reporting such assaults.
 Policy of keeping a clean workstation — A cable lock is a good way to keep computers
safe. Documents that are no longer needed should be shredded. Maintain a tidy printer
area to prevent papers from falling into the wrong hands (Cassetto, 2022).
 Acceptable Internet usage policy—define how Internet access should be limited.
g) Encryption policy
Encryption is the process of encrypting data in order to make it inaccessible to or invisible to
unauthorized parties. It aids in the protection of data at rest and in transit between places, ensuring
that sensitive, confidential, and proprietary information remains private. It can also make clientserver communication more secure. An encryption policy aids businesses in defining:
 The devices and media that the company needs to encrypt
 When encryption is required
 The minimal requirements for the encryption program you've chosen.
h) Data backup policy
34
A data backup policy establishes the rules and methods for creating data backup copies. It's an
important part of your entire data security, business continuity, and disaster recovery plan. The
following are some of the most important features of a data backup policy:
 Identifies all data that the company needs to back up.
 Determines the backup frequency, such as when to make a complete backup and when to
do incremental backups.
 Defines the place where backup data is stored.
 Lists all positions responsible for backup procedures, such as backup administrators and
IT team members.
i) Responsibilities, rights, and duties of personnel
Appoint personnel to conduct user access evaluations, education, change management, incident
management, security policy execution, and periodic updates. As part of the security policy,
responsibilities should be clearly specified.
j) References to regulations and compliance standards
Regulations and compliance requirements that affect the company, such as GDPR, CCPA, PCI
DSS, SOX, and HIPAA, should be referenced in the information security policy.
V.
GIVE THE STEPS TO DESIGN A SECURITY POLICY
1) Identify your risks
The usage of monitoring or reporting tools is a fantastic approach to discovering your risks. Many
firewall and Internet security manufacturers offer free trial periods for their solutions. If such items
give reporting information, using these assessment periods to analyze your risks can be beneficial.
2) Learn from others
Because there are so many different sorts of security measures, it's crucial to look at what other
companies are doing.
3)
Make sure the policy conforms to legal requirements
35
It may be obligated to adhere to some minimum requirements to safeguard the privacy and integrity
of your data, depending on data holdings, jurisdiction, and location, especially if your organization
has personal information. One strategy to mitigate any liability you could incur in the case of a
security breach is to have a robust security policy codified and in place (Duigan, 2013).
4) Consider Level of security = level of risk
In such instances, the most crucial thing is to have a documented code of behaviour. Excessive
security can make it difficult to run a business smoothly, so be careful not to overprotect oneself.
5) Include staff in policy development
No one wants a policy that is imposed from on high. Staff should be included in the process of
determining appropriate use. Keep employees informed as the regulations and tools are established.
People will be considerably more willing to cooperate if they appreciate the importance of a
responsible security policy.
6) Train employees
As part of the AUP implementation process, staff training is sometimes disregarded or undervalued.
However, it is perhaps one of the most helpful stages in practice. It not only assists you in informing
and explaining policies to employees, but it also allows you to explore the policy's practical, realworld repercussions. In a training forum, end-users frequently ask questions or provide examples,
which may be quite gratifying. These questions can assist us in defining the policy in greater depth
and modifying it to make it more useful.
7) Get it in writing
Make sure that everyone on the team has read, signed, and comprehended the policy. When new
personnel are brought on board, they should be asked to sign the policy and reread and confirm their
comprehension of it at least once a year. Use automated solutions to enable huge businesses
electronically send and track signatures on documents. Some programs even provide quizzes to
assess the user's understanding of the policy.
36
8) Set clear penalties and enforce them
Network security is no laughing matter. Security policy is a requirement of employment, not a
collection of optional suggestions. Establish a clear set of processes that explain the consequences
of violating the security policy. Then put them in place. A security policy that is followed
haphazardly is almost as bad as having no policy at all.
9) Update staff
Because the network is continually developing, a security policy is a dynamic document. People pass
by. Databases are produced and deleted on a regular basis. New security dangers emerge on a regular
basis. It's challenging enough to maintain the security policy up to date, but keeping employees
informed about any changes that can influence their day-to-day operations is much more difficult.
The key to success is open communication.
10) Install the necessary tools
It's one thing to have a policy; it's another to enforce it. Content security technologies for the internet
and e-mail with customisable rule sets can ensure that policy, no matter how complicated, is
followed. One of the most cost-effective expenditures people will ever make is purchasing tools to
implement your security policies.
TASK 4 - LIST THE MAIN COMPONENTS OF AN ORGANIZATIONAL DISASTER RECOVERY PLAN,
JUSTIFYING THE REASONS FOR INCLUSION (P8)
I.
DISCUSS WITH AN EXPLANATION ABOUT BUSINESS CONTINUITY
1. Definition:
The capacity of a company to maintain critical functions during and after a crisis is referred to as
business continuity. Business continuity planning sets risk management methods and procedures with
37
the goal of preventing mission-critical service outages and resuming full operations as fast and easily
as feasible (Sullivan, 2020).
Figure 9: business continuity
The most fundamental requirement for business continuity is to maintain critical functions operational
during a crisis and to recover with little downtime. Natural catastrophes, fires, disease outbreaks,
cyberattacks, and other external dangers are all factors to consider in a business continuity strategy.
2. The Importance of Business Continuity
Business continuity is crucial at a time when downtime is unacceptable. Downtime may occur in a
variety of forms. Cyberattacks and severe weather, for example, appear to be becoming worse. It's
critical to have a business continuity strategy in place that takes into account any potential operational
disruptions.
During a crisis, the strategy should allow the organization to continue operating at a minimum level.
Business continuity aids an organization's survivability by allowing it to respond swiftly to a disruption.
Business continuity saves money, time, and the reputation of the organization. A long outage poses a
danger of financial, personal, and reputational harm.
Business continuity necessitates an organization's self-evaluation, analysis of possible areas of
vulnerability, and collection of essential information - such as contact lists and system technical
diagrams - that might be beneficial outside of catastrophe scenarios. An organization's communication,
technology, and resilience may all benefit from the business continuity planning process.
38
For legal or compliance reasons, business continuity may be required. It's critical to understand which
rules apply to a certain company, especially in an era of rising regulation.
II.
LIST THE COMPONENTS OF THE RECOVERY PLAN
1) Take Inventory of IT Assets
Make a list of all your assets to see which ones will need to be protected. The following are examples
of assets:

Equipment for a network

Cloud services

hardware and software

Critical Data
Though time-consuming, compiling a list of assets can provide a thorough grasp of the company's
processes. Regularly update the list as assets are added, withdrawn, or updated, and utilize it to purge
unneeded information.
2) Sort Assets According to Criticality and Context
It’s necessary to look at assets in context now that taken inventory of them. What is the company's
strategy for utilizing these resources? Which assets, if compromised or lost, would have the most
significant impact in the event of a disaster? Examine all of the mapped assets and rank them from high
to low in terms of effect.
Knowing the value of each asset and how they interact can help to decide which assets should be
prioritized in the disaster recovery strategy.
3) Assess Potential Risks
Threats aren't all created equal. What are the most significant dangers to the company as a whole? What
are the most likely targets for these threats? Critical systems personnel are well-versed in the most likely
reasons for service disruption, therefore gaining their opinion early on is crucial. It won't be able to
predict all risks, but we can make an effective strategy by considering the likelihood and magnitude of
each.
39
4) Define RTO and RPO
Recovery goals should be divided into two categories: recovery time objectives (RTO) and recovery
point objectives (RPO) (RPO). RTO stands for the maximum length of time the assets may be down
before being recovered, and RPO stands for the maximum quantity of data you're prepared to lose.
These goals should be identified early in the disaster recovery planning process so that the right
arrangement may be chosen.
Discuss the implications of the anticipated interruption with the company's top management and
operational workers for as little as one minute to as long as one day. This data can help you determine
your RTO and RPO, as well as how frequently your data should be backed up.
5) Select A Disaster Recovery Setup
At this point, having a thorough grasp of your assets, risks, and RTO and RPO. Put together a disaster
recovery plan using this information. At this point, we could ask ourselves the following questions:

Will you have a ready-to-use disaster recovery facility?

What city will it be in? Is it going to be cloud-based? Do you want to host your own website?

Which backups are you going to keep? What will their location be?
It's critical to have a remote data storage solution in place to secure your assets from cyber-attacks and
natural catastrophes that might cause physical harm. Select the cloud services, software, hardware, and
partners.
6) Propose A Budget
Regardless of the resources available, every organization should have a disaster recovery strategy.
Senior management should be reminded of the need for disaster recovery, but there should be numerous
solutions available at various price ranges.
Higher budgets will include a disaster recovery plan with stronger RTOs and RPOs, as well as more
generous support for more essential services and maybe as part of a larger business continuity plan.
Each company's disaster recovery needs will differ, and with the correct information, management can
balance risk and investment in disaster recovery technology to achieve the right balance.
40
7) Test and Review
The disaster recovery plan will need to be tested and reviewed in the final step to guarantee it is ready.
All employees must be aware of their responsibilities in the event of a crisis. Conduct a catastrophe
exercise to test the strategy and assess how employees react to the threat. If things don't go as smoothly
as you'd want, make changes to the plan.
A catastrophe recovery strategy can never be fully implemented. It should be checked on a regular
basis, ideally every six months or so, to verify that it is still working. Assets, organizational structure,
and IT configuration will all change over time, and the disaster recovery plan will need to be updated
to reflect these changes.
III.
ALL THE STEPS REQUIRED IN THE DISASTER RECOVERY PROCESS
1) Create an inventory
Every organization should know which IT resources—systems, hardware, and software—are needed to
conduct its operations. In addition to a simple inventory, adding additional scenarios to your IT disaster
recovery strategy might be beneficial. Consider which systems might be impacted if your business was
hit by a flood, hurricane, fire, or power loss.
2) Establish a recovery timeline
After recording the IT inventory, this may decide on reasonable recovery targets and timelines for
certain systems. Healthcare sectors may have recovery times of only a few minutes, but other industries
may find longer recovery times reasonable.
The recovery time objective (RTO) and recovery point objective (RPO) ideas will come in handy here:
 The greatest amount of time that should pass before the IT systems recover is known as the
recovery time objective (RTO).
41
 RPO (Recovery Point Objective): The maximum length of time allowed for the IT systems to
recover since the most recent data backup (Mulligan, 2019).
3) Create a Communication Plan
Obtain buy-in from key stakeholders before calamity strikes. Everyone should be aware of which IT
activities may be impacted, what would happen next, and who would be in charge of correcting the
problems.
Ask employees how various systems or networks might affect their work if they were unavailable for a
period of time. In the case of a power or Internet failure, you should also devise a plan for
communicating with your employees.
4) Develop a Data Backup and Recovery Plan
Whether a small fault happens (a server fails, an employee deletes critical information), or a grave crisis
threatens to interrupt the company continuity entirely, planning for a disaster of any sort is necessary
for every firm that wishes to stay operating.
Despite the fact that the aim is to avoid a breach at all costs, cyber assaults are unavoidable.
It's vital to have a plan in place to address and mitigate the consequences.
A solid response strategy includes a team of IT professionals devoted to resolving the issue, monitoring
for additional infiltration, and controlling the current data breach.
5) Consider physical damages
Power outages and severed wires may put your firm on the verge of collapse. Make sure to have a
backup generator on hand to keep the organization afloat in the event of a crisis.
6) Consider the human factor
Humans, whether intentionally or unintentionally, maybe a source of tragedy. Lockdown has
administrative permissions on the systems to reduce the danger of a disaster.
Only the systems and data that employees and third-party providers require should be accessible.
7) Consider insurance
42
If there are concerns about the expenses of recovery, purchasing catastrophe insurance as part of a
disaster recovery plan may be a viable choice. This entails not just replacing your IT equipment, but
also looking at the larger consequences and losses that may occur as a result of a disaster. Speak with
an insurance specialist if this notion appeals.
8) Test disaster recovery plan
At the absolute least, the IT disaster recovery strategy should be evaluated twice a year. One of our
clients realized that all of their drives failed while trying to recover them after not testing their strategy
for several years. The data would have been gone forever if this had happened during a true disaster.
Any holes discovered during these testing should be thoroughly recorded so that they may be addressed.
Consult a reputable MSP to learn about your remediation choices.
9) Combine DR and BC
IT is critical, but it is just one part of the puzzle when a company recovers from a tragedy. During and
after a disaster, business continuity (BC) refers to an organization-wide plan to sustain key business
activities as much as feasible. Create and test a comprehensive BC strategy so you can be assured in
your ability to deal with any unforeseen occurrence.
10) Find the right partner
Disaster recovery isn't something that can be set and forgotten; it requires ongoing maintenance. It’s
essential to update the disaster recovery plan with new methods, technologies, and equipment, as well
as make any necessary revisions if the business requirements alter. Working with an MSP may be quite
beneficial in terms of getting a second pair of eyes on the disaster recovery plan or professional advice
on how to construct one (Mulligan, 2019).
IV.
EXPLAIN SOME OF THE POLICIES AND PROCEDURES THAT ARE REQUIRED FOR
BUSINESS CONTINUITY
1. Policies That Are Required For Business Continuity
 Risk Management Policy: When designing a business continuity policy, the most important
factor to consider is the types of risks that an organization may encounter. Is the company
located in a location where storms or other big weather events are likely to occur? What
geopolitical circumstances may lead to a failure? Have you ever had any troubles with
43
ransomware or other viruses that need extra attention? When developing a business continuity
policy, companies must consider all of these considerations by sticking to the risk management
policy.
 Incidence Response Policy: The earlier the organization can notice and respond to a data breach
or even a security event, the less likely it is to have a major impact on your data, customer
confidence, reputation, and income. If the company doesn't have an incident response plan in
place, there are more potential threats that harm the business continuity.
 Emergency Management Policy: The course of action taken by a firm to mitigate the impact of
an incident or crisis is known as emergency management policy. The basic goal of emergency
planning is to keep people safe, protect the community, and maintain businesses continuity.
Sticking to Emergency Management policy generally includes procedures to follow in the event
of a disaster, a defined set of roles and duties, and instructions for local emergency response and
recovery organizations. This is an important aspect of keeping employees safe.
 Business continuity policy: If this gets back to regular operations while the competitors are still
trying to figure it out, it will have a significant edge over them. Getting the network back up and
running quickly, restoring access to the business data and documents, and reconnecting the staff
so they can interact with one another and serve the customers helps the company to stand out as
a leader and one that can be trusted.
2. Procedures That Are Required For Business Continuity
 Business Impact Analysis: The organization will identify time-sensitive functions and
resources.
 Recovery: The organization must establish and implement actions to restore critical business
functions in this area.
 Organization: A management department must be established. This group will devise a strategy
to deal with the interruption.
 Training: Training and testing are required for the continuity crew. Members of the team should
also participate in activities that go beyond the plan and strategy.
44
V.
DISCUSS THE ROLES OF STAKEHOLDERS IN THE ORGANISATION TO IMPLEMENT
SECURITY AUDIT RECOMMENDATIONS (M7)
Stakeholders have a role and obligation in making good decisions, and they may also help with project
scheduling and budgeting. Many project stakeholders are accountable for the business, which includes
developer education, project development, scheduling parameter generation, and milestone date setting.
The organization's information security policy would aid in defining the personnel as well as their ongoing
conduct in terms of security and the organization. Stakeholders would also be required to provide input and
expertise in order to assess and improve the ISP. The goal of the paper would be to identify stakeholders
who might then be used in the ISP development process. Stakeholders would be involved in the creation of
the ISP and would vary in terms of organizational size. The study would identify the development process
and employ contextual interviews to validate the roles from a practical standpoint.
They also develop assumptions and limits, and work packages, engage in the risk management process,
assist with quality and communication strategies, establish ground rules, and give estimates.
Stakeholders
Director (Internal)
Role
A director is a person in charge of making decisions for a company. The
director will make sure that a security audit plan can be carried out
successfully by the departments that are directly involved.
Server Manager (Internal)
Sever Administrator also contacted them. They are in charge of
providing assistance, installing, maintaining, and keeping track of the
network. They keep software and system equipment up to date, as well
as oversee system availability and performance.
System Developer (Internal)
They are the individuals or departments in charge of network security,
data security, and policy enforcement. For instance, network engineers,
database developers, and so on.
Risk Manager (Internal)
A risk manager is a person or department responsible for ensuring that
all departments are working together to analyze, manage, and implement
a plan to combat cyber threat agents. Risk managers also comprehend
45
danger agents and have a strategy in place for what will happen to the
organization's security...
The Business Partner
When a group or organization collaborates with a business, they will
(External)
work together to ensure that the security policy is followed and that the
security strategy is implemented.
Table 1: ROLES OF STAKEHOLDERS IN THE ORGANISATION TO IMPLEMENT SECURITY AUDIT RECOMMENDATIONS
CONCLUSION
This paper covers risk assessment and data protection, as well as a variety of policies and procedures that can help
individuals and organizations get better to protect their data when online. List policies to help to understand what is
required to design and implement a security policy and business continuity. There are many risks and threats to identify,
but there is also more knowledge to help me defend myself from cyber threats, allowing me to be more cautious when
identifying them.
References
Anon., 2016. SECURITY RISK MANAGEMENT & ISO 31000. [Online]
Available at: https://www.athenarisk.com/security-risk-management-iso-31000/
Anon., 2019. Sample Acceptable Use Policy Template and Examples. [Online]
Available at: https://www.websitepolicies.com/blog/sample-acceptable-use-policy-template
Besemer, L., 2011. Data protection , s.l.: s.n.
Cassetto, O., 2022. The 12 Elements of an Information Security Policy. [Online]
Available at: https://www.exabeam.com/information-security/information-security-policy/
Cole, B., 2021. risk assessment. [Online]
Available at: https://searchcompliance.techtarget.com/definition/risk-assessment
46
Crocetti, P., 2021. What is data protection and why is it important?. [Online]
Available at: https://www.techtarget.com/searchdatabackup/definition/data-protection
Duigan, A., 2013. security policy. [Online]
Available at: https://www.computerworld.com/article/2572970/10-steps-to-a-successful-security-policy.html
Gillis, A. S., 2021. Security Audit. [Online]
Available at: https://www.techtarget.com/searchcio/definition/securityaudit#:~:text=Security%20audits%20will%20help%20protect,and%20can%20catch%20new%20vulnerabilities.
Haldenby, 2016. Product Tracking and Control System. Toronto: s.n.
Lashin, M., 2016. Application of ISO 31000 principles. [Online]
Available at: https://www.linkedin.com/pulse/application-iso-31000-principles-dr-mohamed-lashin
Lashin, M., n.d. Risk Management Principles and Guidelines - ISO 31000, s.l.: s.n.
Mulligan, B., 2019. 10-Step Disaster Recovery Plan for Your IT Department. [Online]
Available at: https://www.kelsercorp.com/blog/10-step-disaster-recovery-plan-it-department
Rock, T., 2022. 7 Real-Life Business Continuity Examples You’ll Want to Read. [Online]
Available at: https://invenioit.com/continuity/4-real-life-business-continuity-examples/
Sullivan, E., 2020. Business Continuity. [Online]
Available at: https://www.techtarget.com/searchdisasterrecovery/definition/business-continuity
47
Download