Keywor ds to look at Firewall , router Activity 1 Threat Threat number. 1 Threat title. Misconfig ure firewall. Probabilit y. Likely Potential size of loss / impact level. Moderate Risk severity. Medium Explanati on of the threat in context. If the firewall is not configured and maintaine d correctly the firewall will allow Activity 2 Cyber security plan 1. Security requirement – To prevent attacks to Threat(s) addressed by the protection measure – 1 – misconfigure firewall the network. Appropriateness of Details of action(s) to be taken - Install / activate Firewall if it is not Protection Measure already in the router. Configure firewall to allow access via port(s) required Steps must be taken to by the system. protect the network from being used it Reasons for the actions - Attacks on commonly used ports are frequent harmful ways, a and automated. A firewall will block / ignore pings unless the relevant port firewall is the most has been opened. Open ports invite a further, more targeted attack, efficient tool that can probably also automated. be used on a network to protect that Overview of constraints – technical and financial – network from undesirable actions. Technical - Minimal, setup and configuration tasks are simple. User Alternative Protection manuals are free available and IT staff can configure them. Measures that Could Financial - Minimal, a commercial quality router will almost always include be Used a firewall. Employees could be educated and informed Overview of legal responsibilities - The data needs to be encrypted and of the risks of browsing protected under the Data Protection Act and General Data Protection the internet, sharing Regulations. information, and correctly securing data. Overview of usability of the system – Firewalls may block staff from Policies could be put in accessing certain websites they may require. place to restrict Protection measure 1 1) 2) 3) 4) 5) 6) Activity 3 Justification potentially dangerous packets to enter the network and could lead to an overload in the network and it crashing. This will lead to financial, reputation al and legal loss for the company. 7) Outline cost-benefit – Initially they will be a cost of buying items (hardware or software firewall) and hiring a company to configure firewall, if there are no expertise in BCTAA. However, if an attack occurs to the system that would mean a security company would need to come out and render the system, therefore costing a company a lot to reconfigure the security system. So, the initial cost will outweigh the cost that may happen due to intrusion. 8) Test plan Test plan Test Test description No Expected outcome Possible further action following test 1 Use a port scanner on Shows open ports the firewall. Check use of all open ports, close any that are not required. 2 Attempt to access Other services should Recheck / reconfigure services other than fail to connect. software and ports as browsing and email on required the wifi system. certain behaviour and actions online. Employees are still capable of making mistakes however, and without the restriction from a firewall, this is very likely. Rationale for Choice of Protection Measure A firewall is the best way of controlling the way that a network is used, since it is able to meet the requirements of the business while still keeping it safe from any outside threats. Connect using mobile devices Threat number. 2 Threat title. Network access by mobile devices Probability . Likely Potential size of loss / impact level. Major Risk severity. High Explanatio n of the threat in context. Mobile devices are granted access to the Protection measures 2 1) Threat(s) addressed by the protection measure – 2 – Network access by mobile device (malware) 2) Details of action(s) to be taken - Anti-Virus software is to be installed on all systems to ensure that any form of malware uploaded to the network is unable to infect either the servers or the workstations, keeping staff, visitors, freelance trainers and assessors from attack. 3) Reasons for the actions - This preventative measure will actively protect the network from all known forms of malware, as well as identifying files or programs that may act in malicious ways and reduce the threat of theft or destruction. 4) Overview of constraints – technical and financial Technical – Low as existing company IT staff can be used for installing the AVS software. Also, software manuals can be used in running malware tests. Financial – Low – Medium. Freely AVS can be used but in some cases, effective AVS (anti-virus software) can be expensive and so care must be taken to choose a program that will keep the network free from attack. 2. Security requirement – To keep the network secure from malware Appropriateness of Protection Measure The installation of software that aims to locate and remove harmful software, is a must for BCTAA. Antivirus software and other software that protect devices from harm, are very important when files are being shared, email is being used, and downloads happen within a business. network and may either be used by visitors to attack / explore the system or may carry malware which attempts to infect the system. A successfu l attack could allow an attacker full control of the system. 5) Overview of legal responsibilities – BCTAA must ensure that they have paid for the AVS and have the correct licences that prove they are allowed to use it in a commercial capacity. 6) Overview of usability of the system - The usability of the system should not be affected by this addition, though it may be that some tasks are flagged as malicious where they were not before and so steps must be taken to allow them through the software. Implementing anti-virus scanners on devices running real-time protection may slow down older devices. 6) Outline cost-benefit - The benefits of this protective measure definitely outweigh the costs, as it will prevent the infection of systems on the BCTAA network and prevent the loss of training and assessment data. 8) Test plan Test plan Test Test description No Expected outcome 3 AVS should flag it as malicious and prevent the user from accessing it. Attempt to run a malicious program or file. Possible further action following test Check critical security features are tun on in AVS and update the AVS or call an expertise. Alternative Protection Measures that Could be Used EPE can enable Microsoft's Windows Defender machines. It has most features as third-party internet security suites. Rationale for Choice of Protection Measure Microsoft's Windows Defender is not good enough regarding the enterprise internet security. In terms of malware detection, it often ranks below the detection rates offered by top antivirus competitors. 4 Attempt to run AVS should prevent malware that the AVS the malware from knows. executing and quarantine it. If AVS preferred to delete malware rather than quarantine, the setting can be changed to be quarantine. 5 Attempt to run a AVS should not If AVS flags the program, it program necessary for prevent the program should be allowed to run work. from running. through the setting. Visitors or staff need to access secure area Threat number. 3 Threat title. Keyloggin g of Staff PC’s Probabilit y. Unlikely Potential size of loss / impact level. Major Risk severity. High Explanati on of the threat in context. Hackers may use a program which allows them to key tag every key that a member of staff enters into their Protection measures 3 1) Threat(s) addressed by the protection measure – 3 – Keylogging of Staff PC’s and 10- Attacks via internet connection. 2) Details of action(s) to be taken – Install separate Wireless Access Points (WAP) for staff and guests and assign Service Set Identifiers (SSID). Configure both staff and guests WAP with Wi-Fi Protected Access 2 (WPA2) and strong password. MAC whitelist - Create a list of allowed wireless clients for staff WAP based on the MAC address. 3) Reasons for the actions – If staff and guests use the same WAP, guests have the chance of logging in to the staff network and therefore security must be enforced through other ways that can be access rights. A separate, visitor, WAP can be configured so that access to the WAP only allows access to a restricted area of the BCTAA network, such as an internet connection. The use of complex passwords on Wireless Access Points, makes it harder to gain access to a network. Use of a MAC access whitelist would only allow pre-approved devices to connect. Misconfigured SSID could result in users attempting to connect to the wrong network, tying up resources and possibly creating a security alert. Misconfigured WPA2 and/or key could restrict functionality of the network and might provide a point of weakness for an 3. Security requirement – To protect internet connection Appropriateness of Protection Measure Encrypting wireless communication using WPA2 in both guests and staff WAP are very appropriate for BCTAA. In order to prevent attackers from being able to intercept and then read sensitive information passed via a wireless transmission, the data being sent must be encrypted. Failure to ensure encryption would resort in untrustworthy wireless communication. MAC address filtering allows you to block traffic coming from PC’s such as username s and password s. In this case it is dangerou s as it could be used to access and modify confidenti al company data. Network should protecte d from internet. attacker to exploit. 4) 5) 6) Threat number. 10 Threat title. Attacks via internet connectio n. 7) 8) certain known machines or devices. Overview of constraints – technical and financial – Alternative Protection Measures that Could Technical - Separate WAP. Minimal, setup and configuration tasks are be Used simple and ‘walk through’ are freely available. Data MAC whitelist. Medium. The list is simple to set up but would need to transmission within the be propagated to all staff WAPs. There will be a physical limit to the network would be to size of the list that a WAP will allow, this may not be big enough for all use wired connections staff devices. Keeping the list accurate and up-to-date might prove for as much difficult if there are frequent changes to the device list. communication as possible. This would be Financial - Minimal, WAPs are fairly cheap and a commercial quality WAP will impossible to achieve almost always include MAC list capabilities. between the network and the internet/client, Overview of legal responsibilities – The data needs to be encrypted but BCTAA could cut and protected under the Data Protection Act and & General Data down on any of the Protection Regulations. wireless devices that are being used and Overview of usability of the system – Minimal, medium if MAC lists replace them with are included, although enforcement of strong passwords may cause wired connections. For some logon errors / locked accounts. example, the staff mobile devices would Outline cost-benefit – The possibility of a major system intrusion easily not be allowed to outweighs the minimal costs involved. The separate WAP and use of connect to the WPA2 measures must be implemented. The use of MAC lists is network. desirable but should be weighed against the number of devices that Rationale for Choice of need access and the frequency with which they are changed Protection Measure The protection Test plan – measure is Probabilit y. Very likely Potential size of loss / impact level. Major Risk severity. Extreme Explanati on of the threat in context. Automate d scanning software looks for vulnerable connectio ns and pings can be expected several times a day. An unsecured connectio n (ports) could allow an attacker Test Test description No 6 Expected outcome Attempt logon to staff With correct login WAP credentials staff would be able to login to the system. Once logged in, based on access rights, staff should be able to view their own user area. 7 vital since wireless communication Possible further is essential action following test in BCTAA network. Set up the wired Repeat the test connection and to with each staff maintain it could WAP to ensure be expensive that WPA2 and compared to wireless. SSID has been configured correctly on each. Attempt logon to guest With correct login Repeat the test WAP credentials guests would be with some guests able to login to the system. WAP to ensure that WPA2 and Once logged in, the profile SSID has been should not contain trade configured secrets of other guests and correctly. should also not have access to other areas of the network such as staff. 8 If MAC list is used, Only listed devices will attempt staff logon to logon. staff WAP, with listed and unlisted devices. Repeat the test with each staff WAP to ensure the list has been propagated correctly. full control of the system. VPN or remote access Threat number. 4 Protection measures 4 1) Threat(s) addressed by the protection measure – 4 – Attacks via remote access. 4. Security requirement – To protect attacks via remote access Threat title. Attacks via remote access Probabilit y. Very Likely Potential size of loss / impact level. Major Risk severity. Extreme Explanatio n of the threat in context. Remote access software often uses specified and known ports in the firewall. Automate d scanning software 2) Details of action(s) to be taken - Turn on / configure NAT (Network address translation) for required remote access software. 3) Reasons for the actions - If the NAT is not configured correctly or turned on, it would prevent staff, freelance trainers and sessors from being able to access the network away from the premises. This would mean they are unable to do their job. If the NAT was not configured properly, this would create a vulnerability in the network, which can be exploited and infiltrated by attackers who can access the network. 4) Overview of constraints – technical and financial Technical - Minimal, set up and configuration is easy due to instruction manuals and tutorials available. Financial - Minimal, NAT software is built into most modern routers. If it is not available in the current router, purchasing a new router would come at a cost for BCTAA. The best VPN’s come at a cost. 5) Overview of legal responsibilities - Must ensure data is protected even remotely, otherwise it will be a breach of Data Protection Act & General Data Protection Regulations. 6) Overview of usability of the system - Minimal, Once installed, staff who access the network from outside are likely to do so via remote access software / VPN software which handles the connection process for them. 7) Outline cost-benefit - A small, one-off cost to set up the NAT system is easily balanced by the practical advantages of having a working remote access method away from BCTAA premises. 8) Test plan Appropriateness of Protection Measure NAT will be set up on the router, to allow remote access to the server. This is because BCTAA staff, freelance trainers and sessors will need access to the server away from the office premises. This would allow them the opportunity to access the BCTAA network and server remotely through a VPN, as requested in the scenario plans. Alternative Protection Measures that Could be Used Disable NAT over VPN. Rationale for Choice of Protection Measure NAT allows you to use private IP addresses looks for these ports and pings can be expected several times a day. Unsecure d ports / software could allow an attacker full control of the system. Store staff or client data. Threat number. Threat title. 5 Attack on client informatio n. Expected outcome Possible further Test No Test description 9 Attempt login from Access should be If access is denied, or external remote access granted to the remote connects to the wrong software. access server. device, reconfigure and retry. action following test across a public IP route. Using VPN and NAT enhance security for private networks by keeping internal addressing private from the external network. Protection measures 5 8) Threat(s) addressed by the protection measure – 5 - Attack on client information. 9) Details of action(s) to be taken – Client data in the server should be encrypted and use access rights to limit who has access via the internal network. Do not allow the database to be queried from the internet, OR, if this is unavoidable, ensure that queries can only be performed via pre- 5. Security requireme nt - To keep client information secure Appropriateness of Protection Measure Probabili ty. Very likely Potential size of loss / impact level. Major Risk severity. Extreme Explanati on of the threat in context. If an attack via remote access, internet, or mobile device was successful, the client database / files contain payment informatio n and would be a target. This could have financial, legal, and PR made form pages that enforce validation before running a query. Encrypting data in the server, can enhance 10) Reasons for the actions - Encrypting files and enforcing access rights will the security of limit any damage if an attacker does penetrate the network. Requiring communication queries to run from a validated form will prevent SQL injection attacks. between client and servers. Access 11) Overview of constraints – technical and financial – Rights enables the permissions an Technical - Encryption and access rights, minimal, setup and configuration individual BCTAA user tasks are simple, the ‘walk throughs’ are freely available. Creating to read, write, database query forms. Medium, Some work will be required by the modify, delete or database administrator, or possibly an external consultant, to create and otherwise access a test the forms and validation scripts. New forms and/or scripts may need computer file. Using to be developed and tested if the structure of the database is altered or pre-made quires can new types of query are required in the future. stop attackers get into the database using SQL Financial - Encryption and access rights, minimal, this type of access and injection. encryption management is built into modern network operating system Alternative Protection software. Creating database query forms, medium, with possible ongoing Measures that Could costs. External consultants are likely to be expensive, using internal staff is be Used cheaper but this would be an additional task to their existing work. More Server data could staff / overtime might need to be paid. be backed up with third party so that it 12) Overview of legal responsibilities – There is a requirement for maintaining cannot be stolen if security of clients’ confidential information (Data Protection Act & General access is gained to Data Protection Regulations). BCTAA could be liable if data were stolen. the main server. Rationale for Choice of 13) Overview of usability of the system –Encryption should be transparent to Protection Measure those with the correct access rights. This could slow staff in performing Backing data with third tasks by limiting functions. party would be useful Staff may need to familiarise with new systems / way of accessing admin server when running the SQL queries. consequen ces. 14) Outline cost-benefit – The possibility of a data breach, followed by prosecution or civil action easily outweighs the costs involved. 8) Test plan Test plan Expected outcome in terms of data and information protection but would be impractical in some ways, since BCTAA would be relying on a third party to keep the data safe and will cost them. Possible further Test No Test description 10 Login to Admin and attempt to access data files with insufficient access rights. Access should be denied Repeat the test with sufficient rights, access should be granted. 11 Attempt to enter SQL injection code on database query forms. Code should fail validation and produce an error message. Repeat the test with each field to ensure they have all been validated correctly. action following test Use of IPv4 assresse s. Threat number. 6 Threat title. Network address not organised to fit the requireme nt. Probabili ty. Likely Potential size of loss / impact level. Major Risk severity. High Explanati on of the threat in context. Unless specifically set up, network addresses with probably Protection measures 6 Threat(s) addressed by the protection measure – 6 - Network address not organised to fit the requirement and 9 - WiFi must not connect to IoT devices. 2) Details of action(s) to be taken - Set devices to obtain an IP address via DHCP server with correct subnet. 3) Reasons for the actions - DHCP can be used to split the network into sectors (subnet) which do not talk to each other unless permissions are set up for that to happen. IoT devices IP addresses can be on a different subnet and other network devices (staff PC) can be allocated static or dynamic addresses according to a network plan. Also, DHCP minimizes configuration errors caused by manual IP address configuration. 4) Overview of constraints – technical and financial Technical - Low, DHCP configuration tasks are simple, and manuals are freely available. Financial - Low, DHCP is part of the server operating system. 5) Overview of legal responsibilities - None, as long as data is protected by other means such as encryption. 6) Overview of usability of the system - Minimal, correct addressing should be transparent to users, who will normally use share names, device icons, etc to make connections. 7) Outline cost-benefit – None as most routers have the ability to provide DHCP server support. 6. Security requirement – Configure networ k address for devices. Appropriateness of Protection Measure DHCP can be used to split the network into sectors (subnet) which do not talk to each other unless permissions are set up for that to happen. IoT devices IP addresses can be on a different subnet and other network devices (staff PC) can be allocated static or dynamic addresses according to a network plan. Also, DHCP minimizes configuration errors caused by manual IP address configuration. be assigned as dynamic addresses by the DHCP (Dynamic Host Configurati on Protocol) server using default settings. This may make it harder to keep track of which address belongs to which device and may expose devices which should be hidden if their IP 8) Test plan Test Test description No Expected outcome Possible further 12 Log on to wifi and using network device discovery tools, attempt to locate a IoT device that is not connected to the network. The device should not appear on the network list If the device appears, check and amend DHCP settings and repeat the test. 13 Attempt to find all Devices should static address devices be locatable by entering their IP address If a device cannot be located, check settings on DHCP and check that the device is using DHCP to obtain an address. Try to connect again. 14 Attempt to connect to dynamic address devices by name, icon, ect. If a device cannot be located, check settings on DHCP and check that the device is using DHCP to obtain an address. Try to connect again. Devices should be locatable action following test Alternative Protection Measures that Could be Used Manually configure and assign IP address for both staff, guests and IoT devices. Rationale for Choice of Protection Measure DHCP server allocates dynamic IP address that keeps on changing to all devices connected to the network. Since it is done automatically, th ere will be fewer human errors and duplications, unlike manual configurations. address changes. Wifi connecti on to IoT devices. Threat number. 9 Threat title. WiFi must not connect to IoT devices. Probability Likely . Potential size of loss / impact level. Major Risk severity. High Explanatio n of the threat in context. Unless specificall y hidden, IoT devices will appear on the network and will be more vulnerabl e to attack. Protection measures 7 Use of CAT6 or RJ45. Threat number. 7 Threat title. Unauthoris ed use of CAT6 data outlet Probabili ty. Unlikely Potential size of loss / impact level. Moderate Risk severity. Low 7. Security requirement – To p rotect CAT6 data outlets 2) Details of action(s) to be taken - Install protective CAT6 port blockers Appropriateness of /lockable faceplate to each port, if not in use. Protection Measure Installing port blockers 3) Reasons for the actions - Access to an CAT6 port could allow a device to be or lockable attached to the network, either active, trying to access files, or passive, trying faceplate can be used to capture network traffic. to easily block open The ports are also physically vulnerable/damage on everyday dust and dirt. Covers network ports and would prevent such damage. prevent users from connecting cables, 4) Overview of constraints – technical and financial devices or inserting Technical - Minimal, installing port blockers to ports and on devices such as foreign objects without computers require minimal technical knowledge and ability. permission. Also, it Financial. - Minimal, Port blockers and faceplates are relatively cheap. They will prevents physical probably pay for themselves by reducing the requirement to replace damaged ports. damage and everyday dust and dirt. 1) 1) Threat(s) addressed by the protection measure – 7 - Unauthorised use of CAT6 data outlet. Door controll ed. Explanati on of the threat in context. An attacker can swap the Cat6 cable for another cable and gain direct unauthoris ed access to the network and will be able to have full control of the network. 5) Overview of legal responsibilities - If data is secured and protected, then BCTAA are complying with legal responsibilities such as data protection act and computer misuse act. Threat number. 8 Protection measures 8 Threat title. Misconfigu red Alternative Protection Measures that Could be Used Manually 6) Overview of usability of the system - Minimal, Once installed, staff who disable unused CAT6 need to move CAT6 cables would need to use a key. ports at the switch/hub/routers. 7) Outline cost-benefit - The minimal costs associated with buying the port blockers Rationale for Choice of are a positive advantage. It is cheaper to protect the ports, and they provide a greater Protection Measure sense of security. Port blockers and/lockable faceplate 8) Test plan keep the ports safe from physical Possible furtherdamage. Test Test description Expected outcome When a staff member No action following test to use a port, it needs is easy to unplug a port 15 Install port blocker When attempting to remove the If the port blocker is easily blocker or unlock a onto unused ports port blocker, it should not budge removable without the key, faceplate thanaenabling on devices. and should only be able to be more expensive port blocker the ports manually. removed with the port blocker should be considered, to limit removal key. physical, unauthorised access to the network. 1) Threat(s) addressed by the protection measure – 8 – Misconfigures controlled doors. 8. Security requirement – To protect paintball Appropriateness of Protection Measure controlled doors Probabili ty. Likely Potential size of loss / impact level. Major Risk severity. High Explanati on of the threat in context. As the manageme nt of the office building provide the key cards and the software to run the controlled door, the admin officer may not keep updated 2) Details of action(s) to be taken – Protecting the door which can only be accessed via the card reader. So, if the door is accessed by any method other than the card reader, an alert is sent to security and the main system therefore locking all information into an area protected by firewalls, passwords and other security. CCTV cameras fitted into the area to record anyone breaking into the room. 3) Reasons for the actions – Card reader door control is efficient and securely grant or restrict access to a certain area. CCTV is a countermeasure, as, even though they won’t prevent an accident, they can discourage one by recording everything that happens. 4) Overview of constraints – technical and financial – Technical - Minimal, setup and configuration CCTV is simple, and manuals are freely available. Financial - High, as fitting alarm would cost getting someone to installed buying the alarm, programming it to link to the security room and the maintenance of it. CCTV installation and cost of CCTV is expensive 5) Overview of legal responsibilities – There is a requirement for maintaining a safe workplace, both for staff, guests, trainers and assessors. BCTAA could liable if an outsider gain access to private areas and hacked data/office equipment. Use of CCTV has impact on Data Protection Act and & General Data Protection Regulations. Card reader door control is efficient and securely grant or restrict access to a certain area. CCTV is a countermeasure, as, even though they won’t prevent an accident, they can discourage one by recording everything that happens. Alternative Protection Measures that Could be Used Improving physical security by having alarms, iris scanners, fingerprint readers, security keycode or having security guards on duty in the entrance /public areas to prevent unauthorized access. Rationale for Choice of Protection Measure Having card reader door control and CCTV enable initial protection to the private area of the on maintainin g the door, another possibility is that members of the public or other companies may act as an employee of BCTAA to get a key card to gain unauthoris ed access. 6) Overview of usability of the system – Medium, CCTV should be monitored and stored in secure place for future use, so more staff needed or extra work for existing staff. 7) Outline cost-benefit –The benefit of security of the office overweighs the cost of installation of the cost of set up of surveillance and alarm e.g. even though it is expensive the safety and security of data and equipment is more important. 8) Test plan – Test Test description No Expected outcome Possible further action following test 16 Record all activities in Sessions should be the door control captured. system within a certain time frame. Check CCTV is enabled and all cabelling are in position. 17 Access the system CCTV surveillance accruing attempt of hacking or the video footage recording bypassing the control and announcing intrusion. door system. If access is denied or connects to the wrong device reconfigure and retry. company. Having alternative measures increases cap ital expenses (buying scanners) as well as the operational expenses in maintainin g them / paying salary for guards.