Logo Passei Direto
Buscar
Material
páginas com resultados encontrados.
páginas com resultados encontrados.

Prévia do material em texto

T-1.8.1_v3
	Details of Assessment
	Term and Year
	
	Time allowed
	
	Assessment No
	1 of 2
	Assessment Weighting
	50%
	Assessment Type
	Case Study - Report
	Due Date
	
	Room
	
	Details of Subject
	Qualification
	ICT40120 Certificate IV in Information Technology 
	Subject Name
	Cyber Security
	Details of Unit(s) of competency
	Unit Code (s) and Names
	ICTICT424 Address Cyber Security Requirements
	
	BSBXCS404 Contribute to cyber security risk management
	Details of Student
	Student Name
	Vinicius Bulhoes da Silva
	College
	Aapoly 
	Student ID
	202470730
	Student Declaration: I declare that the work submitted is my own and has not been copied or plagiarised from any person or source. I acknowledge that I understand the requirements to complete the assessment tasks. I am also aware of my right to appeal. The feedback session schedule and reassessment procedure were explained to me.
	Student’s
Signature: ____________________
Date: _____/_____/_________
	Details of Assessor
	Assessor’s Name
	
	Assessment Outcome
	Assessment Result
	☐ Competent ☐ Not Yet Competent 
	Marks
	 /50
	Feedback to Student 
Progressive feedback to students, identifying gaps in competency and comments on positive improvements:
	______________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________________ ______________________________________________________________________________________
	Assessor Declaration: I declare that I have conducted a fair, valid, reliable and flexible assessment with this student.
☐ Student attended the feedback session.
☐ Student did not attend the feedback session.
	Assessor’s 
Signature: ___________________
Date: _____/_____/________
	Purpose of the Assessment
	The purpose of this assessment is to assess the student in the following learning outcomes:
	Competent (C)
	Not Yet Competent
(NYC)
	Performance Criteria: ICTICT424 Address Cyber Security Requirements
	1.1 Identify and document valuable assets to create register of valuable assets
	
	
	1.2 Perform threat and risk assessment on valuable assets register to identify and document cyber security requirements
	
	
	1.3 Review current cyber security controls against the cyber security requirements to identify cyber security gaps
	
	
	2.1 Identify cyber security controls which address cyber security gaps
	
	
	2.2 Determine specific cyber security controls to address cyber security gaps against the organisation’s risk appetite
	
	
	2.3 Seek feedback from organisational representative and agree on cyber security controls to implement
	
	
	2.4 Implement, test and document agreed cyber security controls to address cyber security gaps
	
	
	2.5 Seek feedback from organisational representative to identify discrepancies between cyber security controls and cyber security requirements
	
	
	3.1 Determine currency of valuable assets register to identify new valuable assets and changed threats and risks
	
	
	3.2 Identify, determine, and agree on cyber security controls to address new cyber security gaps
	
	
	3.3 Implement and document new and modified cyber security controls to address cyber security gaps
	
	
	Performance Criteria: BSBXCS404 Contribute to cyber security risk management
	1.1 Consult with stakeholders to determine scope of risk management appropriate to organisation and industry
	
	
	1.2 Review relevant critical cyber risk management strategies appropriate to level of risk
	
	
	1.3 Assist in developing suitable cyber security response options according to organisational policies and procedures
	
	
	1.4 Present options for risk management strategies for approval within scope of own role
	
	
	1.5 Document approved risk management strategies
	
	
	2.1 Support communication of approved risk management strategies to required personnel
	
	
	2.2 Contribute to monitoring cyber security risk according to selected risk management strategies
	
	
	2.3 Assist in determining compliance with implemented cyber risk mitigation strategies
	
	
	2.4 Address non-compliance within scope of own role and escalate where required according to organisational policies and procedures
	
	
	2.5 Assist in establishing feedback processes that provide warning of potential new risks according to organisational requirements
	
	
	3.1 Identify benchmarks to track effectiveness of risk management strategies
	
	
	3.2 Support evaluation of effectiveness of implemented strategies
	
	
	3.3 Update risk management strategies with new information as required
	
	
	Assessment/evidence gathering conditions
	Each assessment component is recorded as either Competent (C) or Not Yet Competent (NYC). A student can only achieve competence when all assessment components listed under “Purpose of the assessment” section are recorded as competent. Your trainer will give you feedback after the completion of each assessment. A student who is assessed as NYC (Not Yet Competent) is eligible for re-assessment.
	Resources required for this Assessment
	· Computer with relevant software applications and access to internet
· Weekly eLearning notes relevant to the tasks/questions
	Instructions for Students
	
	Please read the following instructions carefully
· This assessment must be completed ☒ In class ☒ At home
· The assessment is to be completed according to the instructions given by your assessor.
· Feedback on each task will be provided to enable you to determine how your work could be improved. You will be provided with feedback on your work within two weeks of the assessment due date. All other feedback will be provided by the end of the term.
· Should you not answer the questions correctly, you will be given feedback on the results and your gaps in knowledge. You will be given another opportunity to demonstrate your knowledge and skills to be deemed competent for this unit of competency. 
· If you are not sure about any aspect of this assessment, please ask for clarification from your assessor.
· Please refer to the College re-assessment for more information (Student handbook).
	
Assessment – Case Study – Report Writing
Case Study Report
Company Description and Network Description
Located in Sydney, Devon Accounting is a medium sized accounting company that offers tools and technologies to prepare all types of tax returns, including individual, sole trader, partnership, trust and company returns. They also provide a broad range of small business accounting services, including bookkeeping, financial statement preparation, tax planning, and advice. 
The company headquarters is located in Sydney in a three-storey building with each floor being approximately 2000 square meters. Business has grown and they have now planned to relocate to a new bigger office. Their business team has grown to 100 staff. The offices have at least 15 wireless access point. Each office has its own local internet connection. 
All connections to the internet are protected by firewalls and network intrusion detection systems. All the workstations have virus-scanning software and a central console is used to push out signature updates. Workstations and servers are generally kept up to date with patches and service packs. The networking staff has employed all the standard security practices one would expect to find at most organisations of this size. 
Although network security is well established in this company, there are still several cyber security vulnerabilities that the company faces on a regular basis, mostly from human-machine interactions. 
For example, a salesperson who frequently holds meetings in a conference room near his office was frustrated by the lack of availablenetwork connections for meeting participants. He decided to pick up an inexpensive wireless access point at his local electronics store and plugged it in. The salesman didn’t consider that the conference room was next to the parking
lot, making the access point available to the public.
Another problem they face is the amount of time it takes for the network administrator to locate infected computers whenever virus strikes throughout the enterprise. It is always a challenge to quickly identify, locate and disable the switch ports of machines infected. It can take up to 45 minutes per workstation for a potential total of 75 hours to locate and identify the infected users. This process usually includes logging into and querying routers and switches; and physically going to the switch to identify the port and trace the wire to the workstation. This process would have been even more difficult if the workstation happened to be in a remote location should the company expand in future. 
This process is unproductive, costly and time consuming. Additionally, it assumes some knowledge of the network architecture. A new network administrator who did not possess knowledge of the network topology would have a much more difficult time locating the infected workstations.
Another serious issue company must address is Cyber security in order to protect its information and digital assets from compromise, theft or loss since Devon Accounting stores commercial assets and personal information on smart phones, computers, hard drives and online. The attack can be from a determined attacker outside, or an insider threat within your business. Devon Accounting could be the victim of hacking because of its online presence.
Devon Accounting has been increasingly using cloud computing for various business processes. Xero is accounting software stored in the cloud and provides integration between the small business’s accounting software and its accounting advisors. Xero have recently become popular a choice of tool at Devon Accounting. Office 365 is another tool used by some of the employees at Devon Accounting
One new management headache created by cloud computing is the fragmentation of where the files are stored. There is no consistency in the storage of these files which are stored on Dropbox, Google Drive, and OneDrive. It is easy to forget where the data is. Backing up all this data from different locations, or moving from one provider to another, is complex and difficult.
The use of mobile devices has increased exponentially and employees at Devon Accounting have taken up these devices enthusiastically because of convenience in the workplace. Employees felt they would get more tasks done on time if allowed to choose their own mobile tools – and even their sceptical bosses felt that the use of these consumer mobile devices in the workplace increases employee productivity.
This concept of 'Bring Your Own Device' (BYOD) - where employees use their personal devices to store business data – opens up new concerns and issues for Devon Accounting. In addition to worries about where exactly the business’s data might be ‘in the cloud’, BYOD means that any small – and easily-lost – device can easily contain vast amounts of relevant business information. Spreadsheets with pricing models, client lists, usernames and access can easily be stored on a mobile device.
Worryingly though, use of personal mobile devices, cloud computing services is not even mentioned in the current IT policy. Mobile devices can be gateways for new viruses, Trojan horses, and other cyber-security problems and currently Devon Accounting is not be well-equipped to address such problems.
Cyber security planning is important for every organisation. Recently, you have been hired by your company to work as a Cyber Security consultant. Security controls at Devon Accounting was implemented 5 years ago. New systems, services and IT equipment have been added into the network since then. If any small or large disaster occurs, it is not prepared to recover itself after the disaster, the result of which is the high possibility that its business processes and functions would be disrupted for a long period of time. This would also result in different kinds of losses to the company.
Your company requires you to research online for the threats present doing business online, review each of the threats present and contribute to the cybersecurity risk management at your company. As part of an IT team, rather than concentrating the attention and energy on doors, locks, and vaults, you must rely on a set of organisational policies, current technology trends and practices, and user education to protect the organisation from cybersecurity attacks that can compromise networks, steal data and other sensitive company information, and harm the entity's reputation. When the volume and intensity of cyber-attacks increase, so does the need for cybersecurity risk management.
You will be required to recognise the organisation's threats and weaknesses, as well as implementing administrative controls and systematic solutions to make sure that your organisation is adequately secured. 
Devon Accounting performs its different functions and business processes with the help of different IT equipment and computer systems. You are told that it mainly wants to implement a Cyber Security plan and implement for its IT system. There is different IT equipment in the company networks such as servers, workstations, printers, and so on. There are also web applications which employees use in their daily operation. 
Current Security Controls:
SWOT analysis was used to identify the risks which led to the implementation of current security controls, and that was developed 5 years ago; since then a lot has changed in the company. 
The security control was implemented by the Network administrator Bill Simmons whose role was to manage the day to day operation of the network. Maintenance and management of IT security was not Bill’s forte. The company at that time chose not to recruit a specialised IT security personnel. The plan was never revisited since and did not include various changes and updates made to the system processes and networking devices over the years.
Furthermore, the current security controls implemented at Devon Accounting only accounts for Password, System Access, Anti-Virus, which also requires looking into. It is very surprising that for a business which deals with financial information of clients does not have any security controls in place for critical security issues such as Wi-Fi access, Software installation, Software Patches, Social Media, Email, Cloud Computing Services and Storage, Remote access, external devices etc.
With the increase of employee numbers and relocation, company director Andrew Jacobs is concerned about the IT security of the system in place and the protection of customer data stored on the system and server. 
With this and the recent reports on threats to the systems of companies worldwide, the Director together with the company's CEO, are more aware of having a IT Security controls in place. 
To address all issues the company has appointed you as an IT Security consultant, your primary role is to understand the system and processes of the company. For this case study, your Facilitator will act as an IT Manager who will provide you with the required information regarding different IT equipment, operations and business processes of the company.
You must consult your IT Manager (your facilitator) regarding the progress of each stage during IT Security planning process. 
Network diagram for the organisation is shown below. This diagram is essential for understanding how the network works and what changes are possible in it.
Network diagram for the organisation is shown below. This diagram is essential for understanding how the network works and what changes are possible in it.
Your organisational policies and procedures recommend you follow a numberof industry standards, legislation, practices and risk management strategies to manage cybersecurity risks. Such as but not limited to the following: 
1. Standard ISO27035
2. National Institute of Standards and Technology (NIST)
3. European Union Agency for Network and Information
4. Security (ENSISA)
5. Information Security Forum (ISF)
6. Standards for Information Assurance for Small to Medium
7. Enterprises Consortium (IASME)
8. National Cyber Security Centre - Australia (NCSC)
One of the main recommendations is to follow ISO/IEC 27001 standards. 
The ISO 27001 standard specifies five main pillars for managing cybersecurity risk, as well as seven steps for conducting a risk assessment:
1. Risk identification/ Identifying Risks
2. Vulnerability reduction/ Reduced vulnerability
3. Threat reduction/ lowering of the risk
4. Consequence mitigation/ Consequence reduction
5. Enable cybersecurity outcome/ Allow for a successful cybersecurity outcome
6. Enable cybersecurity outcome/ Allow for a successful cybersecurity outcome
ISO 27001 allows the organisation to specify the risk acceptance requirements and the criteria for conducting information security risk assessments as follows (in Clause 6.1.2):
1. Identify risks associated with the loss of confidentiality, availability and integrity of information within the scope of the information security management system (ISMS) (6.1.2.c.1);
2. Identify the risk owners (6.1.2.c.2);
3. Assess the consequences that may result if an identified risk materialises (6.1.2.d.1);
4. Assess the likelihood of that risk occurring (6.1.2.d.2);
5. Determine the levels of risk (6.1.2.d.3);
6. Compare the results of the analysis against the risk criteria (6.1.2.e.1);
7. Prioritise the risks for treatment (6.1.2.e.2).
You will be required to consider introducing new cyber-defence technologies that go beyond IT protection and concentrate on detecting social engineering and phishing, supply chain management, IoT security, and preserving the network's "root of trust."
(Appendix 1): Please see below the memorandum sent by email from the Company’s Director.
Memorandum – Devon Accounting Sydney Office
To: Staff
From: Director Andre Jacobs
Re: Cyber Security Issues and Requirements 
Dear all 
As you probably already know, the new Devon Accounting office is being relocated. 
With this change of location and thinking about the greater security of our current and prospective customers, the company's steering committee decided to hire an IT cyber security consultant. 
This hiring aims at the best structure of our security systems so that we can protect the data with customers, employees and all our database. 
This decision was also made, after realizing some issues which needed to be investigated our system and procedures, such as: 
1. Data loss during a recent malware attack on the company’s network which affected the company economically
2. Some of the operating systems used by staff are old and difficult to get support (Application and Operating Systems Patches)
3. Some of the staff are given remote access to but no monitoring is done, and no controls are in place (Remote access controls)
4. Staff have been receiving too many spams and malicious mails (Email filter and web content)
5. Network services such as printing and scanning down frequently due to Server issues (capacity and networking equipment)
6. Several laptops have gone missing from the office (Physical Security)
7. An occurrence of black out due to storm resulted in the whole systems to go offline resulting in productivity loss which was severe to the company (UPS) 
8. Staff has been using easy to remember passwords and there have also been instances where a staff had written the password in a sticky note and placed it in the computer screen. Staff are also not locking their workstation in their lunch break. Serious issues can arise when the staff involved is responsible for processing payments and invoices (Password policies and authentications).
9. IT department is having difficulties dealing with issues relating virus, worms, and malware. Staff are using their personal USB in company’s workstation and accessing external websites which may have contained malicious codes (Firewall updates)
10. Some staff also access company’s network and Intranet via wireless devices. Staff are not happy about the speed being too slow or taking too long for the information to download (Wireless security and wireless access points)
11. Employees are using their personal wireless devices to store business data.
12. One new management headache created by cloud computing is the fragmentation of the files stored. There is no consistency in the storage of these files. Files are stored on Dropbox, Google Drive, or OneDrive. Backing up all this data from different locations, has become complex and difficult.
13. Critical cyber risk management strategies and response not updated for more than 5 years
Besides these key points, the company's management is concerned with possible data breaches caused by employees who normally access data from their mobile devices or remotely. 
For these and other reasons, it is critical that we review our current security policies and prepare a detailed security plan and investigate what actions and measures can be taken. 
We count on the collaboration of all during this process to assist IT security consultant to conduct a security analysis and recommendation on the controls to be implemented.
Regards, 
AJ. 
Bill Simmons responsibilities (Appendix 2):
Responsibilities included:
· installing and configuring computer networks and systems
· identifying and solving any problems that arise with computer networks and systems
· budgeting for equipment and assembly costs
· assembling new systems
· maintaining existing software and hardware and upgrading any that have become obsolete
· monitoring computer networks and systems to identify how performance can be improved
· working with IT support personnel
· providing network administration and support
· Support recommended strategies for risk management that reduce cybersecurity risk
· Help develop effective cybersecurity response options in line with organisational policies and procedures
· Implement risk management strategies in risk response
· Contribute to cybersecurity risk assessment in compliance with defined risk management techniques
· Help in the assessment of Cyber risk reduction strategies implemented
· Address non-compliance in accordance with organisational policies, procedures and scope as required
· Evaluate and update the risk management techniques implemented
Current Cyber Security Controls (Appendix 3):
Below are the details of security controls implemented by Bill Simmons at Devon Accounting 5 years ago.
	Security Controls
	Description / Issues
	Security Control in Place
	Update Required
	Password
	Password chosen by staff are weak. Not secure and do not use multi factor authentication where possible. Passwords and not changed regularly and is shared among other users.
	Yes
	Yes
	System Access
	Access privileges are not properly implemented
	Yes
	Yes
	Secure Wi-Fi & Devices
	Employees are able to use company and public wireless network on the company’s devices. 
	No
	Yes
	Legitimate Software
	Staff are allowed to download and install software of their choice
	No
	Yes
	Patches and Anti-Virus
	Anti-Virus software is very old 
	Yes
	Yes
	‘Clean’ devices
	Staff are allowed to use personal USB or external hard drives on company’s PC’s.
	No
	Yes
	Social Media
	Staff are allowed to access social media sites such as Facebook, YouTube, Twitter, Instagram on company’s network
	No
	Yes
	Email
	Staff have been receiving too many spams and junk mails which is clogging up the network
	No
	Yes
	Cloud Computing Services and Storage
	Company use Accounting cloud-based application Xero, Office 365. Back up for cloud storage has become an issue.
	No
	Yes
	Remote Access
	Staff are given remote access to but no monitoring is done, and no controls arein place
	No
	Yes
T-1.8.1_v3
Cyber Security Requirements - Assessment I v.2, Last updated on 20/08/2023	Page 1
Current Asset Register (Appendix 4):
PC’s and Laptop
	PC
	Qty
	Operating system (OS)
	Central processing unit (CPU)
	Memory
	MS Office version
	Anti-Virus
	Other licenced software
	Purchase date
	Warranty
	Exp. Life (years)
	Replacement Yr.
	HP 24-F0130A 23.8-inch All-in-One
	10
	Windows 7
	Core i3, 8130U
	8GB
	Office 2013
	AVG
	OneDrive; Junos Pulse 5; Skype, Text pad, MYOB
	Jun-18
	3 years
	3
	2021
	HP Pavilion 590-P0082A
	10
	Windows 10
	Core i7 8700
	16GB
	Office 365
	Avast
	Microsoft Project, Cyberlink Director, VLC Player, Skype, Winzip, MYOB
	Aug-18
	3 years
	3
	2021
	Lenovo IdeaCentre 510S-02
	10
	Windows 10
	Core i5
	8GB
	Office 2013
	Norton
	Microsoft Project, Cyberlink Director, Sticky Note, Skype, Winrar, MYOB
	Jan-16
	3 year
	3
	2019
	Inspiron Small Desktop
	10
	Windows 7 Pro
	Intel® Core™ i5 9400
	8GB
	Office 2013
	Norton
	Microsoft Visio, Norton Sticky Note, Skype, Winzip, MYOB
	Jan-16
	3 year
	3
	2019
	Vostro Small Desktop
	15
	Windows 10
	ntel® Core™ i3-9100
	8GB DDR4
	Office 365
	Avast
	7-Zip, Adobe Reader, Google Chrome, Media Player Classic, MYOB
	Jan-16
	3 year
	3
	2019
	Lenovo IdeaCentre 510
	15
	Windows 10
	Intel Core i5-8400
	8GB
	Office 365
	Avast
	7-Zip, Adobe Reader, Google Chrome, Media Player Classic, MYOB
	June-19
	2 year
	2
	2021
	LenovoThinkPad E590
	20
	Windows 10 Pro
	Intel® Core™ i7
	16GB
	Office 365
	Avast
	7-Zip, Adobe Reader, Google Chrome, Media Player Classic, MYOB
	June-19
	2 year
	2
	2021
	27inch iMac with Retina 5K display
	10
	macOS Catalina
	3.0GHz 6-core eighth-generation
	8GB
	Google Docs
	Scan Gaurd
	Final Cut Pro X, Safari, iTunes, Photo Booth, Siri, iMovie
	June-18
	3 year
	3
	2021
Infrastructure Devices
	Device type
	Qty
	Device name
	Owner/Location
	Brand
	Model
	CPU
	Memory
	IP Address
	Server
	2
	Server01
	On the rack in server room
	Dell
	PowerEdge T100 II
	Intel(R) Xeon(R) CPU E5-2630 v3, 32
	128GB DDR4 RAM
	192.168.1.10 - 192.168.1.11
	Server
	2
	Server02
	On the rack in server room
	HP
	ML350 Gen10
	Intel Xeon-S 4110 8-Core (2.10GHz 11MB L3 Cache) Kit
	16GB
	192.168.1.12 - 192.168.1.13
UPS
	Device type
	Model
	Qty
	Output Power Capacity
	Max Configurable Power
	Battery Type
	Typical recharge time
	Standard Warranty
	UPS
	APC SMC1000I SMART-UPS C 1000VA LCD 230V
	2
	600 Watts / 1000 VA
	600 Watts / 1000 VA
	Maintenance-free sealed Lead-Acid battery with suspended electrolyte: leakproof
	3 hour(s)
	2 years
Switches
	Device type
	Model
	Qty
	Switch Ports
	Switching Capacity
	MAC Address Table
	Forwarding Rate
	Switch
	S3900-48T4S, Stackable Managed Switch with 4 10Gb SFP+ Uplinks
	2
	48x 100/1000BASE-T, 4x 10GE SFP+ Ports
	176 Gbps
	16K
	130 Mpps
	Switch
	8-Port Gigabit PoE+ Managed Switch 
	5
	8 RJ45 Ports & 2 SFP Ports, 2 SFP, 150W
	20 Gbps
	8K
	15 Mpps
	Switch
	24-Port Gigabit PoE+ Managed Switch 
	2
	24 RJ45 Ports & 4 SFP Ports, 4 SFP, 400W
	56 Gbps
	8K
	42 Mpps
Router
	Device Type
	Model
	Quantity
	Interface
	Antenna Type
	Wireless Standard
	Wireless Speed
	Wireless
Security
	Wireless Features
	Firewall
	Router
	AC1200 Wireless Dual Band Gigabit Router
	1
	4 10/100/1000Mbps LAN Ports
1 10/100/1000Mbps WAN Port
2 USB 2.0 Ports
	2 dual band detachable antennas (RP-SMA)
	IEEE 802.11ac/n/a 5GHz
IEEE 802.11n/g/b 2.4GHz
	5GHz: Up to 867Mbps
2.4GHz: Up to 300Mbps
	64/128-bit WEP, WPA / WPA2, WPA-PSK/ WPA2-PSK encryption
	Enable/Disable Wireless Radio, WDS Bridge, WMM, Wireless Statistics
	DoS, SPI Firewall
IP Address Filter/MAC Address Filter/Domain Filter
IP and MAC Address Binding
Printers, Scanner, and Copier
	Device Type
	Model
	Quantity
	Memory Standard
	Connectivity
	Operation
	Protocol
	Security Protocol
	Wi-Fi Standard
	Multifunctional Printer
	Fuji Xerox DocuPrint CM405 df
	5
	512MB/1024MB
	10/100/1000Base-T Ethernet, USB 2.0, Optional external wireless
	Microsoft Windows XP (32 / 64 Bit), Server 2003 (32 / 64 Bit) Vista (32 / 64 Bit), Server 2008 (32 / 64 Bit) Server 2008 R2 (32 / 64 Bit), Windows 7 (32 / 64 Bit) Mac OS X 10.3.9, 10.4, 10.5, 10.6 Red Hat Enterprise Linux 5/6 (x86) SUSE Linux Enterprise Desktop 10/11 (x86)
	IPV4/IPV6, DHCP, BOOTP, RARP, AutoIP, TCP/IP (LPD, Port9100, WSD†† , HTTP, HTTPS, SMTP, WINS, FTP, Telnet, DNS, DDNS, IPP, SNTP, POP3, SMB, NetBEUI), SNMP, Bonjour ®(mDNS), IPsec, LDAP, Kerberos, 802.1x(Wired)
	64(40-bit key) / 128(104-bit key) WEP, WPA-PSK (TKIP, AES) WPA2-PSK (AES)
	IEEE802.11b/g/n
Backup Drive
	Device Type
	Model
	Qty
	Memory 
	CPU
	Networking Protocol
	Security
	External Ports
	Supported RAID Type
	Backup Drive
	Synology DiskStation 5-Bay 3.5" Diskless 2xGbE NAS, Black, DS1019+
	5
	4 GB DDR3L Non-ECC SO-DIMM x 2
	Intel Celeron J3455 quad-core 1.5GHz, burst up to 2.3GHz
	SMB, AFP, NFS, FTP, WebDAV, CalDAV, iSCSI, Telnet, SSH, SNMP, VPN (PPTP, OpenVPN ™, L2TP)
	Firewall, encryption shared folder, SMB encryption, FTP over SSL/TLS, SFTP, rsync over SSH, login autoblock, Let's Encrypt support, HTTPS (customizable cipher suite)
	• 2 x USB 3.0 port 
• 1 x eSATA port
	Synology Hybrid RAID (SHR), Basic, JBOD, RAID 0, RAID 1, RAID 5, RAID 6, RAID 10
Wireless Access Point
	Device Type
	Model
	Qty
	Interface
	Antenna Type
	Wireless Standard
	Wireless Speed
	Wireless
Security
	Wireless Features
	Wireless Access Point
	AC1200 Wireless Dual Band Gigabit Ceiling Mount Access Point
	15
	Gigabit Ethernet (RJ-45) Port *1(Support IEEE802.3at PoE)
Console Port *1
	Internal Omni
2.4GHz: 2* 5dBi
5GHz: 2*6dBi
	IEEE 802.11ac/n/g/b/a
	5GHz:Up to 867Mbps
2.4GHz:Up to 300Mbps
	Captive Portal, Authentication
Access Control
Wireless Mac Address Filtering
Wireless Isolation Between Clients
SSID to VLAN Mapping
Rogue AP Detection
802.1X Support
64/128/152-bit WEP / WPA / WPA2-Enterprise,
WPA-PSK / WPA2-PSK
	Multiple SSIDs (Up to 16 SSIDs, 8 for each band)
Enable/Disable Wireless Radio
Automatic Channel Assignment
Transmit Power Control (Adjust Transmit Power on dBm)
QoS(WMM), Airtime Fairness, Beamforming
Band Steering, Load Balance
Rate Limit, Reboot Schedule, Wireless Schedule, Wireless Statistics based on SSID/AP/Client
Smartphones
	Device Type
	Model
	Quantity
	Processor
	Memory
	OS
	Connectivity
	Smartphone
	Samsung Galaxy Note 9
	25
	CPU Speed
2.7GHz, 1.7GHz
CPU Type
Octa-Core
	Card slot
microSD, up to 1 TB (uses shared SIM slot) - dual SIM model only
Internal
128GB 6GB RAM, 512GB 8GB RAM
	Android 8.1 (Oreo), upgradable to Android 9.0 (Pie); One UI
	WLAN	
Wi-Fi 802.11 a/b/g/n/ac, dual-band, Wi-Fi Direct, hotspot
Microsoft Surface Tablet
	Device Type
	Model
	Quantity
	Processor
	Memory
	Software
	Security
	Wireless
	Network
	Microsoft Surface Tablet
	Surface Pro
	15
	Intel® Core™ 7th-generation m3, i5 or i7
	4GB, 8GB or 16GB RAM
	Windows 10 Pro (i5,i7)
Windows 10 Home (m3)
Office 30-day trial
	TPM chip for enterprise security
Enterprise-grade protection with Windows Hello face sign-in
	Wi-Fi: IEEE 802.11 a/b/g/n/ac compatible
Bluetooth Wireless 4.1 technology
	4G LTE Cat 9 modem up to 450Mbps
GPS / GLONASS: Standalone and Assisted GNSS, accuracy up to 3 meters
Nano SIM Tray and Embedded SIM (eSIM)
4G
Firewall
	Device Type
	Model
	Qty
	Standards
	Network Protocols
	Firewall
	Access Control
	Certificates
	Encryption
	Firewall
	Cisco RV220W Network Security Firewall Data Sheet
	1
	IEEE 802.11n, 802.11g, 802.11b,
802.3, 802.3u
802.1X (security authentication)
802.1Q (VLAN)
802.11i (Wi-Fi Protected Access [WPA2] security)
802.11e (wireless quality of service [QoS])
IPv4 (RFC 791), IPv6 (RFC 2460)
Routing Information Protocol (RIP) v1 (RFC 1058), RIP v2 (RFC 1723)
	Dynamic Host Configuration Protocol (DHCP) server, DHCP relay agent
Static IP
Point-to-Point Protocol over Ethernet (PPPoE)
Point-to-Point Tunneling Protocol (PPTP)
Layer 2 Tunneling Protocol (L2TP)
Spanning Tree Protocol (STP)
Dynamic DNS (DDNS) (DynDNS, TZO)
	Stateful packet inspection (SPI) firewall, firewall rules
	MAC-based access control, IP/MAC binding, wireless profiles
	X.509v3 certificates, certificate upload using PEM format
	Data Encryption Standard (DES), Triple Data Encryption Standard (3DES) and Advanced Encryption Standard (AES) encryption (128, 192, 256-bit)
Telephone System
	Device Type
	Model
	Qty
	Phone Features
	Interface
	Network and security
	Telephone System
	Yealink SIP-T41S
	100
	6 VoIP accounts
One-touch speed dial, redial
Call forward, call waiting
Call transfer, call hold
Call return, group listening
3-way conference call
Dial Plan, XML Browser, Action URL/URI
USB port (2.0 compliant)
 Bluetooth earphone through BT40,
 Wi-Fi through WF40,
	2 x RJ45 10/100M Ethernet ports
Power over Ethernet (IEEE 802.3af), Class 2
1 x USB port (2.0 compliant)
1 x RJ9 (4P4C) handset port
1 x RJ9 (4P4C) headset port
1 x RJ12 (6P6C) EHS port
	SIP v1 (RFC2543), v2 (RFC3261)
Call server redundancy supported
NAT traversal: STUN mode
Proxy mode and peer-to-peer SIP link mode
IP assignment: static/DHCP
HTTP/HTTPS web server
QoS: 802.1p/Q tagging (VLAN), Layer 3 ToS DSCP , SRTP for voice
Transport Layer Security (TLS)
HTTPS certificate manager
T-1.8.1_v3
Cyber Security Requirements - Assessment I v.2, Last updated on 20/08/2023	Page 16
Threat and Risk Assessment of current asset (Appendix 5):
	Role
	Participant
	System Owner 
	Bill Simmons
	Network Administrator
	Bill Simmons
	Director
	Director Andre Jacobs
Techniques Used
	Technique
	Description
	Risk assessment questionnaire
	The assessment team used a customized version of the self-assessment questionnaire in NIST SP-26 “Security Self-Assessment Guide for Information Technology Systems”. This questionnaire assisted the team in identifying risks.
	Assessment Tools
	The assessment team used several security testing tools to review system configurations and identify vulnerabilities in the application. The tools included NMAP, NESSUS, APPSCAN
	Vulnerability sources
	The team accessed several vulnerability sources to help identify potential vulnerabilities. The sources consulted included: 
· SANS Top 20 (www.sans.org/top20) 
· OWASP Top 10 (www.owasp.org/documentation/topte n.html) 
· NIST I-CAT vulnerability database (HTTP://icat.nist.gov) 
· Microsoft Security Advisories (www.microsoft.com/security) 
	Review of documentation
	The assessment team reviewed system documentation, network diagrams and operational manuals.
	Interviews
	Interviews were conducted to validate information.
	Site visit
	The team conducted a site visits and reviewed physical access and environmental controls
	
In determining risks associated with the for Devon Accounting, the team utilized the following model for classifying risk:
Risk = Threat Likelihood x Magnitude of Impact
	Impact 
	Definition
	High
	The loss of confidentiality, integrity, or availability could be expected to have a severe or catastrophic adverse effect on organizational operations, organizational assets, or individuals. 
Examples: 
· A severe degradation in or loss of mission capability to an extent and duration that the organization is not able to perform one or more of its primary functions 
· Major damage to organizational assets 
· Major financial loss 
· Severe or catastrophic harm to individuals involving loss of life or serious life-threatening injuries.
	Medium
	The loss of confidentiality, integrity, or availability could be expected to have a serious adverse effect on organizational operations, organizational assets, or individuals. 
· Significant degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is significantly reduced 
· Significant damage to organizational assets 
· Significant financial loss 
· Significant harm to individuals that does not involve loss of life or serious life-threatening injuries.
	Low
	The loss of confidentiality, integrity, or availability could be expected to have a limited adverse effect on organizational operations, organizational assets, or individuals. 
Examples: 
· Degradation in mission capability to an extent and duration that the organization is able to perform its primary functions, but the effectiveness of the functions is noticeably reduced 
· Minor damage to organizational assets 
· Minor financial loss 
· Minor harm to individuals.
	
Industry standards, organisational procedures, and legislative requirements
· The Notifiable Data Breach (NDB) Scheme
https://www.oaic.gov.au/privacy/notifiable-data-breaches/about-the-notifiable-data-breaches-scheme/#:~:text=Under%20the%20Notifiable%20Data%20Breaches,whose%20personal%20information%20is%20involved 
· Privacy Act 1988
T-1.8.1_v3
https://www.oaic.gov.au/privacy/the-privacy-act/ 	
Cyber Security Requirements - Assessment I v.2, Last updated on 20/08/2023	Page 23
	Asset or service
	Business value
	Threat
	Existing controls
	Still existing vulnerabilities/ weaknesses
	Description of Impact
	Impact
	Likelihood
	Risk Rating
	Actions items
	Reviewed
	Server
	High
	Hacking
	User authentication / Locked door
	lack of strong password policy enforcement
	improper use of system resources
	High
	High
	Medium
	check the credential policies (getting credentials and enforcing password policy)
	01/03/2015
	Back up drive
	Medium
	Accidental Data removal / deletion
	Current Backup solution
	Backup/restore not tested
	Data Availability and integrity
	High
	High
	Medium
	Run backup restore tests every x months
	01/06/2015
	Data
	high
	software leaks information which is sensitive
	policy for software development, training, advice on choosing software
	people make errors?
	If sensitive data leaked could be bad for reputation, could be illegal
	High
	High
	Medium
	Training and consequences of illegal actions in policy
	01/09/2015
	Switch/ Router, Printers, Scanner, and Copier, Wireless Access Point, Microsoft Surface Tablet, Firewall, Smart Phones, Telephone Systems
	Medium
	Hardware/Equipment Failure or theft
	Only locked doors
	Locks easy to break
	Failure or malfunction of hardware may cause denial of service to system users. Additionally, hardware configuration may be altered in an unauthorized manner, leading to inadequate configuration control or other situations that may impact the system.
	High
	High
	High
	Implement physical security and CCTV cameras, Alarm systems
	01/03/2016
	Malicious Code
	Medium
	Malicious software such as viruses or worms may be introduced to the system
	Anti-Virus
	Virus definition list not updated
	Damage to the data or software.
	High
	High
	Medium
	Update to latest Anit-Virus. Update virus definition. Update Firewall. Security policy.
	01/16/2016
	Remote Access
	Medium
	Remote OS authentication is enabled but not monitored.
	None
	Remote access is not currently monitored;
	Malicious Use /
Computer Crime / Compromise of confidentiality & integrity data.
	High
	High
	Medium
	Remote Access monitoring software / Disable access when not in use
	01/09/2016
	Login encryption setting is not properly configured.
	
	No login encryption
	
	Unencrypted passwords could be compromised, resulting in compromise of confidentiality & integrity of sensitive data.
	Malicious Use /
Computer Crime / Compromise of confidentiality & integrity data.
	High
	High
	Medium
	Require encryption of passwords but have not been enforced. Physical security should be in place that would limit the ability to sniff the network to exploit this vulnerability.
	01/09/2016
T-1.8.1_v3
	
Cyber Security Requirements - Assessment I v.2, Last updated on 20/08/2023	Page 25
Project Overview
Your task is to prepare a comprehensive report for Devon Accounting, which must encompass the following cyber security planning and requirement measures.
· Analysis of Cyber security requirements for the business
· Evaluating and Implementing Cyber Security Controls
· Improve and maintain the security
· Develop, manage and monitor cybersecurity risk management strategies
Your supervisor will provide assistance and feedback throughout the various stages of this report.Report Requirement:
· Microsoft Word
· Single spaced, 11 pt. Arial
· Cover Sheet with all the information and signed
· Page number in the footer at the bottom right corner
· Table of contents 
· Provide references where applicable
Table of Contents
1. Introduction
2. Asset Register
3. Threat and Risk Assessment of current asset
4. Cyber Security Requirements of current asset
5. Current Cyber Security Controls
6. Identify Cyber Security Gaps
7. New Cyber Security controls to address the gaps
8. Feedback on the Cyber Security controls 
9. Sign off Form for Implementation
10. Cyber Security Implementation and Testing
11. New Assets
12. New Asset threat and risk assessment
13. Identify Cyber Security Gaps on new assets
14. Develop critical cyber risk management strategies and response
15. Critical cyber risk compliance
16. Monitor and benchmark critical cyber risk management strategies 
17. Implement and document new cyber security controls to address cyber security gaps 
18. Evaluate and Update risk management strategies
19. Conclusions
20. Reference
Marking Scale
	
	Topics
	Marks allocated
	1
	Introduction
	/2
	2
	Asset Register
	/2
	3
	Threat and Risk Assessment of current asset
	/2
	4
	Cyber Security Requirements of current asset
	/2
	5
	Current Cyber Security Controls
	/2
	6
	Identify Cyber Security Gaps
	/3
	7
	New Cyber Security controls to address the gaps
	/3
	8
	Feedback on the Cyber Security controls 
	/2
	9
	Sign off Form for Implementation
	/2
	10
	Cyber Security Implementation and Testing
	/3
	11
	New Assets
	/2
	12
	New Asset threat and risk assessment
	/2
	13
	Identify Cyber Security Gaps on new assets
	/3
	14
	Develop critical cyber risk management strategies and response
	/4
	15
	Critical cyber risk compliance
	/3
	16
	Monitor and benchmark critical cyber risk management strategies
	/4
	17
	Implement and document new cyber security controls to address cyber security gaps 
	/3
	18
	Evaluate and Update risk management strategies
	/2
	19
	Conclusions
	/2
	20
	Reference
	/2
	TOTAL
	/50
1. Introduction
Devon Accounting is a mid-sized firm based in Sydney, Australia. They provide a range of tools and technologies for businesses. The company utilizes a cloud storage system to house all their software and essential tools, which they share with their client companies and offer services online. However, they lack a dedicated cybersecurity framework to safeguard their data, making them vulnerable to data breaches and cyber-attacks due to weaknesses in their system. Issues with workstations and other elements that are not addressed promptly could also pose risks. The company needs a robust security system along with a thorough threat analysis and mitigation strategy. This report outlines the threats and asset risk management, including asset registers, threat and risk assessments, current asset requirements, cybersecurity controls, existing cybersecurity gaps, proposed new controls to address these gaps, feedback on current cybersecurity measures, additional assets, and strategies for implementation. It aims to help Devon Accounting enhance their system and secure their data effectively. 
2. Asset Register
Understanding the assets is crucial for identifying vulnerabilities and assessing the organisation's network. Below is a comprehensive list of the assets and software within the company for a thorough analysis:
· HP 24-F0130A 23.8-inch All-in-One
· HP Pavilion 590-P0082A
· Lenovo IdeaCentre 510S-02
· Inspiron Small Desktop
· Vostro Small Desktop
· Lenovo IdeaCentre 510
· Lenovo ThinkPad E590
· 27-inch iMac with Retina 5K display
· Servers
· UPS (Uninterruptible Power Supply)
· Switches
· Routers
· Printers
· Backup Drive
· Wireless Access Point
· Smartphones
· Microsoft Surface Tablet
· Firewall
· Telephone system
3. Threat and Risk Assessment of current asset
Risk management is closely linked with asset management and identification. Routers and workstations, for instance, could be unsecured and identified as potential threats during the analysis process. The risk assessment was conducted by system owner Bill Simmons and Director Andre Jacobs. Below are the details of the company’s risk assessment:
· Risk Assessment Questionnaire: They have customized their risk assessment tools to assist the team in identifying potential risks.
· Assessment Tools: Multiple security tools, such as NMAP, NESSUS, and APPSCAN, were utilized to detect vulnerabilities and assess system configurations.
· Vulnerability Sources: Various sources were consulted to identify vulnerabilities, including:
· SANS Top 20 (www.sans.org/top20)
· OWASP Top 10 (www.owasp.org/documentation/topten.html)
· NIST I-CAT Vulnerability Database (HTTP://icat.nist.gov)
· Microsoft Security Advisories (www.microsoft.com/security)
· Documentation Review: System diagrams, operational manuals, and other documentation were reviewed for guidelines and assessment purposes.
· Interviews: Information was validated through discussions and interviews conducted within the company.
· Site Visit: The team performed physical visits to assess environmental controls.
· Risk Classification: Risks were classified and prioritized using the formula:
· Risk = Threat Likelihood X Magnitude of Impact
4. Cyber Security Requirements of current asset
Based on the asset list, the following practices can be adopted to mitigate cybersecurity risks in the organisation:
Designate a Cybersecurity Leader
Appoint a dedicated individual responsible for overseeing cybersecurity. This person will manage security policies, ensure compliance with best practices, and coordinate responses to potential threats.
Inventory Organizational Data, Assets, and Processes
Maintain a comprehensive inventory of all organizational data, assets, and processes. This includes cataloging hardware (e.g., servers, workstations, routers), software (e.g., backup drives, operating systems), and operational processes to ensure all components are accounted for and protected.
Perform Regular Risk Assessments
Conduct periodic risk assessments to identify and evaluate potential vulnerabilities within the organization's systems and processes. This helps in understanding emerging threats and implementing necessary changes to mitigate risks.
Implement Risk-Reducing Controls
Apply security controls to minimize identified risks. This could include deploying firewalls, implementing encryption, setting up access controls, and ensuring regular software updates and patch management.
Incorporate Cybersecurity into Operational Processes
Integrate cybersecurity measures into the organization's daily operations. This includes embedding security practices into workflows, training staff on security awareness, and regularly reviewing and updating security policies and procedures to adapt to new threats.
Current Cyber Security Controls
Based on the threat and risk assessment of current assets, the cybersecurity requirements for those assets have been identified. This section outlines the security controls that need to be implemented to address these requirements. Some recommended examples include:
Secure Wi-Fi and Other Devices: Ensure that all Wi-Fi networks and connected devices are secured using strong encryption protocols (e.g., WPA3) and robust authentication methods to prevent unauthorized access.
Clean Devices: Implement regular cleaning protocols for devices to remove unnecessary files, malware, and potential vulnerabilities. This includes running anti-virus scans and ensuring that devices are free from malicious software.
Social Media Restrictions: Establish policies to limit the use of social media on company devices to reduce the risk of phishing attacks and data leaks. Educate employees about the risks associated with social media use.
Cloud Computing Services and Storage: Use secure cloud services with strong encryption and access controls for storing and managing organizational data. Ensure that cloud providers comply with industry standards and regulations.Passwords: Enforce strong password policies, including complexity requirements and regular updates. Implement multi-factor authentication (MFA) to enhance security for accessing sensitive systems and data.
Email: Deploy email security measures such as spam filters, phishing protection, and encryption to safeguard against email-based threats. Educate employees about recognizing and handling suspicious emails.
Patches and Anti-Viruses: Ensure that all systems and software are regularly updated with the latest patches to fix vulnerabilities. 
System Access Control and Privileges: Implement strict access control measures to ensure that only authorized personnel have access to specific systems and data. Regularly review and update user privileges based on their roles.
Legitimate Software: Verify that all software used within the organization is licensed and obtained from legitimate sources. Avoid using unauthorized or pirated software that could introduce security risks.
Remote Access of Workstations and Other Devices: Secure remote access by using VPNs and strong authentication mechanisms. Ensure that remote connections are monitored and managed to prevent unauthorized access and data breaches.
5. Current Cyber Security Controls
Based on the threat and risk assessment of current assets, the cybersecurity requirements for those assets have been identified. This section outlines the security controls that need to be implemented to address these requirements. Some recommended examples include:
· Secure Wi-Fi and Other Devices: Ensure that all Wi-Fi networks and connected devices are secured using strong encryption protocols (e.g., WPA3) and robust authentication methods to prevent unauthorized access.
· Clean Devices: Implement regular cleaning protocols for devices to remove unnecessary files, malware, and potential vulnerabilities. This includes running anti-virus scans and ensuring that devices are free from malicious software.
· Social Media Restrictions: Establish policies to limit the use of social media on company devices to reduce the risk of phishing attacks and data leaks. Educate employees about the risks associated with social media use.
· Cloud Computing Services and Storage: Use secure cloud services with strong encryption and access controls for storing and managing organizational data. Ensure that cloud providers comply with industry standards and regulations.
· Passwords: Enforce strong password policies, including complexity requirements and regular updates. Implement multi-factor authentication (MFA) to enhance security for accessing sensitive systems and data.
· Email: Deploy email security measures such as spam filters, phishing protection, and encryption to safeguard against email-based threats. Educate employees about recognizing and handling suspicious emails.
· Patches and Anti-Viruses: Ensure that all systems and software are regularly updated with the latest patches to fix vulnerabilities. Install and maintain up-to-date anti-virus and anti-malware software to detect and mitigate threats.
· System Access Control and Privileges: Implement strict access control measures to ensure that only authorized personnel have access to specific systems and data. Regularly review and update user privileges based on their roles.
· Legitimate Software: Verify that all software used within the organization is licensed and obtained from legitimate sources. Avoid using unauthorized or pirated software that could introduce security risks.
· Remote Access of Workstations and Other Devices: Secure remote access by using VPNs and strong authentication mechanisms. Ensure that remote connections are monitored and managed to prevent unauthorised access and data breaches.
· 6. Identify Cyber Security Gaps
The following gaps have been identified in the company's procedures:
· Lack of an IT Specialist: The company does not employ an IT specialist responsible for managing IT operations and security. This absence hampers the ability to effectively oversee and address IT-related issues and vulnerabilities.
· Outdated Systems: The system has not been updated or maintained since its initial implementation. This neglect increases the risk of security vulnerabilities and performance issues due to outdated software and hardware.
· Inadequate Passwords and Security Measures: The company’s passwords, system access controls, and anti-virus solutions are outdated and need to be updated to enhance their effectiveness and security.
· Absence of Security Controls: There are no established security controls in place for critical areas such as:
· Wi-Fi Access: Lack of secure Wi-Fi protocols and access management.
· Software Patches: No regular updates or patch management for software vulnerabilities.
· Software Installation: Unregulated installation of software could introduce risks.
· Email Security: No measures to protect against email-based threats.
· Social Media Use: No restrictions or guidelines for social media use that might impact security.
· Cloud Computing: Insufficient controls for cloud storage and computing services.
· Remote Access: Lack of secure practices for remote access to systems and devices.
· External Devices: No protocols for managing and securing external devices connected to the network.
· Addressing these gaps is crucial for improving the company’s overall cybersecurity posture and ensuring better protection of its assets and data.
7. New Cyber Security controls to address the gaps
The following gaps should be addressed immediately to enhance the company's cyber security measures:
· Hire an IT Specialist: The company should recruit an IT specialist responsible for managing software configurations and ensuring that all systems are regularly updated with the latest security patches and settings.
· Update Workstation Passwords: All workstations within the company should be updated with new, strong passwords to improve security and prevent unauthorized access.
· Improve Device Security: Conduct thorough checks on all devices to identify and address potential vulnerabilities and risks. This includes applying necessary improvements to mitigate any identified threats.
· Update Anti-Virus Software: Review and update existing anti-virus solutions, or consider replacing them with the latest anti-virus tools designed to protect against modern threats and attacks.
· Secure Network Infrastructure: Ensure that Wi-Fi devices, routers, and switches are properly secured. Maintain and update firewalls to align with current devices and settings to safeguard against potential network breaches.
8. Feedback on the Cyber Security controls 
	Feedback from Supervisor
	Current Assets
	Threats and Risks Identified
	Cybersecurity Gaps
	New Cybersecurity Controls
	Update of PC and Laptops
	Feedback
	PCs and Laptops
	Weak passwords, outdated anti-viruses
	No strong password policies, outdated anti-viruses
	Implement strong password policies, update anti-virus software
	New password policies and anti-virus updates
	Current Situation
	Old passwords, outdated anti-viruses
	Susceptibility to modern cyber attacks
	Lack of robust security measures
	Enhance with advanced security tools and regular updates
	Immediate update required for enhanced security
	Data Breach
	Firewalls and Servers
	Potential for system vulnerabilities and data breaches
	Lack of updated firewalls and server protections
	Update firewalls and apply patches to servers
	Ensure regular firewall updates and server security checks
	Data Integrity and Confidentiality
	Network Routers
	Unauthorized access and vulnerabilities
	Weak access controls and outdated security
	Implement strict network access controls and updates
	Reconfigure routers with enhanced security settings
	Unauthorized Access
	Printers
	Illegal access and misuse
	Unrestricted printer access
	Restrict printer access and implement secure authentication
	Update printer security settings to limit unauthorized use
	Backup and Storage Security
	Backup Drives
	Unauthorized access and data breachesInadequate access controls and outdated backups
	Enhance backup security with encryption and access controls
	Update backup protocols and access permissions
	Wireless Network Security
	Wireless Access Points
	Unauthorized access and outdated security
	Outdated security settings and access controls
	Update wireless security settings and restrict unauthorized access
	Implement the latest security protocols and regular updates
	Smartphones
	Smartphones
	Data breaches and unauthorized use
	Lack of controls on device access
	Restrict access and enforce strong authentication and security policies
	Update security measures and policies for mobile devices
	Calls and Messaging
	Telephone Systems
	Call hacking and unsecured messaging
	Lack of encryption and secure messaging 
	Implement encryption for calls and messages
	Update settings for enhanced communication security
In this table:
· Feedback from Supervisor: Feedback should be incorporated to address specific cybersecurity issues and validate the new controls.
· Current Assets: List of assets like firewalls, servers, network routers, printers, backup drives, wireless access points, smartphones, and telephone systems.
· Threats and Risks Identified: The specific threats and risks associated with each asset, such as unauthorized access, data breaches, and outdated security settings.
· Cybersecurity Gaps: Existing gaps in the cybersecurity measures that need addressing.
· New Cybersecurity Controls: Proposed controls to address the identified gaps, such as updating firewalls, restricting access, and implementing encryption.
· Update Details: Specific actions required to update and enhance the security of each asset.
This structured approach helps in systematically addressing cybersecurity issues and improving overall data protection.
9. Sign off Form for Implementation
Sign-Off Form for Implementation
Project Name:
Date:
Prepared By:
Position:
Supervisor Name:
Supervisor Position:
Feedback Provided:
Supervisor Signature:
Date:
Additional Comments:
Prepared By Signature:
Date:
10. Cyber Security Implementation and Testing
The implementation plan includes the following steps:
1. Incident Management and Disaster Recovery Plan: It is vital to have an Incident Management and Disaster Recovery Plan to mitigate risks from any incident or natural disaster, including pandemics like COVID-19. A robust strategy ensures the restoration of data and IT systems by identifying common scenarios and detailing the required actions and responsible individuals (Walkowski, 2019).
2. Inventory and Manage Third Parties: Identify vendors, distributors, and other third parties with access to your organisation’s data or systems and prioritize them based on the sensitivity of the data. Evaluate high-risk third parties to ensure they have appropriate security measures or implement necessary controls. Maintain an up-to-date list of third-party vendors and regularly monitor their activities.
3. Security Controls Implementation: Address potential threats by implementing security measures tailored to the identified risks. These measures help mitigate or eliminate potential dangers. Adopt both technical controls (e.g., encryption, intrusion detection software, antivirus, firewalls) and non-technical controls (e.g., policies, procedures, physical security, social engineering defenses). For example, establish a Security Policy that encompasses various sub-policies such as backup policy, password policy, and access control policy (Magalhaes, 2020).
11. New Assets
There are following new assets that should be identify with valuable assets:
· PCs or Laptops.
· Firewalls.
· Routers.
12. New Asset threat and risk assessment
Here are the threats and risks associated with the new assets:
· PCs or Laptops: Vulnerable to cyber attacks and data breaches.
· Firewalls: Risks of network breaches and inadequate network monitoring.
· Routers: Risk of unauthorised access to the network and company systems.
13. Identify Cyber Security Gaps on new assets
Here are the gaps identified in the new assets of the company:
· Inconsistency in Cybersecurity Enforcement: Uneven implementation and application of security policies across different assets.
· Insufficient User Awareness Training: Inadequate training programs to educate users on the latest cybersecurity practices and threats.
· Trailing in the Application of New Cybersecurity Technologies: Delays in adopting and integrating advanced cybersecurity technologies and tools.
· Lack of Vulnerability Reporting: Absence of a formal process for identifying and reporting vulnerabilities in new assets.
· Inflexibility in Adaptation After a Breach: Difficulty in swiftly adapting and modifying security measures following a security breach.
· Stagnation in the Application of Key Prevention Techniques: Failure to regularly update and apply essential prevention strategies and techniques. 
· Slower Threat Detection and Response: Reduced effectiveness in identifying and responding to emerging threats in a timely manner (MechDyne, 2020).
14. Develop critical cyber risk management strategies and response
· What risks have you identified and assessed?
· Ransomware Attacks: Risk of data being encrypted and held for ransom.
· Data Breaches: Risk of unauthorized access to and exposure of sensitive information.
· Malware Infections: Risk of malicious software compromising systems and data.
· Insufficient System Updates: Risk of vulnerabilities due to outdated software and firmware.
· What is required to secure the network perimeter?
· Firewalls: Deploy to control and monitor incoming and outgoing network traffic based on security rules.
· Intrusion Prevention Systems (IPS): Implement to detect and prevent identified threats and suspicious activities.
· Email Security Software: Use to protect against phishing attempts and malicious email attachments.
· Antivirus and Anti-malware Software: Install to detect, prevent, and remove malicious software.
· System Updates: Regular updates are crucial for patching vulnerabilities and enhancing security features.
· What access privileges are assigned to protect data and information?
· Role-based Access Control (RBAC): Users are assigned access rights based on their roles and job functions.
· Least Privilege Principle: Users are granted the minimum level of access necessary to perform their duties.
· Periodic Access Reviews: Regularly review and adjust access privileges to ensure they remain appropriate.
· What are the possible consequences of not implementing risk assessment strategies?
· Increased Vulnerability: Greater risk of exploitation due to unaddressed weaknesses.
· Financial Losses: Potential for significant financial damage from data breaches or system outages.
· Reputational Damage: Loss of customer trust and market reputation.
· Regulatory Penalties: Potential fines and legal consequences for non-compliance with data protection regulations.
· What vulnerabilities have you identified and what is their likelihood of occurrence?
· Old Software: High likelihood of exploitation due to known vulnerabilities in outdated applications.
· Weak Passwords: Moderate likelihood, as weak passwords are frequently targeted by attackers.
Lack of Encryption: Moderate likelihood, with unencrypted data being vulnerable to theft and interception.
Risk Management Strategy (Documentation):
	Threats and Risks
	Vulnerabilities
	Assets
	Solutions
	Consequences
	Ransomware
	Old software, weak passwords, lack of encryption
	Laptops, computers, data
	Implement data backup, update antivirus software, enforce strong passwords, use encryption
	Data breaches, financial losses, reputational damage
	Data Breaches
	Weak access controls, outdated software
	Sensitive information
	Enforce role-based access control, update software, implement robust access controls
	Unauthorised access, financial and reputation damage
	Malware Infections
	Inadequate antivirus protection, outdated software
	Computers, network
	Install and update antivirus and anti-malwaresoftware, conduct regular system updates
	System compromise, data loss, operational disruptions
	Insufficient System Updates
	Outdated software, unpatched vulnerabilities
	All systems
	Regularly update all systems and applications
	Increased risk of exploitation, security breaches
15. Critical cyber risk compliance
· There are no non-compliance risks in cyber-attacks that are unmanageable or can be overlooked. All the risks identified in this case study can be mitigated through strategies. However, new risks that may arise during implementation include:
· Phishing Attacks
· Machine Learning and AI Attacks
· IoT Attacks
Inadequate Patch Management
16. Monitor and benchmark critical cyber risk management strategies 
During times like these, benchmarking becomes essential. To make well-informed decisions, the organization needs it. The approach taken will depend on the company's resources and goals. The type of benchmarking used will vary based on the purpose of the gap analysis, such as improving the security posture or meeting regulatory requirements. Usually, a gap analysis against a specific security standard is necessary to achieve or maintain certification. Comparing an organization's current security program to industry standards or security protocols is beneficial. If a security standard is not currently in place, this might be the first step in the process (Evans, 2016).
Benchmarking might also involve examining other companies' actions or adopting industry best practices, but that's not the only option. It is also valuable to tap into the experiences and expertise of others within the same industry. Smaller firms, particularly those with limited resources, can greatly benefit from crowdsourcing knowledge and expertise. Learning from other firms facing similar challenges can provide valuable insights. Ultimately, the goal is to align the security program with widely accepted best practices and standards.
17. Implement and document new cyber security controls to address cyber security gaps 
To protect the network and data from cyber attacks, a set of cyber security policies is essential. Organizations use cyber security controls to identify and manage network data risks. Although new threats and vulnerabilities will continually emerge, having controls in place reduces the overall risk of exposure (Cyber, 2012).
The following security controls can be implemented in the company:
· Continuous Monitoring
· Enable Vendor Access
· Attack Surface Analytics
18. Evaluate and Update risk management strategies
A risk management strategy provides a structured approach to identifying, assessing, and managing risks. It includes a process for regularly updating and revising evaluations based on new information or actions taken. This strategy can be applied by even the smallest groups or projects, or integrated into a more complex approach for large, international organizations.
Risk assessment involves identifying and evaluating potential dangers. To protect your organization, personnel, and assets, understanding areas of uncertainty is crucial, which can be achieved through risk analysis. This process can vary in detail and methods depending on the organization. Often, the Management Committee may not conduct the risk assessment directly if staff or volunteers are more involved in the organization (McGlasson, 2013).
In this company, we have scheduled a committee meeting with the Director and team to plan and review the current strategies. The company has provided a document listing devices and assets with descriptions. We then planned potential risks and their mitigation strategies, documenting these along with a timeline. The action plan commenced following an inspection of devices and an analysis of company assets. After six months, the committee will reconvene to review reports, identify gaps, and update strategies with the latest technologies.
19. Conclusions
The report details the risk assessments, identification, and mitigation plans for the threats and vulnerabilities of Devon Accounting. The company is a mid-sized firm located in Sydney, Australia. Their assets and technologies have numerous gaps and have not been updated or maintained since initial implementation. Employees are using a cloud system, leading to a Bring Your Own Device (BYOD) approach within the organization. The servers, laptops, and computers are equipped with outdated antivirus software that has not been updated for over three years. There is no IT specialist to review security gaps and manage the system. Additionally, there is no system in place to monitor the devices and technology implementations. This report provides effective solutions for the identified risks and outlines implementation strategies. 
20. Reference
Here are the revised references with slightly altered wording:
· Cyber, S. (2012, June 1). Top 10 Cybersecurity Risks for Businesses. Secure CyberDefense. Retrieved from https://securecyberdefense.com/top-10-cybersecurity-risks-for-businesses/
· Evans, M. (2016, November 8). Roadmap to Implementing a Successful Information Security Program. BARRAdvisory. Retrieved from https://www.barradvisory.com/roadmap-to-implementing-a-successful-information-security-program/
· Magalhaes, M. (2020, March 6). Security Gap Analysis: Four-Step Guide to Identify and Address Vulnerabilities. TechGenix. Retrieved from https://techgenix.com/security-gap-analysis/
· McGlasson, L. (2013). New Guidelines: Top 20 Cybersecurity Controls. Bankinfosecurity.com. Retrieved from https://www.bankinfosecurity.com/new-guidelines-top-20-cybersecurity-controls-a-1228
· MechDyne. (2020, April 22). 7 Cybersecurity Gaps That Expose Businesses to Threats (And One Way to Address Them). IT Services. Retrieved from https://www.mechdyne.com/it-services/7-cybersecurity-gaps-and-1-way-to-fix-them/
· Walkowski, D. (2019, August 22). What Are Security Controls? F5 Labs. Retrieved from https://www.f5.com/labs/articles/education/what-are-security-controls#:~:text=Control%20Types&text=Some%20common%20examples%20are%20authentication
Cyber Security Requirements - Assessment I v.2, Last updated on 20/08/2023	Page 41
image1.png
image4.jpeg
image5.jpeg
image6.jpeg
image2.jpeg
image3.jpeg

Mais conteúdos dessa disciplina