Project Objectives
1.
Research a security incident using various resources.
2.
Use a standard (COBIT) to analyze a security incident.
3.
Recommend changes to improve the security of an organization supported by sound rationale.
4.
Create a basic plan of action to bring about recommended changes.
Project Overview & Components
The purpose of this project is to give experiences in research, analysis using a standard, recommending change based on sound rationale and creating a basic plan of action to bring about change for the better. Each group will select a known security incident and complete the following components via their wikis:
Evaluation and Selection of Security Incidents
Search and find 2 significant or newsworthy security incidents.
Incidents should be no older than 2000.
Can be a private or public organization.
Overview each of the 2 significant or newsworthy security incidents. Include: o The name of the organization. o The mission statement of the organization. o The security incident o Impacts of the incident
Select one of the organizations for analysis (First come; first served).
1
Created on September 22 nd , 2008
Evan Sveum for TCS-401/601
Analysis of the Security Incident using COBIT (DS5: Ensure Systems Security)
Identify the elements / circumstances that contributed to the security incident using the following COBIT control objectives. It is likely that not all of the objectives will have a direct relationship with the security incident. However, each of the objectives, related to the incident, need to be addressed. The objectives include (See COBIT Student Book-Page 92 for details): o 5.1 Manage Security Measures o 5.2 Identification, Authentication and Access o 5.3 Security of Online Access to Data o 5.4 User Account Management o 5.5 Management Review of User Accounts o 5.6 User Control of User Accounts o 5.7 Security Surveillance o 5.8 Data Classification o 5.9 Central Identification and Access Rights Management o 5.10 Violation and Security Activity Reports o 5.11 Incident Handling o 5.12 Reaccreditation o 5.13 Counterparty Trust o 5.14 Transaction Authorisation o 5.15 Nonrepudiation o 5.16 Trusted Path o 5.17 Protection of Security Functions o 5.18 Cryptographic Key Management o 5.19 Malicious Software Prevention, Detection and Correction o 5.20 Firewall Architectures and Connections with Public Networks
2
Created on September 22 nd , 2008
Evan Sveum for TCS-401/601
o 5.21 Protection of Electronic Value
Synthesis Through Recommended Changes in Control Practice
Make specific recommendations that would improve the security system. Recommendations should include a solid rationale based on the evidence provided via the Analysis of the Security
Incident using COBIT (DS5: Ensure Systems Security).
When making recommendations, please include a basic plan of action including cost, services provided and other reasonable planning details. The basic plan of action should include: o People o Procedures o Hardware o Software o Telecommunications
Project Assessment
This project is worth 200 points overall. As you complete each portion of this project, please write a ½
page progress report & upload to appropriate drop boxes (see dropbox area). One progress report per group/per portion of the project (3 total)... See 'big yellow box/schedule' for due dates for each section of this project…
The following will be used to assess the completed project:
Evaluation and Selection of Security Incidents (30 pts)
Searched and found 2 significant or newsworthy security incidents? Incidents no older than 2000?
Overview each of the 2 significant or newsworthy security incidents include:
The name of the organization?
The mission statement of the organization?
The security incident?
Impacts of the incident?
5
20
3
Created on September 22 nd , 2008
Evan Sveum for TCS-401/601
Select one of the organizations for analysis?
Appropriate mix of media elements (more than just text)?
5
Analysis of the Security Incident using COBIT (DS5: Ensure Systems Security) (60 pts)
Identified the elements / circumstances that contributed to the security incident using the related / appropriate COBIT control objectives?
Synthesis Through Recommended Changes in Control Practice (60 pts)
60
Recommendations included a solid rationale based on the evidence provided via the
Analysis of the Security Incident using COBIT (DS5: Ensure Systems Security)?
Basic plan of action included cost, services provided and other reasonable planning details including:
People?
Procedures?
Hardware?
Software?
Telecommunications?
Wiki Formatting (50 pts)
Used an appropriate number of credible resources to build all elements of the project
(15 or more)?
Appropriate use of APA (Including Reference List & Parenthetical Citations)?
Note: Project will be considered incomplete if used incorrectly…
Easy to follow navigation to all project elements?
30
30
10
10
10
10
Instructor’s Impression? 10
4
Created on September 22 nd , 2008
Evan Sveum for TCS-401/601