Security Assignment
Security Assignment
Security Assignment
Security Assignment
INTERNATIONAL SCHOOL OF
MANAGEMENT AND TECHNOLOGY
FACULTY OF COMPUTING
STUDENT DETAILS
STUDENT ID 2022HNDIT133
ESTIMATED 8000
WORD LENGTH
SUBMISSION
HAND IN DATE
Plagiarism: to use or pass off as one’s own, the writings or ideas of another
without acknowledging or crediting the source from which the ideas are taken.
1. I declare that:
a) this assignment is entirely my own work, except where I have included fully-
documented references to the work of others,
b) the material contained in this assignment has not previously been submitted
for any other subject at the University or any other educational institution,
except as otherwise permitted,
c) no part of this assignment or product has been submitted by me in another
(previous or current) assessment, except where appropriately referenced, and
with prior permission from the Lecturer / Tutor / Unit Coordinator for this unit.
2. I acknowledge that:
a) if required to do so, I will provide an electronic copy of this assignment to the
assessor;
b) the assessor of this assignment may, for the purpose of assessing this
assignment:
I. reproduce this assignment and provide a copy to another member of
academic staff;
II. communicate a copy of this assignment to a plagiarism checking
service such as Plagiarism Check (which may then retain a copy of this
assignment on its database for the purpose of future plagiarism
checking).
I am aware of and understand that any breaches to the Academic Code of Conduct
will be investigated and sanctioned in accordance with the College Policy.
SIGNATURE DATE
Security|2023
Table of Contents
General introduc琀椀on...................................................................................................................................6
Ac琀椀vity 1......................................................................................................................................................7
Introduc琀椀on.................................................................................................................................................7
Presenta琀椀on................................................................................................................................................7
Types of security risk...................................................................................................................................8
Malware and ransomware a琀琀acks..........................................................................................................8
Phishing and social..................................................................................................................................8
Insider threats.........................................................................................................................................9
Weak authen琀椀ca琀椀on and password policies...........................................................................................9
Organiza琀椀onal Security Procedures...........................................................................................................11
Security Policy for London College............................................................................................................13
Network Monitoring System.....................................................................................................................15
Bene昀椀ts of implemen琀椀ng Network Monitoring System........................................................................15
Poten琀椀al Security Impacts of Incorrect Con昀椀gura琀椀on of:.........................................................................16
Firewall Policies.....................................................................................................................................16
DMZ...........................................................................................................................................................17
Sta琀椀c IP......................................................................................................................................................18
NAT............................................................................................................................................................18
Improving Network Security Using DMZ, Sta琀椀c IP, and NAT.....................................................................19
Example of implemen琀椀ng DMZ.............................................................................................................19
Example of implemen琀椀ng Sta琀椀c IP........................................................................................................25
Example of implemen琀椀ng NAT..............................................................................................................29
Suppor琀椀ng Notes.......................................................................................................................................34
Proposal.....................................................................................................................................................36
Introduc琀椀on...............................................................................................................................................36
IT Security Risks.........................................................................................................................................36
Techniques for evalua琀椀ng IT Security Risks...........................................................................................36
Physical and Virtual Countermeasures......................................................................................................36
Physical Countermeasures.....................................................................................................................36
BIBEK SAH 3
Security|2023
BIBEK SAH 4
Security|2023
BIBEK SAH 5
Security|2023
General introduction
Prepare yourself for an engaging exploration of a noteworthy security incident that unfolded
within the confines of a London-based company. Brace for impact as we delve into the aftermath
of a ransomware siege that unleashed havoc, resulting in a substantial loss of invaluable data. As
a zealous Junior Network Security Specialist operating under the esteemed banner of Phoenix
Security Solutions Limited (PSS), my solemn duty entailed scrutinizing the organization's risk
assessment practices, fashioning a robust security blueprint that adheres to pertinent legislation,
and proffering tangible solutions to fortify the impregnable fortress of London College's IT
security. With bated breath, I shall unveil the crux of my most recent investigation, accompanied
by a symphony of sagacious conclusions and astute suggestions. Thus, let the journey commence
forthwith!
Activity 1
Introduction
In this presentation tailored for establishments such as London College, we shall engage in an in-
depth discourse on plausible hazards that pose threats to IT security and explore effective
countermeasures. Our comprehensive assessment will encompass an evaluation of existing
security protocols, a careful consideration of the merits of network monitoring, and the provision
of strategies aimed at diminishing risks. Vital topics at the forefront include the establishment of
a secure DMZ (Demilitarized Zone), the implementation of Static IP addresses, NAT (Network
Address Translation), fortifying firewalls, and the utilization of VPNs (Virtual Private
Networks). Equally critical will be our focus on ensuring uninterrupted operational continuity
and safeguarding data integrity. With a sense of urgency, let us now immerse ourselves in the
realm of IT security for London College.
BIBEK SAH 6
Security|2023
Presentation
BIBEK SAH 7
Security|2023
Insider Threats:
• a frustrated or irate associate, supplier, or contractor.
• attempts to avoid being discovered.
• working into the early morning.
• shows hostility toward coworkers.
• ongoing disrespect for the company's rules .
Weak Authentication and Password Policies:
• Important security concerns are raised by lax password and login policies.
• Accounts may be exposed to attacks if weak passwords are used, such as ones that are short or simple to guess, or if
multi-factor authentication is not used.
• Security is at risk due to ineffective password rules, such as those with lax complexity requirements or inconsistent
updates.
• Strong password restrictions, two-factor authentication, password hygiene training for users, monitoring for
compromised credentials, and routine policy updates can all help to reduce these risks.
• To safeguard sensitive data and stop unwanted access, authentication and password security must be strengthened.
BIBEK SAH 8
Security|2023
Insider threats
Weak authentication and password policies
BIBEK SAH 9
Security|2023
BIBEK SAH 10
Security|2023
BIBEK SAH 11
Security|2023
BIBEK SAH 12
Security|2023
BIBEK SAH 13
Security|2023
BIBEK SAH 14
Security|2023
BIBEK SAH 15
Security|2023
BIBEK SAH 16
Security|2023
DMZ
BIBEK SAH 17
Security|2023
Static IP
NAT
BIBEK SAH 18
Security|2023
BIBEK SAH 19
Security|2023
BIBEK SAH 20
Security|2023
BIBEK SAH 21
Security|2023
BIBEK SAH 22
Security|2023
BIBEK SAH 23
Security|2023
BIBEK SAH 24
Security|2023
BIBEK SAH 25
Security|2023
Step 2: Assign Static IP Address to all the PCs and Routers as shown in the figure below
BIBEK SAH 26
Security|2023
BIBEK SAH 27
Security|2023
BIBEK SAH 28
Security|2023
BIBEK SAH 29
Security|2023
Step 2: Add IP addresses to the routers using the given commands in the figure below
BIBEK SAH 30
Security|2023
BIBEK SAH 31
Security|2023
Router :2
Router: 3
BIBEK SAH 32
Security|2023
Step 4: Configure NAT with the given commands in the figure and do the test with the
command.
BIBEK SAH 33
Security|2023
Supporting Notes
Security Risks to London College:
London College is susceptible to various security risks, including malware and ransomware
attacks, unauthorized access and data breaches, insider threats, social engineering, physical
security breaches, weak authentication and password policies, network vulnerabilities, and data
loss and corruption. These risks can lead to financial losses, reputational damage, and
compromise the integrity of sensitive data. Real-world examples, such as the WannaCry
ransomware attack and the Equifax data breach, illustrate the potential consequences of these
threats.
BIBEK SAH 34
Security|2023
Implementing network monitoring systems offers numerous benefits for London College. These
systems provide real-time visibility into network activities, enabling the detection of suspicious
behavior or security incidents. They facilitate timely incident response by alerting administrators
to potential threats, allowing for immediate action. Network monitoring systems can detect
unauthorized access attempts, malware infections, data exfiltration, and other security issues,
reducing the impact of security breaches and enhancing overall network security.
BIBEK SAH 35
Security|2023
BIBEK SAH 36
Security|2023
Proposal
Introduction
In order to safeguard the integrity of their operations, organizations must place paramount
importance on identifying and rectifying IT security issues. By conducting a meticulous risk
assessment, incorporating a holistic blend of physical and virtual security solutions, and
judiciously allocating resources, businesses can enhance their overall security stance and
mitigate potential risks. This approach offers a comprehensive strategy for proactively tackling
IT security concerns and fortifying the resilience of their operations.
IT Security Risks
In the mysterious realm of information security, the enigmatic notion of risk manifests as a
shape-shifting specter, lurking in the shadows, poised to strike at the very heart of businesses and
their cherished stakeholders. It embodies the treacherous dance between the art of technology
utilization, the mastery of administration, and the ever-shifting landscape that envelopes them.
Like a cunning predator, information security risk prowls, awaiting the perfect moment to
unleash its devastating potential for harm. (Watson, 2013).
BIBEK SAH 37
Security|2023
Discreet Storage: To safeguard vital components such as servers, backup tapes, and other
critical equipment, it is imperative to secure them within designated safe havens fortified with
robust locks, vigilant alarms, and meticulous environmental controls. This comprehensive
approach serves as an impregnable fortress, fortifying against the malevolent forces of robbery,
theft, and criminal mischief.
BIBEK SAH 38
Security|2023
Information and Education for Employees: Enlightening employees about the imperative
nature of implementing physical security measures is paramount. This entails fostering a deep
understanding of the significance of preserving access codes in utmost confidentiality, promptly
reporting any suspicious activities, and strictly adhering to access control policies. By instilling a
culture of security awareness through frequent training sessions and dedicated efforts to raise
awareness, an impenetrable shield of vigilance is forged, ensuring the collective safeguarding of
organizational assets.
Event planning and emergency readiness: In the grand tapestry of organizational resilience,
the art of crafting and scrutinizing incident response plans and emergency evacuation protocols
takes center stage. These masterpieces of preparedness pave the way for swift and formidable
responses to security-related incidents or dire crises. Through the prism of regular training and
rigorous testing of these response plans, hidden flaws are unmasked, fortifying the fabric of
preparedness and nurturing a culture of continuous improvement. Like skilled artisans honing
their craft, organizations can refine their readiness, painting a vivid portrait of efficiency and
efficacy in the face of adversity.
BIBEK SAH 39
Security|2023
BIBEK SAH 40
Security|2023
By intercepting these threats at their inception, organizations can ward off breaches and
safeguard against the harrowing specter of data loss.
Enhancing Incident Response: Like sentinels in the digital realm, network monitoring systems
stand ever watchful, swiftly sounding the alarm at the slightest hint of pivotal events or
anomalies within the network. By swiftly alerting IT personnel to the occurrence of these vital
triggers, the time required for detection and efficient mitigation of attacks is significantly
reduced. This proactive approach empowers IT employees to swiftly identify and address
security concerns as they materialize, curtailing the potential harm and peril that can be wrought
by security breaches. In the blink of an eye, rapid incident response emerges as the shield against
the malevolent forces lurking in the shadows of the digital domain.
Regulations and Requirements for Compliance: Within the realm of network security and
data protection, the imperative of complying with regulatory obligations and industry standards
holds true, just as it does for other businesses and organizations. As a steadfast ally, network
monitoring solutions play a pivotal role in aiding organizations to demonstrate compliance.
Through their ceaseless vigilance, these solutions diligently monitor network traffic, promptly
detecting and reporting any security incidents or instances of non-compliant activity.
Additionally, they serve as custodians, preserving audit logs and records essential for meeting
compliance requirements. In this symbiotic partnership, network monitoring solutions become
formidable guardians, ensuring that organizations navigate the complex landscape of compliance
with unwavering confidence.
BIBEK SAH 41
Security|2023
Resource allocation and capacity planning: The existence of network monitoring systems
bestows upon organizations invaluable insights into critical facets such as resource utilization,
bandwidth consumption, and network usage patterns. Armed with this knowledge, businesses
can orchestrate the evolution of their network architecture, making informed decisions on
resource allocation to optimize effectiveness. Furthermore, this intelligence empowers firms to
proactively adapt to changing consumer expectations, positioning themselves for growth and
staying one step ahead in the ever-evolving landscape of demand.
Addressing issues and troubleshooting: Embracing the role of a knowledgeable guide, network
monitoring systems illuminate the intricacies of network performance, device well-being, and
connection issues, enabling swift and effective troubleshooting. Armed with this comprehensive
understanding, IT specialists embark on a journey of problem-solving, seamlessly identifying the
root cause, isolating faulty hardware or connections, and executing the necessary remedial
actions. Through their astute guidance, network monitoring systems serve as beacons of swift
restoration, rejuvenating network functionality with utmost efficiency.
Analyzing historical data: Within the realm of network monitoring systems, a treasure trove of
historical network data is meticulously gathered and preserved. This invaluable repository
empowers businesses to embark on a voyage of evaluation, unveiling trends and discerning
patterns that serve as guiding lights for choosing optimal capacity planning techniques, fortified
security measures, and refined network optimization strategies. Through astute analysis of this
historical data, businesses are equipped with vital insights that fuel strategic decision-making and
enable the seamless management of networks over the long haul.
BIBEK SAH 42
Security|2023
a) A violation of data: Due to improperly configured VPN servers and clients, sensitive
data transmitted over a VPN may be accessed by unauthorized parties, resulting in data
breaches. Hackers may be able to steal, change, or intercept data due to poor access
restrictions, inadequate encryption settings, and insufficient authentication methods.
b) Inappropriate Access: It could be possible for unauthorized individuals to get access to
critical systems or business networks by employing unstable VPN clients and servers.
Attackers could be able to bypass established security measures if there are open network
ports, weak or default passwords, improperly configured user permissions, or weak or
default passwords.
c) The misuse of the internet: Inadequate VPN configurations might leave security gaps
that allow hackers access to the network infrastructure. To do this, network scanning,
distributed denial-of-service (DDoS) attacks, or assaults on other networked devices or
services would be necessary.
BIBEK SAH 43
Security|2023
a) Segregation: The DMZ divides the internal network from the external network, either
physically or theoretically. Sensitive internal resources are shielded from direct Internet
exposure and potential threats in this section.
c) Security perimeters: One security perimeter separates the internal network from the
DMZ, while another security perimeter separates the DMZ from the external network.
Firewalls or other security tools that carry out access control regulations and keep an eye
on traffic surround each perimeter.
BIBEK SAH 44
Security|2023
b) Justify Persistence: The permanence offered by static IP addresses allows other devices
or software to reliably connect to the device by utilizing its established IP address.
Network printers, servers, and other services that need a stable and predictable network
address would particularly benefit from this.
c) Remote hosting and access: For remote access reasons, such as connecting to a device
or network from outside the local network, static IP addresses are frequently employed. It
enables users to connect remotely using protocols like Remote Desktop Protocol (RDP)
or Virtual Private Network (VPN) without having to keep track of IP address changes.
d) Hosting Solutions: For hosting services like websites, email servers, FTP servers, or
gaming servers, static IP addresses are often necessary. They require a reliable and
consistent IP address so that customers or clients may frequently connect to these
services.
BIBEK SAH 45
Security|2023
router substitutes the source IP address with its public IP address when devices
connect to external networks, making it challenging for other parties to rapidly
access or identify the private devices.
BIBEK SAH 46
Security|2023
BIBEK SAH 47
Security|2023
BIBEK SAH 48
Security|2023
Conclusion
In order to increase security measures, London College has tight procedures in place to fix issues
including insufficient access controls and outdated software. In addition to emphasizing the
development of powerful VPNs and firewalls to prevent unwanted access, it places equal
emphasis on network monitoring's capacity to identify threats in real time. Network security can
be increased by the use of DMZ, static IP addresses, and NAT, among other techniques. Regular
risk assessments, physical security measures, and technological security measures all serve to
safeguard the organization's integrity. To reduce risk and defend against cyberattacks, a clear
security plan, educational activities, and proactive preventative measures are crucial.
BIBEK SAH 49
Security|2023
Activity 2
Introduction
This process evaluation essay examines the policies and procedures for data security at London
College. Along with a review of risk assessment methods and an introduction to data protection
laws and regulations, it also offers a summary of the ISO standard or suitable risk management
plan that was employed. A plan is created to align organizational policies with IT security once it
has been determined how an IT security audit might affect the college's security. In order to
protect sensitive information and lower risk, it is essential to follow data security standards and
best practices.
The risk assessment revealed a variety of dangers, including virus infections and data loss on
computer lab PCs, copyright violations on computer lab PCs, transmission of illegal materials on
computer lab PCs, virus infections and data loss on staff laptops, copyright violations on staff
laptops, virus infections and data loss on the file server, and potential distributed denial-of-
service (DDoS) attacks and virus infections on the network.
The likelihood and significance of these dangers are graded, with risks that could have major
repercussions receiving more attention. The risks that are given priority one is those that are
thought to be unlikely to materialize, priority two should be dealt as soon as financial resources
are made available, and priority three requires immediate attention.
By evaluating the most serious risks in terms of priority, the College is able to concentrate its
resources and make sure that the appropriate steps are done to reduce and manage risks
effectively. Ranking the risks and the relevant responses enables this.
BIBEK SAH 50
Security|2023
Impact and Prospect Analysis: The evaluation takes into account each risk's likelihood and
effects, providing a framework for allocating resources and determining priorities for mitigation
strategies.
Weakness:
Restrictive Scope: The evaluation may not fully address other potential security concerns, such
as physical security or social engineering attacks, because it primarily focuses on IT-related
weaknesses.
Failure to Follow Industry Standards: The assessment makes no mention of following best
practices or industry standards, which could cause a mismatch between the college's security
measures and established industry standards.
BIBEK SAH 51
Security|2023
The enlargement of the scope of risk assessment: The risk assessment should consider not
only IT-related vulnerabilities but also other security components like physical security, social
engineering attacks, and human factors to get a full view of the college's overall security posture.
Complying with industry standards: London College should adopt and implement industry
standards like the NIST Cybersecurity Framework and ISO 27001. This ensures that security
techniques are trustworthy, up to date, and in line with industry standards.
Risk evaluation and effect: The proper metrics or scales should be used to analyze risks and
their potential impacts in order to increase the objectivity and accuracy of the risk assessment. As
a result, risks can be prioritized by being ranked in order of priority.
IT System Identification
IT System Inventory and Definition Document
IT System Identification and Ownership
IT System ID LGT-354 IT System
Common Name
Owned By College Student Information System
Physical London College Data Centre
Location
Major Business Management of student information, contact details, assessment data,
Function attendance, and Special Educational Needs (SEN) data.
System Owner James Smith System 78776777777
Phone Number 98898989898 Administrator(s)
Phone Number
Data Owner(s) 65656565656 Data Custodian(s) 43434343434
Phone Phone Number(s)
Number(s)
Other Relevant Critical application managing student data with secure and reliable access.
Information
ss
Identification of Risks
By connecting known vulnerabilities to actual threats, risk assessment involves assessing
potential risks. Vulnerabilities are any weak points or flaws that could have a detrimental effect
on the IT system, the data it administers, or the business as a whole. A vulnerability is anything
that could adversely affect any of the following:
BIBEK SAH 52
Security|2023
IT systems
BIBEK SAH 53
Security|2023
Risk Risk of
Vulnerability Threat Risk Summary
No. Compromise of
BIBEK SAH 54
Security|2023
Risk Risk of
Vulnerability Threat Risk Summary
No. Compromise of
Control analysis
In-Place/
Control Area Description of Controls
Planned
System Patch In-place All operating systems and applications receive routine security
Management patch updates to fix known vulnerabilities and lower the risk of
virus infestations.
Data Backup and Planned Implementing planned data backup methods and testing and
Recovery validating the backup and recovery procedures will ensure that
crucial data is regularly backed up.
Network Access In-place Implementation of strong network access controls, such as user
Controls authentication, role-based access control, and content screening
tools, to stop unauthorised access and unauthorised distribution
of protected content.
File server Security In-place Regular security audits and hardening of file server setups,
including access controls, file permissions, and encryption, are
necessary to reduce the risk of virus infections and
unauthorised access.
Risks-Control-Factors Correlation
BIBEK SAH 55
Security|2023
BIBEK SAH 56
Security|2023
BIBEK SAH 57
Security|2023
High The risk's occurrence could lead to serious harm or impediments to the
purpose, reputation, or interest, as well as human death or serious injury, loss
of important tangible assets, resources, or sensitive data.
Low If the danger materializes, it might lead to the loss of some material resources
or assets or have a significant impact on the mission, reputation, or interest.
BIBEK SAH 58
Security|2023
BIBEK SAH 59
Security|2023
Risk Impact
Risk Likelihood Low Moderate High
(10) (50) (100)
BIBEK SAH 60
Security|2023
Risk Risk
Risk Impact Overall Risk
Risk Summary Likelihood
No. Rating Rating
Rating
Data categorization: You can choose the required level of protection by classifying data
according to its sensitivity and criticality. This makes it simpler to set up the appropriate security
measures and prioritize resources.
Risk evaluation: The security of the data may be threatened by unauthorized access, data
breaches, loss, or corruption. Identify and evaluate these risks. You can prioritize your mitigation
strategies by figuring out how likely these threats are and what they might mean in terms of
outcomes.
BIBEK SAH 61
Security|2023
Data security policies: Make and implement data security policies that describe how to govern
and protect data handling procedures. These guidelines ought to include everything, including
access restrictions, data encryption, data retention regulations, and disposal practices.
Access Management: Install trustworthy access control systems to guarantee that only people
with permission can access and edit data. This includes ongoing user privilege audits, role-based
access control, and user authentication.
Data protection: To prevent unauthorized access and interception, encrypt sensitive data both in
transit and at rest. Industry standard procedures should be followed while using encryption
techniques and protocols.
An overview of the General Data Protection Regulation (GDPR): The European Union (EU)
has approved a comprehensive data protection law known as the GDPR, which imposes strict
guidelines on businesses that handle the personal data of EU citizens. It creates guidelines for
data controllers and processors and gives users more control over their data.
Consumer Privacy Act of California (CCPA): The CCPA, a data protection law, strengthens
consumer protection and privacy rights in California, the United States. It limits corporations'
data collection, usage, and disclosure while also giving Californians particular rights to their
personal information and protecting consumer rights.
Act governing the portability and accountability of health insurance: The confidentiality and
security of personal health information are protected by US law known as HIPAA. It includes
healthcare suppliers, insurers, clearinghouses, and their business associates.
Personal Data Protection Act (PDPA): The collection, use, and disclosure of personal data are
all subject to Singapore's PDPA data protection law's regulations. It places emphasis on
BIBEK SAH 62
Security|2023
Establishing Context:
Know the organization's background, including its goals for information security, legal
obligations, and risk management strategy.
Risk evaluation: When identifying and assessing information security risks, take into account
weaknesses, internal and external factors, and potential effects on the company's assets.
Risk management: In order to address the risks that have been identified, develop and put into
action a risk management strategy. To decrease or completely eliminate the threats, this
necessitates choosing and implementing the necessary security measures.
Recognizing risk: After implementing the chosen controls, evaluate the remaining risks to see if
the organization can accept them.
Monitoring and evaluation: Monitor the effectiveness of the security safeguards you've put in
place. Review your risk assessments frequently and make any necessary modifications.
BIBEK SAH 63
Security|2023
IT security audit
A security audit determines how closely the system adheres to established requirements in order
to assess the security of an organization's information system. A thorough audit routinely
assesses the setup and environment, physical setup, user behavior, information handling
methods, software security, and setup and environment.
Risk reduction: The audit identifies weaknesses and potential threats, enabling the company to
take proactive steps to lower such risks. The business can lessen the possibility of security
events, data breaches, and unauthorized access to sensitive information by plugging any gaps
discovered.
Higher adherence: In IT security audits, compliance with relevant legislation and industry
standards is frequently checked. By acting on audit recommendations, the organization can
increase compliance with legal and regulatory requirements, avoiding fines and reputational
damage brought on by non-compliance.
Improvement of Incident Response: During the audit, the organization's incident response
capabilities might be evaluated. By implementing recommendations and improving incident
response procedures, the company may be better able to identify, resolve, and recover from
security vulnerabilities.
Greater education and training: The audit's findings may increase staff awareness of potential
security risks and the need of observing security procedures. A staff that is accordingly more
security-conscious and better training programs can reduce the incidence of security incidents
caused by human error (Vergesa, 2023).
BIBEK SAH 64
Security|2023
By adhering to this policy, the college is able to maintain the information's accessibility,
integrity, and confidentiality. In addition to establishing standards for data storage, access
management, and incident response, it also promotes a security-aware culture across the board
for the entire organization. This policy contributes to a safer and more lawful environment at
London College.
Recommendation on how the IT security at London College can be aligned with its
organizational policy
The organizational policies of London College can be coordinated with IT security.
BIBEK SAH 65
Security|2023
Conclusion
The corporate policy must be followed by London College's IT security procedures in order to
provide strong data protection and reduce security threats. Vulnerabilities, legal violations, and
inadequate incident response skills can result from inconsistencies. The college can lessen these
risks and create a secure work environment by regularly conducting risk analysis and promoting
a culture of security awareness. London College may improve data protection, accomplish
compliance, and grow stakeholder trust in its commitment to information security by integrating
IT security with organizational policy.
BIBEK SAH 66
Security|2023
Activity 3
Introduction
Designing a comprehensive security strategy for London College that includes a disaster
recovery plan and a risk assessment process that complies with ISO standards is the subject of
activity 3. This effort attempts to solve the flaws found in the current risk assessment processes
and offer efficient countermeasures to possible IT threats. Stakeholders and their responsibilities
for carrying out a security audit will be named and discussed. The physical, virtual, and policy
aspects chosen for inclusion in the security plan will be justified based on their applicability and
efficacy. It will also be evaluated to see how well the tools selected fit London College's
particular requirements. The main goals are to strengthen the college's security framework,
protect sensitive data, and develop a robust system that guarantees continuous operations.
Security Policy
A security policy is a written document or collection of guidelines that specifies the policies,
processes, and best practices to be followed inside an organization to guarantee the privacy,
availability, and integrity of its data and resources. By outlining the duties and expectations of
staff, users, and stakeholders with regard to information security, it serves as a foundation for
creating and maintaining a safe environment (Lutkevich, techtarget.com, 2020).
BIBEK SAH 67
Security|2023
Company Impact Analysis (BIA): Evaluation of a disruptive incident's potential effects and
outcomes on crucial company systems, processes, and resources. Effective resource allocation
and prioritization are aided by this.
Recovery Time Objective (RTO): The maximum amount of time that a business process or
system can be down. For the organization's impact to be as small as possible, it specifies the time
limit within which operations should be resumed.
Recovery Point Objective (RPO): The highest amount of data loss that can be tolerated in the
event of an emergency is known as the recovery point objective (RPO). The time period from
which data must be recovered in order to prevent significant data loss is specified.
Stakeholders
Stakeholders are people or organizations with an interest in a certain project, procedure, or
company. Stakeholders are significant individuals or organizations who have a role in ensuring
the efficacy and success of the audit in the context of implementing one at London College.
Designation of stakeholders
College Administration: The Chief Executive Officer (CEO) and top administrators of the
college are in charge of establishing the overall security objectives and policies. They guarantee
that the security audit is aligned with the college's strategic goals and provide the resources and
assistance required for its implementation.
IT Department: In order to implement the security audit, the IT department, which consists of
IT managers, network administrators, and technicians, is essential. They are in charge of
evaluating the current IT infrastructure, spotting weaknesses, and putting the required security
measures in place. To efficiently complete the audit, they work with outside auditors and security
experts.
BIBEK SAH 68
Security|2023
Faculty and Staff: Faculty and staff personnel are significant stakeholders who should be
included in the security audit process. They are responsible for following security regulations,
taking part in security awareness training, and reporting any security-related occurrences or
issues. Their collaboration is necessary for upholding a secure environment and integrating
security procedures into their regular operations (Hilliard, 2018).
Security experts: Security experts from either an internal team or outside consultants provide
their experience in conducting security audits. They evaluate the security measures in place at
the college currently, look for weaknesses and potential dangers, and suggest the best security
controls and defenses. They offer direction on security policies, strategies, and best practices as
well.
Faculty and Staff: Faculty and staff members are responsible for following the security
guidelines set forth by the college. When managing and accessing sensitive data, they should be
trained in security awareness and use secure procedures. They must also be accountable for
reporting any security lapses or vulnerabilities they discover.
BIBEK SAH 69
Security|2023
Placing video surveillance cameras in key locations enables real-time monitoring and recording
of activity, serving as a deterrent to possible security breaches and assisting with investigations.
Secured Client Room: Setting up a secure server room with limited access ensures the physical
security of servers, network equipment, and storage systems, protecting vital data and
infrastructure.
Intrusion Detection and Prevention Systems: Implementing intrusion detection and prevention
systems (IDPS) can assist identify and stop unauthorized access attempts and malware
infestations within a network.
Antiviral and anti-Malware Software: Making use of dependable antivirus and anti-malware
software assists with the detection and elimination of harmful software, lowering the likelihood
of data breaches and system compromises.
BIBEK SAH 70
Security|2023
College can strengthen its cybersecurity defenses and successfully fend off future cyberattacks
and data breaches by integrating these virtual components.
Developing an incident response: It describes the measures to be done in the case of a security
issue, guaranteeing a prompt and effective reaction to reduce damage and speed up recovery.
Security Awareness and Training: By regularly conducting security awareness programs and
training sessions, faculty, staff, and students are made aware of the risks to security, the best
practices, and their responsibilities for keeping a secure environment.
BIBEK SAH 71
Security|2023
and procedures for acceptable use, incident response, and data protection, promoting security
awareness and compliance. The combination of these selected tools forms a comprehensive
security framework that aligns with the college's needs and enhances its overall security posture
(CIRELLY, 2023).
The virtual elements, including firewalls, intrusion detection and prevention systems, antivirus
software, endpoint protection, data encryption, and virtual private networks, address the college's
cybersecurity requirements. These tools work together to safeguard the college's network
infrastructure, detect and prevent unauthorized access, identify and mitigate potential cyber
threats, and protect sensitive data from unauthorized disclosure or manipulation. The policy
elements, such as acceptable use policies, incident response procedures, and data protection
guidelines, provide clear guidance and expectations for staff and students regarding the
appropriate use of college resources, the steps to follow in case of security incidents, and the
measures to ensure the confidentiality and integrity of data. By integrating these physical, virtual,
and policy elements, the security policy of London College establishes a comprehensive
framework for mitigating risks, protecting assets, and maintaining a secure environment for
students, staff, and sensitive data.
BIBEK SAH 72
Security|2023
practices among staff and students, empowering them to make informed decisions and avoid
potential security pitfalls.
Conclusion
In conclusion, the third activity has been crucial in helping London College create a thorough
security policy. To address the security requirements of the college, stakeholders were included
and suitable physical, virtual, and policy aspects were chosen. The instruments employed in the
security policy have been evaluated, and this has proven their applicability. London College
should place a high priority on routine audits, ongoing training, and remaining up to speed with
the most recent security procedures in order to further improve security. The college may
improve its security posture and safeguard its systems, data, and stakeholders by putting these
recommendations into practice.
BIBEK SAH 73
Security|2023
References
CIRELLY, J. (2023). comparitech.com. Retrieved from
h琀琀ps://www.comparitech.com/net-admin/network-security-policy-management-tools/
#:~:text=ManageEngine%20Firewall%20Analyzer%20is%20a,Support%20for%20policy
%20crea琀椀on
BIBEK SAH 74