Rajan Security A1
Rajan Security A1
INTERNATIONAL SCHOOL OF
MANAGEMENT AND TECHNOLOGY
FACULTY OF COMPUTING
STUDENT DETAILS
STUDENT ID [email protected]
ASSIGNMENT
Managing Network Security for an Organisation
TITLE
ISSUE DATE September 26, 2024 DUE DATE December 17, 2024
ESTIMATED 11718
WORD LENGTH
SUBMISSION
1
Security| Rajan Kha Tharu
1. I declare that:
a) this assignment is entirely my own work, except where I have included fully-
documented references to the work of others,
b) the material contained in this assignment has not previously been submitted for any
other subject at the University or any other educational institution, except as
otherwise permitted,
c) no part of this assignment or product has been submitted by me in another (previous
or current) assessment, except where appropriately referenced, and with prior
permission from the Lecturer / Tutor / Unit Coordinator for this unit.
2. I acknowledge that:
a) if required to do so, I will provide an electronic copy of this assignment to the
assessor;
b) the assessor of this assignment may, for the purpose of assessing this assignment:
I. reproduce this assignment and provide a copy to another member of
academic staff;
II. communicate a copy of this assignment to a plagiarism checking service such
as Plagiarism Check (which may then retain a copy of this assignment on its
database for the purpose of future plagiarism checking).
I am aware of and understand that any breaches to the Academic Code of Conduct
will be investigated and sanctioned in accordance with the College Policy.
2
Security| Rajan Kha Tharu
Contents
Activity 1.....................................................................................................................................................1
Introduction:................................................................................................................................................1
Outline of ESS and Stamford Colleges....................................................................................................1
Types of security risk at Stamford College..................................................................................................1
Implication of Cyber Threats for Education Management.......................................................................3
Importance of Security Procedure Assessment........................................................................................4
Important Elements of the Security Procedure Evaluation......................................................................5
Methods of Assessment...............................................................................................................................5
The Best Methods for Evaluating Security Procedures............................................................................6
Difficulties in Evaluating Security Procedures........................................................................................7
Vital Parts of the Security Procedure Evaluation.....................................................................................7
Assessment Methodologies.........................................................................................................................8
Evaluation of the Security Policy in Place...............................................................................................8
Security Results.........................................................................................................................................10
Benefits of Network Monitoring:...........................................................................................................10
Third-Party VPN Clients and Servers' Features.....................................................................................12
Possible Hazards and Difficulties......................................................................................................12
Improving Network Security.....................................................................................................................13
Demilitarized Zone (DMZ)........................................................................................................................13
A DMZ's essential components include:................................................................................................13
The benefits of a DMZ for network security.........................................................................................13
Static IP.....................................................................................................................................................14
Upgrading Stamford College's Network Security using DMZ, Static IP, and NAT...................................15
Router Configuration.............................................................................................................................15
Static Routing........................................................................................................................................19
Configuration of DHCP inside Network................................................................................................20
DHCP Success.......................................................................................................................................21
Implementing DMZ..............................................................................................................................21
Configuration of firewall...................................................................................................................21
NAT Configuration...............................................................................................................................22
Testing Network Security..........................................................................................................................23
3
Security| Rajan Kha Tharu
4
Security| Rajan Kha Tharu
5
Security| Rajan Kha Tharu
Activity 1
Introduction:
Organizations, like Stamford School, are more vulnerable to IT-related safety threats in the
evolving digital world, such as ransomware attacks, sophisticated malware, and unwelcome
organizational disruptions. These risks pose a serious threat to important records' privacy,
accessibility, and reliability and have the potential to essentially disrupt work. This activity will
provide a more thorough evaluation of the threats that Stamford School is now dealing with,
examine its sophisticated assurance methods in general, and suggest sound countermeasures to
strengthen its virtual and physical defenses. By implementing these practices into training, the
organization can guarantee the constant strength and quality of its IT infrastructure.
Stamford School whose primary areas of review are software engineering and designing is an
instructive foundation with 1500 understudy and 65 staffs. A Virtual Learning Stage (VLP), HR
servers, and an Understudy Data Framework (Sister) are all important for its IT design. In any
case, obsolete advances and unfortunate security techniques made the school vulnerable. This
prompted in a huge ransomware attack in 2020 that caused the deficiency of extremely
significant information, highlighting the need of further developed safety efforts.
6
Security| Rajan Kha Tharu
Malware:
Ransomware, Trojan horses, worms, viruses, and spyware are all considered forms of malicious
software, or malware. These programs are capable of system damage, data theft, and disruption.
Phishing:
Phishing attacks aim to deceive people into disclosing private information, including credit card
numbers or login numbers. These assaults frequently use SMS messages or emails that look to be
from reliable sources.
Ransomware:
Ransomware renders a victim's data unreadable by encrypting it. In order to decode the data, the
attackers then demand a ransom.
DoS attacks flood a system with traffic, preventing authorized users from accessing it.
7
Security| Rajan Kha Tharu
MitM attacks allow the attacker to intercept and alter communications or acquire data between
two parties.
Zero-Day Attacks:
Zero-day attacks take advantage of software flaws that the vendor is unaware of. Due to the lack
of a patch to address the vulnerability, these assaults can be especially risky.
Social Engineering:
Social engineering assaults use psychological tricks to fool victims into clicking on harmful
websites or divulging private information.
Even though we've concentrated on the top eight dangers, it's crucial to comprehend the
fundamentals of cybersecurity.
Insider Threats:
An insider threat is a kind of cyberattack that comes from someone who is employed by a
company or has permission to access its systems or networks. An insider threat could be
malevolent, inadvertent, or deliberate and could come from a current or former employee,
consultant, board member, or business partner.
8
Security| Rajan Kha Tharu
By Implementing robust cybersecurity measures, holding frequent training sessions, and creating
incident response plans are all necessary for educational institutions to reduce these threats and
guarantee the security of both their digital and physical spaces.
Establishing Trust: Clients, partners, and stakeholders can be won over by showcasing a
dedication to security through frequent evaluations. It boosts the organization's credibility
and reputation by assuring them that their data and information are sufficiently protected.
9
Security| Rajan Kha Tharu
Methods of Assessment
There are various approaches that can be applied to the analysis of corporate security protocols:
Quantitative: The procedure gains analytical rigor with the use of quantitative methods.
Dollar values are assigned to risks and assets. Following that, the risk assessment can be
provided in financial manner that board members and executives can comprehend.
Prioritizing mitigation strategies is made possible by cost-benefit analysis.
Qualitative: Qualitative techniques approach risk assessment more journalistically than
quantitative methods, which adopt a scientific approach. Assessors meet with individuals
from many areas of the company. Workers discuss if or how they would complete their
tasks in the event that a system went down. Using this information, assessors classify
hazards into general categories like High, Medium, and Low.
10
Security| Rajan Kha Tharu
11
Security| Rajan Kha Tharu
Danger Distinguishing proof: This includes perceiving the particular dangers that the
association might confront, for example, cyberattacks, insider dangers, and actual breaks.
Understanding the danger scene is fundamental for fitting safety efforts actually.
Evaluation of Existing Measures: Surveying current security controls, like firewalls,
access strategies, encryption conventions, and actual safety efforts, recognizes qualities
12
Security| Rajan Kha Tharu
and shortcomings in the framework. This step guarantees that holes in assurance are
uncovered.
Episode Reaction Plans: Assessing the status and viability of the association's reaction to
security breaks is vital. This incorporates evaluating conventions for identifying,
moderating, and recuperating from episodes.
Administrative Consistence: Guaranteeing that the association complies to significant
regulations, norms, and best practices in network safety and information security is
fundamental. Resistance can bring about legitimate punishments and reputational harm.
Execution of Safety Instruments: Testing and reviewing apparatuses like interruption
discovery frameworks (IDS), firewalls, and antivirus programming guarantees they are
working ideally and are exceptional
Assessment Methodologies
To accomplish viable evaluation of authoritative safety efforts, think about the accompanying
suggested rehearses:
13
Security| Rajan Kha Tharu
To guarantee legal compliance, the policy also needs more precise documentation and
conformity with regulatory standards, such as GDPR. The incident response framework has a
serious flaw in that there is no comprehensive strategy for handling breaches, containment, or
recovery. Additionally, to these holes through improvements in clearness, specialized
arrangements, episode reaction arranging, and partner preparing will significantly fortify
Stamford College’s security pose.
The ongoing approach of Stamford School incorporates the greater part of the significant parts
and shows clear and strong points. A few useful qualities of the gave security strategy include:
Clear and allowable use direction: The approach specifies that the offices presented by
the school, for example, web access and email accounts, ought to be centered around
scholarly reasons.
Disallowance of questionable substance: The arrangement explicitly confines the
creation, review, or transmission of hostile, revolting, or foul things.
14
Security| Rajan Kha Tharu
Advancement of a protected climate: The strategy looks to give a protected and regarded
climate for both staff and understudies.
Client obligation: The arrangement underlines that understudies and clients ought to be
dependable and adhere to the given guidelines to forestall unsatisfactory utilization of the
school organization.
approvals of infringement: The approach plainly characterizes the potential
authorizations in the event of ill-advised utilization of the school organization.
Consistence gauges: The strategy specifies that following admonitions, in the event that
infractions keep on happening, there will be a brief loss of administration, and for
additional outrageous cases, quick suspension.
Security Results
Benefits of Network Monitoring:
Network monitoring includes the tracking and inventory of devices on a network, as well as the
gathering and analysis of network performance data. In order to notify IT of possible issues
almost instantly, live network performance data is monitored and contrasted with historical
averages or preset criteria (Traore, 14 march, 2024).
15
Security| Rajan Kha Tharu
Ceaseless observing recognizes dubious exercises, for example, unapproved access endeavors,
malware diseases, or strange traffic designs. This permits associations to answer rapidly to likely
dangers and moderate dangers before they raise.
Improved Performance:
Network observing guarantees ideal execution by distinguishing and resolving issues like data
transmission bottlenecks, idleness, or equipment disappointments. This prompts smoother
activities and better client encounters.
Observing gives experiences into asset use, like transfer speed and server limit. This empowers
better preparation and assignment, guaranteeing assets are utilized effectively and forestalling
over-burdening.
Numerous enterprises require consistence with administrative norms. Network observing aides
track and log exercises, guaranteeing consistence while improving on announcing for reviews.
Cost Saving:
Proactively recognizing and settling issues forestalls exorbitant margin time and decreases the
requirement for crisis fixes or framework upgrades. It additionally broadens the life expectancy
of organization equipment by guaranteeing ideal use.
Secure communication channels for distant users, partners, or devices are made available to
companies by third-party Virtual Private Network (VPN) clients and servers. In order to preserve
16
Security| Rajan Kha Tharu
secrecy and safeguard data, these services enable encrypted communications via the internet. But
they also bring with them special advantages and difficulties.
17
Security| Rajan Kha Tharu
Configuration errors: Improperly set up third-party VPN clients or servers can increase
risks by exposing the network to illegal access or compromising encryption.
Vendor Lock-In: Reliance on a single supplier could make switching to a different one
difficult, particularly if incompatibilities occur.
Compliance Risks: The provider may violate regulations if their operations don't comply
with data residency rules or regulatory norms.
Performance Problems: A third-party VPN's performance may be impacted by outside
variables like provider server load or geographic distance, which could have an effect on
the user experience.
Allowing an organization to access untrusted networks, like the internet, while maintaining the
security of its private network, or LAN, is the ultimate purpose of a demilitarized zone network.
The DMZ is usually where organizations store resources and services that are visible to the
outside world, along with servers for the Domain Name System (DNS), File Transfer Protocol
(FTP), mail, proxy, Voice over Internet Protocol (VoIP), and web servers.
18
Security| Rajan Kha Tharu
Static IP
An internet protocol address, or IP address, serves as a device's unique identity when connected
to the internet. In the same way that humans use phone numbers to find and communicate with
each other over the phone, computers use IP addresses to find and communicate with each other
on the internet. Geographic location data and the hosting provider are two examples of the
information that may be obtained from an IP address (Gillis, 2021).
19
Security| Rajan Kha Tharu
Upgrading Stamford College's Network Security using DMZ, Static IP, and NAT
Using a Cisco ASA 5505 firewall, the network has been carefully built to protect the college's
digital assets from online attacks. By effectively reducing online threats and adding an extra
layer of network security, this firewall is expertly designed to improve Stamford College's
security posture.
Router Configuration
Router 1
20
Security| Rajan Kha Tharu
21
Security| Rajan Kha Tharu
Router 2
22
Security| Rajan Kha Tharu
23
Security| Rajan Kha Tharu
Static Routing
24
Security| Rajan Kha Tharu
25
Security| Rajan Kha Tharu
DHCP Success
Implementing DMZ
Configuration of firewall
26
Security| Rajan Kha Tharu
NAT Configuration
27
Security| Rajan Kha Tharu
28
Security| Rajan Kha Tharu
29
Security| Rajan Kha Tharu
Static IPs work on the design of space name administrations (DNS) and guarantee that
administrations like sites, VPNs, or document sharing stages are generally reachable at a
similar location.
Upgraded Security: While a static IP might open the gadget to additional designated
assaults, it likewise empowers better security setups, for example, IP-based admittance
limitations or firewall rules custom fitted to explicit addresses.
Function of NAT
Network Address Interpretation (NAT) is a systems administration procedure used to change IP
address data in parcel headers while information is on the way across a switch or firewall. Its
essential jobs include:
30
Security| Rajan Kha Tharu
Network Security: By concealing the inside IP locations of gadgets, NAT gives an extra
layer of safety. Outer substances can't straightforwardly get to gadgets behind the NAT,
decreasing the assault surface.
Empowering Private Organizations: NAT permits private IP locations to be utilized
inside an association while as yet empowering correspondence with outer organizations,
like the web.
Improving on Organization The board: NAT improves on inward organization the
board by permitting associations to utilize a steady scope of private IP addresses, in any
event, when their public IP address changes.
Working with Organization Covers: In circumstances where two organizations with
covering private IP ranges blend, NAT can assist with planning one territory to
extraordinary IPs, forestalling clashes and empowering correspondence.
Dynamic IP Portion: NAT powerfully makes an interpretation of private IPs to a
common public IP, empowering effective utilization of the public location and supporting
unique conditions like those in cloud administrations or huge undertakings
31
Security| Rajan Kha Tharu
Identifying Risks
The process of identifying and recording possible risks and weaknesses that might affect an
organization's resources, activities, or goals is known as risk identification. Key assets like data,
software, and hardware must be identified, threats like cyberattacks and natural catastrophes
must be evaluated, and vulnerabilities must be found using tools like vulnerability scanners and
audits. In order to guarantee a thorough grasp of risks, the procedure involves important
stakeholders and records possible outcomes. A prioritized list of risks is the end result, enabling
companies to proactively handle them and guarantee resilience and the preservation of vital
resources.
Analyzing Risks
Analyzing risks entails assessing them to determine their likelihood and possible consequences.
This procedure evaluates a risk's likelihood of happening as well as any possible repercussions,
such monetary loss or harm to one's reputation. Organizations can better prioritize risks by
classifying them according to their probability and severity, usually using a score system (e.g.,
high, medium, low). Finding the most important risks is the aim of risk analysis, which helps
32
Security| Rajan Kha Tharu
businesses allocate resources wisely and put suitable mitigation plans in place. In the end, this
procedure enables companies to proactively manage risks and reduce any harm.
Risk Assessment
Risk assessment implies contrasting the consequences of hazard investigation against predefined
measures to decide if a gamble is OK or requires activity. It focuses on gambles with in view of
their effect and probability, frequently utilizing a scoring framework or hazard network. This
assists associations with zeroing in on high-need takes a chance with that could hurt, while
lower-need dangers might be acknowledged or checked. The objective is to guarantee productive
asset assignment, tending to the most basic dangers and adjusting the expenses of relief with
likely advantages. At last, risk assessment illuminates’ direction and guides the general gamble
the executive’s system.
Risk Treatment
Risk treatment implies creating and executing techniques to address recognized gambles,
expecting to limit their possible effect or probability. It is the stage in the gamble the executives
cycle where choices are made on the most proficient method to deal with the dangers in light of
their seriousness and prioritization. The essential choices for risk treatment are:
Risk Aversion: Changing plans or cycles to wipe out the gamble totally. This could
include changing specific exercises or approaches that open the association to the
gamble.
Risk Decrease: Executing controls or measures to diminish the probability or effect of the
gamble. This can incorporate safety efforts, process upgrades, or extra preparation.
Risk Sharing: Moving the gamble to an outsider, like buying protection or re-
appropriating specific tasks to decrease openness to the gamble.
33
Security| Rajan Kha Tharu
Risk Maintenance: Tolerating the gamble when its effect is negligible or the expense of
alleviating it offsets the expected harm. For this situation, the association intends to deal
with the outcomes assuming that the gamble happens
An ongoing procedure that guarantees the efficacy of risk management plans and enables
companies to react to emerging or changing threats is continuous monitoring and review. During
this phase, identified risks are routinely tracked, the effectiveness of mitigation measures put in
place is evaluated, and the strategy is modified as necessary to account for evolving conditions.
Access Control: Carrying out powerful access control components, for example, multifaceted
verification (MFA), job-based admittance control (RBAC), and least honor access, limits
information admittance to just approved staff. Standard reviews and checking assist guarantee
consistence with access strategies.
Information Misfortune Anticipation (DLP): DLP frameworks help screen, recognize, and
forestall unapproved endeavors to get to or send delicate information. These devices are
34
Security| Rajan Kha Tharu
Firewalls: Virtual firewalls help monitor and control network traffic between virtual
environments, preventing unauthorized access and filtering malicious traffic. They are essential
for protecting cloud-based networks and virtualized systems, acting as the first line of defense.
Encryption
Data Encryption: Encrypting data both at rest (stored data) and in transit (data being transferred)
ensures that even if data is intercepted or accessed without authorization, it remains unreadable.
Virtual environments often leverage advanced encryption standards to protect data across cloud
storage and virtual machines.
MFA adds an extra layer of security by requiring users to authenticate with more than one factor,
such as a password and a one-time code sent to their phone. This significantly reduces the risk of
unauthorized access to virtual environments.
35
Security| Rajan Kha Tharu
Intrusion Detection Systems (IDS): IDS continuously monitor virtual networks and systems for
suspicious activity. They detect potential threats, such as unauthorized access attempts, malware,
or abnormal behavior.
Cloud Access Security Brokers (CASBs): CASBs provide visibility and control over cloud
applications used within an organization, ensuring that data stored in the cloud is secure. CASBs
can enforce security policies, monitor usage, and prevent unauthorized cloud service access.
Cloud Backups: Regular backups of virtual systems and data are critical for recovery in case of a
cyberattack, data corruption, or system failure. Cloud-based backup solutions offer scalability
and redundancy, ensuring that critical data can be restored when needed.
Security Information and Event Management (SIEM): SIEM systems collect and analyze
security event data from across virtualized environments to identify potential threats. By
integrating with virtual infrastructure, SIEM tools provide real-time insights into security
incidents and enable quick responses.
Risk: When superfluous ports are left open or unmonitored, or when benefits that are not
required are running, aggressors can take advantage of these uncovered places of passage. This
could permit unapproved clients to get to delicate frameworks, prompting information breaks,
malware contaminations, or refusal of-administration (DoS) assaults.
36
Security| Rajan Kha Tharu
Risk: Firewalls are a basic part of organization security, yet on the off chance that they are
misconfigured, they might neglect to impede malignant traffic or permit unapproved admittance
to delicate frameworks. This can make weaknesses that aggressors can take advantage of to
acquire unapproved admittance to inner organizations.
Risk: Utilizing powerless, default, or effectively guessable passwords for basic frameworks (like
switches, data sets, or cloud administrations) makes it more straightforward for aggressors to get
entrance. This is a typical misconfiguration, particularly when gadgets are conveyed without
getting managerial records.
Risk: Neglecting to apply security fixes or updates immediately can leave frameworks helpless
against known takes advantage of. Aggressors habitually target frameworks that poor person
been refreshed with the most recent security fixes, utilizing these unpatched weaknesses to send
off assaults.
Risk: Information bases that are misconfigured — whether through powerless validation settings,
lacking encryption, or excessively tolerant access control — can turn into a critical security risk.
Misconfigured data set servers can permit aggressors to take, alter, or erase basic information.
37
Security| Rajan Kha Tharu
Risk: Doling out over the top consents or access freedoms to clients or administrations expands
the gamble of insider dangers and lessens the capacity to restrict harm in case of a break. On the
off chance that a framework or client is compromised, the aggressor might have a greater number
of honors than needed to take advantage of the organization or take information.
38
Security| Rajan Kha Tharu
39
Security| Rajan Kha Tharu
40
Security| Rajan Kha Tharu
41
Security| Rajan Kha Tharu
42
Security| Rajan Kha Tharu
Conclusion:
Stamford College needs to improve its IT security in order to protect its data and preserve
operational resilience. By addressing identified risks and implementing focused
countermeasures, the company may strengthen system confidence and better safeguard its digital
assets. Stamford College will show its commitment to a safe and reliable IT environment by
putting these enhanced security protocols into place, effectively serving its staff and students.
Activity 2
Introduction:
In this computerized time, getting touchy data is significant for each organization. Stamford
college’s acknowledgment on solid IT security safeguards contrary to assorted dangers and
weaknesses, ensuring realities assurance and consistence. This action features the college's
contemporary IT security structure, breaks down unambiguous wellbeing issues, and shows
moves up to line up with best practices.
purpose of document:
The reason for this paper is to survey and further develop the current data innovation security
frameworks in Stamford college. It assists with figuring out the existed gambles, decide
measures for their use and actually look at an association's adherence to the standards of the
43
Security| Rajan Kha Tharu
chose field. It targets upgrading execution of IT in the school and generally speaking guard of
data as well as improving business congruity directly following security dangers. Also, the report
gives proposals to upgrade security assurance and decrease gambles for Stamford college.
The following stage is risk investigation, where the distinguished dangers are assessed in view of
their probability and possible effect. Devices, for example, weakness scanners and hazard
networks might be utilized to sort gambles as high, medium, or low need. Following this, risk
assessment decides the college's gamble resilience and distinguishes regions requiring prompt
consideration or further checking.
Risk treatment implies carrying out countermeasures to address the recognized dangers. These
incorporate firewalls, interruption discovery frameworks, encryption conventions, and actual
safety efforts like reconnaissance frameworks and controlled admittance to basic regions.
Stamford college likewise integrates occasional checking and audit to guarantee that executed
measures stay successful and adjust to developing dangers.
While the strategies are powerful, potential holes exist, for example, the requirement for
upgraded preparing projects to decrease human blunder, refreshed design the board to forestall
weaknesses, and more far-reaching episode reaction plans. By tending to these areas, Stamford
college can reinforce its gamble evaluation structure and guarantee better insurance for its IT
framework and information resources.
Procedures and Regulations for Data Protection applied to the College of Stamford.
Stamford College adheres to strict data protection policies and procedures in order to protect
private data, guarantee adherence to legal requirements, and preserve stakeholder trust. These
44
Security| Rajan Kha Tharu
procedures comply with applicable national and educational data privacy standards as well as
data protection legislation like the General Data Protection Regulation (GDPR).
Regulatory Accountability
GDPR Compliance: Stamford College complies with the following GDPR guidelines:
Data minimization is the process of gathering just the information required for a given
goal.
Accountability: Using records and frequent audits to show compliance.
Rights of Data Subjects: Guaranteeing that people can view, edit, or ask for their data to
be deleted.
45
Security| Rajan Kha Tharu
Notifications of Data Breach: The college complies with laws that mandate that data breaches
be reported to the appropriate authorities within a certain amount of time. For new systems or
procedures, privacy impact assessments (PIAs) are carried out in order to assess potential privacy
concerns and put in place the required protections (Sanchez, 1998).
An overview of Stamford College's suitable risk-management plan and ISO standard for IT
security
To safeguard its vital resources and maintain business continuity, Stamford College must detect,
assess, and mitigate IT security threats as part of an efficient risk-management plan. The
ISO/IEC 27001 standard, which offers instructions for creating, putting into practice, and
maintaining an Information Security Management System (ISMS), is a framework that is ideal
for this use.
46
Security| Rajan Kha Tharu
4. Incident Response Plan: Creating a thorough plan to handle security breaches, reduce
damage, and promptly restore systems is known as an incident response plan.
5. Training and Awareness: Holding frequent training sessions to teach employees and
students security best practices and lower the possibility of human error
47
Security| Rajan Kha Tharu
An overview of a suitable risk-management plan or implemented ISO standard and how it relates
to Stamford College's IT security
A compelling gamble the executive’s procedure for Stamford college stresses an organized way
to deal with recognizing, surveying, and relieving IT security chances. The ISO/IEC 27001
standard gives a complete structure to overseeing data security through the foundation of a Data
Security the Board Framework (ISMS).
A review of the potential effects of an IT security audit on Stamford College's security Through
an IT security assessment, Stamford College may be able to identify vulnerabilities, reduce risks,
and improve security for particular critical data and systems. The primary benefits and potential
disadvantages of such an audit are examined in the section that follows:
Identifying Weaknesses
48
Security| Rajan Kha Tharu
The review will reveal holes in the school's security structure, for example, obsolete
programming, lacking access controls, or feeble organization setups. This permits the foundation
to make designated moves to alleviate gambles, like fixing weaknesses or executing stricter
security strategies.
Strengthening Consistence
An IT security review guarantees the school conforms to information insurance guidelines like
GDPR. By tending to resistance issues, the school lessens the gamble of lawful punishments and
upgrades its standing for defending delicate information.
Review results frequently lead to the reception of cutting-edge safety efforts, like better
firewalls, encryption, and interruption discovery frameworks. These actions fundamentally
diminish the probability of cyberattacks, for example, ransomware or phishing.
The review can feature shortcomings in existing occurrence reaction plans, empowering the
school to work on its capacity to answer security breaks quickly. This limits free time and
information misfortune during an episode.
While tending to review suggestions might include forthright expenses, the drawn-out
advantages of forestalling information breaks, reputational harm, and functional free time far
offset the costs.
49
Security| Rajan Kha Tharu
Risk Investigation: Difficulties related with existing dangers are assessed by the review, given
the probability and effect of every weakness found for the organization.
Consistence Check: An IT security review shows that the organization's IT resources are
legitimate and administrative agreeable, for example with the ISO 27001 guideline, GDPR, and
HIPAA.
Entrance Testing: A few reviews incorporate weakness testing otherwise called infiltration
testing where the capacity of the association to identify the genuine dangers and manage them is
as tried by the moral programmers.
Network Security Assessment: Other organization security hardware that are checked out in the
review incorporate IDS/IPS, firewalls, and switches.
50
Security| Rajan Kha Tharu
Foster a brought together IT security strategy that coordinates with the school's general
administration structure, framing security goals, jobs, and obligations. Incorporate explicit rules
for information assurance, network security, and client conduct in consistence with
administrative norms like GDPR.
Perform intermittent security reviews to assess the adequacy of existing measures and guarantee
arrangement with authoritative objectives. Use review results to refresh approaches, address
weaknesses, and fortify controls.
Adjust access authorizations to authoritative ordered progression and occupation jobs to forestall
unapproved admittance to delicate data. Routinely audit access levels to guarantee they stay
fitting as jobs change.
Lead normal instructional courses for staff and understudies to advance consciousness of
network safety gambles and authoritative security approaches. Incorporate subjects, for example,
perceiving phishing endeavors, taking care of delicate information, and utilizing secure
specialized devices (Niola, 2001).
Fortify organization security through vigorous firewall designs, interruption location frameworks
(IDS), and organization division. Use devices like Organization Address Interpretation (NAT)
and Neutral territories (DMZ) to shield inward frameworks.
Guarantee that all information taking care of cycles line up with GDPR and other lawful
necessities by integrating encryption, secure reinforcements, and appropriate assent the
executives. Routinely survey and update security strategies because of administrative changes or
functional necessities.
51
Security| Rajan Kha Tharu
Use ISO/IEC 27001 or comparable systems to lay out an organized interaction for recognizing,
evaluating, and moderating dangers. Consistently screen dangers and update arrangements on a
case-by-case basis to address arising dangers.
Conclusion:
The following methods can be used to link Stamford College's IT security to the organizational
policy: implementing ISO 27001, increasing user awareness, incorporating continuous
monitoring systems, and accruing risk management strategies. criteria as well as regular audits.
The aforementioned recommendations will guarantee uninterrupted corporate operations, data
security, and adherence to regulatory and institutional standards.
Activity 3
Introduction
The primary goal of this section is to create a sufficient security plan for Stamford College. The
most important elements of the disaster recovery plan will be described and addressed, along
with the roles of the stakeholders most pertinent to the implementation of a There will be an
explanation of the security audit and a critique of the suggested security measures. The goal is to
outline a comprehensive security framework that would accommodate the college's overall IT
security and satisfy its requirements.
Objectives
Preserve the availability, confidentiality, and integrity of information assets.
Verify adherence to pertinent legal and regulatory obligations, such as the GDPR.
52
Security| Rajan Kha Tharu
Scope
All employees, students, outside suppliers, and other parties who have access to Stamford
College's networks, data, or IT infrastructure are subject to this policy.
53
Security| Rajan Kha Tharu
Put in place device management guidelines, such as limitations on the usage of personal
devices.
Turn on remote wiping for devices that have been misplaced or stolen.
Enforcement of Policies
Depending on the seriousness of the violation, noncompliance with this policy may lead to
disciplinary action, which may include suspension of access rights (Huang, 2018).
54
Security| Rajan Kha Tharu
55
Security| Rajan Kha Tharu
56
Security| Rajan Kha Tharu
57
Security| Rajan Kha Tharu
58
Security| Rajan Kha Tharu
59
Security| Rajan Kha Tharu
60
Security| Rajan Kha Tharu
61
Security| Rajan Kha Tharu
62
Security| Rajan Kha Tharu
63
Security| Rajan Kha Tharu
1. Goals
Reduce the amount that college operations are disrupted.
Assure quick data and IT system recovery.
Preserve confidential data and adhere to legal requirements.
Minimize the impact on finances and reputation.
2. Scope
Every important system is covered by the DRP, including:
Information systems for students
Databases for employees and administration
Network hardware, such as servers, routers, and firewalls
Systems of communication (messaging apps, email)
Systems for managing learning (LMS)
64
Security| Rajan Kha Tharu
Proclaim a calamity and initiate the recuperation plan in view of predefined edges.
Framework and Information Recuperation
Reestablish frameworks and information according to recuperation methodologies.
The process of implementing Stamford College's IT security and disaster recovery plan into
practice
By ensuring that Stamford College can successfully implement its disaster recovery plan and IT
security measures, the implementation process promotes a safe and robust IT infrastructure. The
main stages involved are listed below:
65
Security| Rajan Kha Tharu
Planning Stage
Characterize Targets: Lay out clear objectives for IT security and calamity recuperation,
zeroing in on information assurance, functional congruity, and administrative
consistence.
Collect Groups: Structure committed groups for IT security, fiasco recuperation, and
client preparing, relegating explicit jobs and obligations.
Distribute Assets: Recognize essential apparatuses, innovations, and financing to help
execution endeavors.
66
Security| Rajan Kha Tharu
Guarantee all basic frameworks meet characterized recuperation time targets (RTO) and
recuperation point goals (RPO).
Foster an occurrence reaction plan with clear heightening methodology.
Carry out IT security strategies and calamity recuperation estimates across the
association.
Execute constant observing of organization exercises and framework logs to distinguish
and answer irregularities continuously.
Stakeholders and Their Functions in Disaster Recovery and IT Security at Stamford College
Key stakeholders must be identified and involved in order for IT security and disaster recovery
plans to be implemented successfully. Every stakeholder has a distinct role to play in
safeguarding the college's operations, data, and systems.
67
Security| Rajan Kha Tharu
Stakeholders:
Board of Directors
Principal/President of the College
Stakeholders:
Network administrators,
IT security officers,
chief information officers (CIOs)
Stakeholders:
Heads of Departments
Administrative Teams
Adhere to security requirements and use college systems sensibly (e.g., avoiding phishing
schemes).
Inform the IT staff of any questionable emails, texts, or actions.
Stakeholders:
68
Security| Rajan Kha Tharu
Observe security procedures, including secure data handling and password management.
Report any suspicious activity or security incidents.
Attend training seminars on security awareness.
Stakeholders:
Heads of Departments,
Administrative Teams
Adhere to security requirements and use college systems sensibly (e.g., avoiding phishing
schemes).
Inform the IT staff of any questionable emails, texts, or actions.
Stakeholders:
Students enrolled at Stamford College
Audit Manager
Role:
69
Security| Rajan Kha Tharu
Supervise the whole review process, guaranteeing it lines up with authoritative objectives
and consistence prerequisites.
Characterize the degree, targets, and system of the review.
Distribute assets and timetable the review course of events.
IT Security Group
Role:
Give admittance to frameworks, logs, and information important for the review.
Help with distinguishing key areas of spotlight in light of ongoing occurrences or
dangers.
Carry out restorative activities in light of review discoveries.
Obligations:
Lead weakness outputs and chance appraisals.
Survey firewall arrangements, network strategies, and access controls.
Obligations:
Distinguish weaknesses through framework testing and moral hacking.
Suggest industry best practices and therapeutic measures.
Compliance Officials
Role:
Guarantee that reviews processes line up with legitimate, administrative, and interior
arrangement necessities.
Confirm adherence to information assurance regulations and industry guidelines.
70
Security| Rajan Kha Tharu
Obligations:
Survey documentation, approaches, and methodology for consistence.
Address likely lawful ramifications of distinguished security holes.
Obligations:
Share framework designs, network guides, and logs.
Execute updates, patches, and different changes according to review suggestions.
End-Client Agents
Roles:
Take part in reviews of client conduct, access controls, and strategy adherence.
Give criticism on the reasonableness of safety approaches and their execution.
Obligations:
Exhibit adherence to hierarchical approaches.
Distinguish difficulties in conforming to security conventions.
Risk Management Team
Roles:
Evaluate the possible effect of weaknesses distinguished during the review.
Foster a focused-on activity intends to moderate dangers.
Obligations:
Assess the business ramifications of safety shortcomings.
Work together with different groups to foster gamble treatment plans.
71
Security| Rajan Kha Tharu
Types:
72
Security| Rajan Kha Tharu
Prevent malware, phishing, and illegal access to gadgets such as laptops, desktop
computers, and mobile devices.
Add patch management, device encryption, and antivirus software.
Characterize rules for who can get to frameworks, organizations, and information, and
under what conditions.
Guarantee that entrance is conceded in view of the standard of least honor (POLP),
permitting just approved people to get to important assets for their jobs.
Components:
Client Confirmation: Characterize strategies, for example, usernames, passwords,
biometrics, or multifaceted verification (MFA) for checking personalities.
Authorization: Set up job-based admittance controls (RBAC) or quality-based
admittance controls (ABAC) to guarantee clients just approach assets they need.
Audit Trails: Keep up with logs of access occasions to recognize and answer
unapproved access endeavors.
Data protection and Protection Strategy
Purpose:
Frame how touchy and individual information is gathered, put away, handled, and
communicated.
73
Security| Rajan Kha Tharu
Guarantee consistence with pertinent information security guidelines like GDPR, CCPA,
or HIPAA.
Components:
Information Characterization: Classify information in light of its responsiveness (e.g.,
secret, public, or limited).
Encryption: Carry out encryption techniques to safeguard information very still and on
the way.
Maintenance and Removal: Characterize how long information ought to be held and
secure removal techniques once it is not generally required.
Client Assent: Lay out techniques for getting client assent while gathering individual
data.
Components:
Incident Classification: Sort episodes in view of seriousness, like low, medium, or high
effect, to decide the proper reaction level.
Reaction Strategies: Characterize bit by bit techniques for containing, investigating, and
alleviating occurrences.
Roles and Responsibilities: Dole out unambiguous jobs to people (e.g., episode reaction
colleagues) and layout their obligations.
Post-Episode Survey: After an occurrence, lead a survey to distinguish the main driver
and execute preventive measures to stay away from future episodes.
74
Security| Rajan Kha Tharu
Firewalls
Purpose:
Firewalls act as an obstruction between a confided in interior organization and untrusted
outer organizations, controlling the progression of traffic in light of predefined security
rules (jordan, 2024).
Evaluation Criteria:
Effectiveness: Firewalls are powerful in obstructing unapproved access, observing
inbound and outbound traffic, and forestalling noxious action.
Customization: They permit the customization of safety arrangements, for example,
impeding specific IP locations or ports, empowering fine-grained control.
Versatility: Present day firewalls encouraging group of people development, with
abilities like taking care of high traffic burdens and complex rulesets.
Drawback: An ineffectively designed firewall can coincidentally hinder real traffic,
upsetting business tasks.
Purpose:
75
Security| Rajan Kha Tharu
Evaluation Criteria:
Anti-Virus\Anti-Malware Software
Shields frameworks from infections, malware, spyware, and other vindictive projects that
could think twice about uprightness or upset tasks.
Evaluation Criteria:
Discovery Rate: High recognition rates for both known and it are fundamental to arise
dangers. Ordinary updates and an enormous data set of marks further develop location.
Framework Execution: Hostile to infection programming ought to work productively
without fundamentally dialing back the framework.
Constant Insurance: Viable devices ought to give ongoing checking and observing to
get dangers as they endeavor to enter the framework.
Impediments: Hostile to infection apparatuses may not get progressed dangers like zero-
day weaknesses or complex malware that doesn't display known ways of behaving.
76
Security| Rajan Kha Tharu
Purpose:
MFA improves security by requiring various types of validation (e.g., secret word, SMS
code, or biometrics) to confirm a client's personality prior to conceding access.
Evaluation Criteria:
User Convenience: MFA ought to be simple for clients to take on without making
grinding in their work processes.
Security Strength: The more factors included (e.g., consolidating something you know
with something you have), the more grounded the security.
Integration: The device ought to coordinate flawlessly with existing frameworks,
guaranteeing insignificant disturbance to client access.
Scalability: MFA frameworks ought to scale effectively as the association develops and
obliges new clients or administrations.
Conclusion
Stamford College's security flaws will be addressed in a comprehensive manner by the suggested
security policy, disaster recovery plan, and associated tools. By following these protocols and
cultivating a security-conscious culture, the college can significantly improve its defenses against
cyberattacks and better protect its vital information and operations.
Bibliography
Anon., 2001. achievecentre. [Online]
Available at: https://achievecentre.com/blog/safe-mindfulness/
[Accessed 16 12 2024].
77
Security| Rajan Kha Tharu
78