SEC Preview
SEC Preview
Security - assignment
* Please note that grade decisions are provisional. They are only confirmed once internal and external moderation has taken place and grades decisions have
been agreed at the assessment board.
Assessor Feedback:
Resubmission Feedback:
Please note resubmission feedback is focussed only on the resubmitted work
Pearson
Higher Nationals in
Computing
Unit 5: Security
General Guidelines
1. A Cover page or title page – You should always attach a title page to your assignment. Use previous page as your cover
sheet and make sure all the details are accurately filled.
2. Attach this brief as the first section of your assignment.
3. All the assignments should be prepared using a word processing software.
4. All the assignments should be printed on A4 sized papers. Use single side printing.
5. Allow 1” for top, bottom , right margins and 1.25” for the left margin of each page.
1. The font size should be 12 point, and should be in the style of Time New Roman.
2. Use 1.5 line spacing. Left justify all paragraphs.
3. Ensure that all the headings are consistent in terms of the font size and font style.
4. Use footer function in the word processor to insert Your Name, Subject, Assignment No, and Page Number on each
page. This is useful if individual sheets become detached for any reason.
5. Use word processing application spell check and grammar check function to help editing your assignment.
Important Points:
1. It is strictly prohibited to use textboxes to add texts in the assignments, except for compulsory information. eg: Figures,
tables of comparison etc. Adding text boxes in the body except for the before mentioned compulsory information will
result in rejection of your work.
2. Avoid using page borders in your assignment body.
3. Carefully check the hand in date and the instructions given in the assignment. Late submissions will not be accepted.
4. Ensure that you give yourself enough time to complete the assignment by the due date.
5. Excuses of any nature will not be accepted for failure to hand in the work on time.
6. You must take responsibility for managing your own time effectively.
7. If you are unable to hand in your assignment on time and have valid reasons such as illness, you may apply (in writing)
for an extension.
8. Failure to achieve at least PASS criteria will result in a REFERRAL grade .
9. Non-submission of work without valid reasons will lead to an automatic RE FERRAL. You will then be asked to complete
an alternative assignment.
10. If you use other people’s work or ideas in your assignment, reference them properly using HARVARD referencing
system to avoid plagiarism. You must provide both in-text citation and a reference list.
11. If you are proven to be guilty of plagiarism or any academic misconduct, your grade could be reduced to A REFERRAL or
at worst you could be expelled from the course
Programme:
BTEC Higher National Diploma in Computing
Plagiarism
Plagiarism is a particular form of cheating. Plagiarism must be avoided at all costs and students who break the
rules, however innocently, may be penalised. It is your responsibility to ensure that you understand correct
referencing practices. As a university level student, you are expected to use appropriate references throughout
and keep carefully detailed notes of all your sources of materials for material you have used in your work,
including any material downloaded from the Internet. Please consult the relevant unit lecturer or your course
tutor if you need any further advice.
Student Declaration
Student declaration
I certify that the assignment submission is entirely my own work and I fully understand the
consequences of plagiarism. I understand that making a false declaration is a form of
malpractice.
Assignment Brief
Student Name /ID Number R.R.Sandali Sithmani Ariyakamal (E221198)
Unit Tutor
Submission Format:
The assignment submission should be in the form of the following:
Formal Presentation: A 10-minute presentation (10–20 slides as a guide, with
supporting speaker notes) to communicate an evaluation of your investigation to a
non-technical audience. This should highlight key information regarding the range of
IT security risks that organizations in Sri Lanka face and the IT security solutions
available. The presentation will also include an assessment of current organizational
security procedures and an evaluation of both the physical and virtual security
countermeasures presented.
Briefing Paper: Produce a briefing paper that reviews the principles and the benefits of an ISMS
used in an organization like Colombo Advanced College and analyze the process of implementing such a
system.
recommending a suitable security policy for the organization. The policy should
include all stakeholders to ensure an audit trail can be identified. The report will
evaluate the suitability of selected security tools to meet the needs of the business.
All work must be supported with research and referenced using the Harvard
referencing system. Use appropriate headings, paragraphs, and subsections.
Scenario
You have been employed as a Junior Network Security Specialist for TechSecure Solutions (Pvt) Ltd., a
leading provider of network security solutions for a variety of clients across different sectors in Sri Lanka.
TechSecure Solutions offers a range of services, including:
Recent Incident:
Recently, Colombo Advanced College experienced a ransomware attack that led to a significant loss of
data, causing major disruption in academic and administrative activities. The attack exploited
vulnerabilities in the college's outdated network infrastructure and lack of robust security policies.
Your Task:
You have been tasked with reviewing the current risk assessment procedures and developing a
comprehensive security policy to prevent future incidents. This involves conducting a thorough security
audit, identifying vulnerabilities, and recommending appropriate security measures tailored to the
college's needs.
Detailed Requirements:
Create a detailed security policy that addresses identified risks and vulnerabilities.
This should include guidelines for data protection, user access management, incident
response, and regular security audits.
Develop procedures for handling sensitive information, including encryption
standards, data backup protocols, and secure communication methods.
Design a disaster recovery plan outlining steps to restore operations in case of a
security breach or data loss.
Develop and conduct training sessions for staff and students on cybersecurity best
practices, including recognizing phishing attempts, safe internet usage, and secure
password management.
Create awareness campaigns to promote a culture of security within the college,
emphasizing the importance of individual responsibility in maintaining a secure
environment.
Future Prospects:
As part of the long-term strategy, Colombo Advanced College is considering the implementation of a
hybrid learning model, integrating more online and remote learning options. This transition will require
additional security measures to protect online learning platforms, secure remote access, and ensure the
privacy of students and faculty members.
Produce a formal presentation (with supporting notes) on a review of the range of IT security threats
that are faced by an organization like Colombo Advanced College, describe and evaluate the range of
countermeasures, both physical and virtual.
A discussion of the different types of security risks to Colombo Advanced College and similar
organizations.
Your presentation should go on to discuss a range of security countermeasures for the identified risks,
including the following:
o Firewall policies
A discussion, using a specific example from either your research or the Colombo Advanced
College scenario, of how implementing each of the following can improve network security:
o A Static IP
Support any points you make in the presentation with well-chosen examples from any research you have
carried out on related sectors or security scenarios.
Produce a briefing paper that reviews the principles and the benefits of an ISMS used in an organization
like Colombo Advanced College, and analyze the process of implementing such a system.
Your paper should include a section on an ISMS framework, including the following:
An examination of the key principles of an ISMS and its relevance to the successful operation in
Colombo Advanced College.
An analysis of the benefits that an effective ISMS can have on Colombo Advanced College.
An assessment and critical analysis of the elements and processes required for Colombo
Advanced College to establish and maintain a more robust ISMS, ensuring that the key principles
are met.
A justification of the steps required for Colombo Advanced College in order to implement an
ISMS.
Support any points you make in the presentation with well-chosen examples from any research you have
carried out on related sectors or ISMS scenarios.
Produce a process review document that assesses the current mechanisms and legislation for data
security within an organization.
An analysis of the possible impact on security at Colombo Advanced College, following the results
of an IT security audit.
Support any points you make in the report with well-chosen examples from any research you have
carried out on related sectors or ISMS scenarios.
Present a written report to appraise an ISMS for Colombo Advanced College and design a suitable
security policy, based on the supplied evidence and operational requirements.
A plan of the design of an ISMS for Colombo Advanced College, including an implementation
map, taking into consideration functional and non-functional requirements of the digital systems.
A suitable security policy, including the main components of a disaster recovery plan for the
college.
Identification and discussion of the stakeholders and their roles in implementing a security audit.
Justification, with reasons, for the designed security plan, including the selected physical, virtual,
and policy elements.
An appraisal of and justification for the planned ISMS design, against the new IT security
landscape in Colombo Advanced College, auditing the different stages of the process followed.
An analysis of the relationship between ISO and international ISMS standards and the
establishment of an effective ISMS for Colombo Advanced College.
An evaluation of the suitability of the tools used in the security policy designed for Colombo
Advanced College in terms of how it meets their needs.
A critical examination of the advantages and disadvantages of the planned ISMS for the college,
against key and international standards.
Support any points you make in the report with well-chosen examples from any research you have
carried out on related sectors or projects, as well as the existing scenario and any associated
documentation.
Acknowledgement
I am Sandali Sithmani Ariyakamal and I am a student of Esoft Metro Campus, Kandy HND Batch 100. I
want to sincerely thank every one of them and my lecture Mr.Beven.
My lecture’s programming concept has greatly influenced me to have a deeper understanding of my learning
journey. I would also like to acknowledge my fellow students who have enriched my experiences in
collaborative spirit and thought-provoking discussions.
Finally, I appreciate Mr.Beven mentoring and the opportunity to learn under the goodwill of my peers. This
assignment reflects not only my individual efforts but also the collective knowledge shared in our
programming community.
Table of Contents
Plagiarism.................................................................................................................................5
Recent Incident:.....................................................................................................................8
Your Task:...............................................................................................................................8
Detailed Requirements:.........................................................................................................9
Future Prospects:.................................................................................................................10
1 Activity 01........................................................................................................................17
2 Activity 02........................................................................................................................22
2.1 Introduction.....................................................................................................................22
2.6 Conclusion......................................................................................................................25
3 Activity 03........................................................................................................................26
3.3 Audit................................................................................................................................29
4 Activity 04........................................................................................................................35
4.2 Disaster Recovery Plan (DRP) and Incident Response Plan (IRP) for Colombo
Advanced College......................................................................................................................36
4.8 Conclusion......................................................................................................................40
5 References........................................................................................................................41
Table of Figures
Figure 1 Slide 01............................................................................................................................19
Figure 2 Slide 02............................................................................................................................20
Figure 3 Slide 03............................................................................................................................20
1 Activity 01
Figure 1 Slide 01
Figure 2 Slide 02
Figure 3 Slide 03
Figure 4 Slide 04
Figure 5 Slide 05
Figure 6 Slide 06
Figure 7 Slide 07
Figure 8 Slide 08
Figure 9 Slide 09
Figure 10 Slide 10
Figure 11 Slide 11
Figure 12 Slide 12
Figure 13 Slide 13
Figure 14 Slide 14
Figure 15 Slide 15
Figure 16 Slide 16
Figure 17 Slide 17
Figure 18 Slide 18
IT security is a set of cybersecurity strategies that prevent unauthorized access to corporate assets
such as computers, networks, and data. It maintains the integrity and confidentiality of sensitive
information and blocks access by sophisticated hackers.
IT security is often associated with cyber security. While IT provides the overall technological
infrastructure of an organization, including security hardware systems, software applications, and
endpoints such as laptops and mobile devices. IT security also protects the network of companies
and its various components, such as physical and cloud-based data centers.
Types of IT Security:
Network Security
Internet Security
Endpoint Security
Cloud Security
Application Security
Operational Security
“IT security describes the precautions taken to protect computers and networks from
unauthorized access. These processes are designed to keep out agents who might seek to
steal or otherwise disrupt system data.
CIA Triad
CIA is basically a model or a framework.
C- Confidentiality
Confidentiality refers to an organization’s effort to ensure that data is kept confidential or
private. To accomplish this, access to information must be controlled to prevent unauthorized
sharing of data-whether intentional or accidental. A key aspect of maintaining confidentiality is
to make sure that individuals are prevented from accessing important assets to your business
without proper permission.
Solution: Data inscription
I-Integrity
Integrity is about making sure your data is reliable and free of tampering. The integrity of your
data is maintained only if the data is authentic, accurate and reliable. To protect the integrity of
your data, you may use hashing, encryption, digital certificates, or digital signatures. For
websites, you can employ reliable certification authorities (CAs) that verify the veracity of
your site so that visitors know that they are getting the website they intend to visit.
Solution: Hashing
“The next thing to talk about is integrity. Well, the idea here is to make sure that data has not
been modified. Corruption of data is a failure to maintain data integrity. To check if our data
has been modified or not, we make use of a hash function.
We have two common types: SHA (Secure Hash Algorithm) and MD5 (Message Direct 5).
Now MD5 is a 128-bit hash and SHA is a 160-bit hash if we’re using SHA-1. There are also
other SHA methods that we could use like SHA-0, SHA-2, and SHA-3.” (geeksforgeeks, 2023)
A-Availability
Availability refers to the ability to access and use information should be available to authorized
users when they need it, and that systems and networks should be reliable and accessible. Even
if data is kept confidential and its integrity is maintained, it is often useless if is not available to
those in the organization and to the customers they serve. This means systems, networks and
applications as they should be and when they should be done. Also, people who have access to
specific information should be able to consume it when needed and it should not take on
unlimited amount of time to obtain the data.
Ex:
“This means that the network should be readily available to its users. This applies to systems
and to data. To ensure availability, the network administrator should maintain hardware,
make regular upgrades, have a plan for fail-over, and prevent bottlenecks in a network.
Attacks such as DoS or DDoS may render a network unavailable as the resources of the
network get exhausted. The impact may be significant to the companies and users who rely
on the network as a business tool. Thus, proper measures should be taken to prevent such
attacks.” (geeksforgeeks, 2023)
The college does not maintain network infrastructure and does not appear to have modern
security features. This creates an environment in which attackers can exploit the known
vulnerabilities of old software and hardware, such as the use of stray routers and switches.
Firewall of this Colombo Advanced Collage is not equipped with security features. Attackers
can easily enter the network as before. In addition, there is no system to detect suspicious
network traffic and intrusions.
Due to the poor access to the networks of the Colombo High School, the attackers were able to
access the network very easily.
The lack of knowledge of staff and students of Colombo High School of cybersecurity best
practices, including phishing attempt detection, safe internet use and secure password
management, appears to have provided an easy accessible route for attackers.
The above mentioned weaknesses were the main reasons for the recent ransomware attack at
Colombo Advanced Collage. This resulted in significant loss of data and great disruption to
academic and administrative activities.
1. Malware
Malware is an abbreviation for "malicious software" that includes viruses, worms, Trojans,
spyware, and ransomware, which are the most common type of cyber-attack. Malware enters a
system, usually through a link or email to an unreliable website, or an unwanted software
download. It can be deployed on the target system, sensitive data collection, manipulating and
blocking access to network components, and destroying data or shutting down the system
altogether. Malware is an acronym for "malicious software" that includes viruses, worms,
Trojans, spyware, and ransomware, which are the most common type of cyber-attack. Malware
enters a system, usually through a link or email to an unreliable website, or an unwanted
software download. It can deploy on the target system, collect sensitive data, manipulate and
block access to network components, and destroy data or shut down the system altogether.
“Short for malicious software, malware is any kind of code or software intentionally designed to
cause harm to computer systems. Malware can compromise a system’s security and privacy by
gaining unauthorized access, stealing, altering, encrypting, or destroying data.
Viruses are self-replicating malware tools that attach themselves to legitimate files and
spread to other files and systems when executed.
Worms self-replicate exponentially across networks or devices without the need for a
host file.
Rootkits are malicious programs that conceal their presence and get administrator-level
access to a computer’s operating system or other assets.
Trojan horses are disguised as legitimate software tools that spread using social
engineering techniques.
Ransomware is a sophisticated malware platform that encrypts the victim’s data or
system. It’s used to demand a ransom in exchange for the decryption key.
Spyware secretly monitors user activity and transmits sensitive data to hackers without
the victim’s knowledge or consent.
File less malware operates in computer memory rather than on a device's hard drive,
making it difficult to detect and eradicate.
Scareware is deceptive software that tricks users into believing their computer is
infected or has serious issues, prompting them to purchase fake or unnecessary security
software.
Adware displays unwanted advertisements on web browsers to generate revenue for the
adware creators.
Key logger secretly records a user's keystrokes to capture sensitive data like login
credentials.
Crypto jacking malware is used to illegally mine cryptocurrencies in a victim’s
system.” (Jayaraman, 2023)
2. Password Attack
Password attacks are various methods used by hackers to maliciously verify, enter, and steal
data from password protected accounts. Typically, these attacks are carried out by exploiting
the system's vulnerabilities and using software to speed up the password-crack process.
“A hacker can gain access to the password information of an individual by ‘sniffing’ the
connection to the network, using social engineering, guessing, or gaining access to a password
database. An attacker can ‘guess’ a password in a random or systematic way.
Password attacks include:
Brute-force password guessing — an attacker uses software to try many different
passwords, in hopes of guessing the correct one. The software can use some logic to
trying passwords related to the name of the individual, their job, their family, etc.
Dictionary attack — a dictionary of common passwords is used to gain access to the
computer and network of the victim. One method is to copy an encrypted file that has the
passwords, apply the same encryption to a dictionary of regularly used passwords, and
contrast the findings.
MitM Attack
2 Activity 02
2.1 Introduction
An information security management system is defining policies, methods, processes, and tools
to ensure sustainable information security in companies and government agencies. It introduces
specific procedures and implements organizational and technical actions that must be
continuously controlled, monitored, and improved. It explains your organization's approach to
information security and privacy.
ISMS generally uses a holistic, risk-based, flexible approach, which is beneficial for businesses
of all sizes and in many sectors. Such a system can provide organizations with a competitive
advantage by improving attack surface visibility and providing guidance for asset management,
risk management, and risk remediation.
The Information Security Management System is important to protect the Colombo Advanced
College from ransomware attacks as well as other attacks.
“An information security management system (ISMS) is a set of policies and procedures for
systematically managing an organization's sensitive data. The goal of an ISMS is to minimize
risk and ensure business continuity by proactively limiting the impact of a security breach.
An ISMS typically addresses employee behavior and processes as well as data and technology. It
can be targeted toward a particular type of data, such as customer data, or it can be implemented
in a comprehensive way that becomes part of the company's culture.” (Yasar)
1. Risk Management: Identifying and assessing risks for informational assets. A critical
component of ISMS is the identification and assessment of information security risks. This
includes conducting a thorough analysis of the organization's assets, weaknesses, and potential
threats. By understanding the risks, the information here can prioritize their security efforts and
allocate resources effectively. Regular risk assessments help identify emerging threats and
ensure that safety measures are up to date.
2. Constant improvement: All staff and students should regularly review and improve safety
measures. Necessary steps should be taken to protect the records, financial data and other
internal data of the students of this Colombo Advanced College and these security measures
should be improved.
3. Compliance: Compliance with legal, regulatory and contractual obligations. Organizations
must comply with changing regulatory requirements and ensure that their ISMS align with
relevant laws. This can include conducting regular compliance audits, implementing specific
controls, and documenting evidence of compliance. Engaging legal and regulatory experts can
help organizations navigate complex compliance landscapes.
These principles have the potential to inculcate a culture of security in the Colombo Advanced
College and thereby actively manage information security.
Protects sensitive data. An ISMS protects all types of proprietary information assets
whether they're paper-based, preserved digitally or reside in the cloud.
Enhances company culture. An ISMS provides an all-inclusive approach for security and
asset management throughout the organization that isn't limited to IT security.
The benefits of implementation of ISMS for Colombo Advanced College are as follows:
Improved security: Protected from breaches and data loss.
Reputation Management: Builds trust among stakeholders through proven commitment
to safety.
Operational Efficiency: Streamlines processes for incident response and compliance.
Implementation of ISMS for Colombo Advanced College not only improves data security but
also improves the operational capabilities of the organization.
1. Leadership commitment: Leadership buying and support is crucial to the success of ISMS.
Top management should demonstrate a strong commitment to information security and allocate
the resources needed to implement and maintain ISMS. Make sure that top management
supports security initiatives.
2. Policy Development: Clear and comprehensive policies and procedures should act as a guide
for staff and students to follow. These documents should address various aspects of information
security, including data classification, acceptable use of technical resources, incident response,
and data retention. Policies and procedures should be communicated to all staff and students
and reviewed regularly to ensure they are relevant and effective.
3. Training and awareness: Staff and students play a crucial role in maintaining information
security. They should be aware of security policies, trained in best practices and aware of
emerging threats.
Establishing the elements of this Colombo Advanced College is very important to maintain
effective ISMS.
This step ensures that ISMS has been prepared in accordance with the specific needs and risks
of The Colombo Advanced College.
2.6 Conclusion
As a result of advances in the digital age, Colombo Advanced Collage faced their sensitive
information threats. Implementation of an Information Security Management System (ISMS) is
essential to protect valuable data, ensure compliance with regulations, and maintain the trust of
staff and students. Therefore, it is clear that ISMS is very important for securing information
assets and ensuring a secure study environment at Colombo Advanced Collage. By following
these principles and processes, the college can significantly improve its defensive posture and
resilience against future threats.
3 Activity 03
Risk management is the systematic process of identifying, assessing, and mitigating threats or
uncertainties that can adversely affect your organization's goals. In the context of IT security,
risk management is essential to prevent data breaches, ransomware attacks, and other cyber
threats. This includes analyzing the probability and impact of risks, developing strategies to
minimize harm, and monitoring the effectiveness of measures.
A successful risk management program helps an organization consider the full range of risks it
faces. Risk management also examines the relationship between different types of business
risks and the cascading impact they could have on an organization's strategic goals.” (Tucci)
If an unexpected event captures your organization unawares, the effect may be minor, i.e. a small
impact on your high costs. In the worst case scenario, however, it can be catastrophic and have
serious effects.
To reduce risk, an organization must deploy resources to minimize, monitor, and control the
impact of negative events while maximizing positive events. A consistent, systemic, and
integrated approach to risk management can help determine how best to identify, manage, and
mitigate significant risks. It also protects the reputation of the organization, minimizes losses,
encourages innovation and growth, improves decision-making, etc.
“Risk management has perhaps never been more important to business success than it is now.
The risks that modern organizations face have grown more complex, fueled by the rapid pace of
globalization. New risks constantly emerge, often related to and generated by the now-pervasive
use of technology. Climate change has been dubbed a "threat multiplier" by risk experts.
The COVID-19 pandemic quickly became an existential threat for businesses in various
industries. Many made rapid adjustments to manage the risks posed by the pandemic. But, going
forward, they're still grappling with some of those risks, including the ongoing need to manage
remote or hybrid work environments and what can be done to make supply chains less
vulnerable to disruptions.” (Tucci)
ISO 31000 states that the success of risk management depends on the effectiveness of the
management framework, which provides foundations and provisions that are embedded
throughout the organization at all levels.
The Framework:
Assists in effective management of risk through the application of the risk management
process
Ensures that the risk information obtained from the risk management process is
adequately reported
This ensures that this information is used as a basis for decision-making and
accountability at all relevant organizational levels.
This section describes the necessary components of the framework for managing risk and
how they relate to each other in an iterative way.
Mandate and Commitment: Risk management policy should demonstrate a strong and
sustainable commitment to risk management by defining objectives, ensuring legal and
regulatory compliance, ensuring the allocation of resources required for risk management,
communicating the benefits of risk management to all stakeholders.
Designing framework for managing risk: Before implementation, the organization must create
a framework for managing risk. This includes:
Understanding of the organization and its context
Establishing Risk Management Policies
Ensure accountability, authority and appropriate competence for risk management
Monitoring and reviewing the framework: To ensure the effectiveness of risk management,
the organization must measure the performance and progress of risk management, review
whether the risk management framework, policy and plan is still appropriate, and review the
effectiveness of the risk management framework.
Continuous improvement of the framework: Based on the results of monitoring and review,
decisions should be made on how the risk management framework, policy and plan can be
improved.
Risk Assessment: Risk assessment is the entire process of risk identification, analysis, and
evaluation.
Risk Identification: Through the application of risk detection tools and techniques, the
organization should identify sources of risk, areas of impact, events and causes, and their
potential consequences.
Risk analysis: Risk analysis provides input on developing an understanding of risk,
considering causes and sources of risk, their positive and negative consequences, the
likelihood that those consequences may occur, evaluating risks and deciding whether
risks should be treated, and more appropriate risk treatment strategies and methods.
Risk treatment: Risk treatment options should be selected based on the outcome of the risk
assessment, the expected cost for implementing and benefiting from these options.
• Risk identification: The College can identify risks such as outdated systems, unauthorized
access, or poor encryption standards.
• Risk Assessment: THE ISO 31000 helps classify these risks based on its potential impact on
critical systems, such as student records or research data.
• Risk treatments: Implement controls such as multi-factor validation (MFA) and regular patch
updates to reduce exposure.
• Monitoring and review: Conducting regular audits and reviews of security controls to ensure
their effectiveness over time.
3.3 Audit
Auditing is the evaluation process that assesses the effectiveness of processes and controls in
checking a company's accounts, such as financial reports and other financial information. In the
context of IT security, audits focus on assessing an organization's cybersecurity posture,
compliance with policies, and risk management processes. There are many types of audits that
can be done in the company's accounts by internal parties such as internal auditors, or by external
parties such as external auditors and tax officers.
1. Internal Audit
Internal audit is the process of independently evaluating the company's risk management and
control in order to improve business operations and add value to the company. In addition, it
helps to ensure that the company complies with internal policies, relevant laws and regulations.
2. External Audit
External audit is the process of independently evaluating a company's financial statements by an
external auditor, who is a qualified independent third party.
3. Compliance audit
Compliance audits are usually performed by internal auditors, so that they usually perform as
part of an internal audit. In this type of audit, auditors usually review and examine various laws
and regulations as well as internal policies and compare them with actual practices to make sure
that the company's staff follows the rules, regulations, and different policies that the company
has.
4. Operations audit
Operations audit is the process of testing business operations and controls in order to improve its
efficiency and efficiency, as well as to minimize risks that may hinder the company from
reaching its goal. The main purpose of an operational audit is usually to add value to the
company.
Comparison:
• Internal audits provide immediate insight but may lack objectivity compared to External
audits that provide an independent review.
• Compliance audits ensure compliance with industry standards and focus on Operational
audit system efficiency.
Are there any weak spots and vulnerabilities in your current security?
Are there any extraneous tools or processes that don’t perform a useful security function?
Are you equipped to fend off security threats and recover business capabilities in the
event of a system outage or data breach?
If you have discovered security flaws, what concrete actions can you take to address
them?
A thorough audit can also help you remain in compliance with data security laws. Many
national and international regulations, such as GDPR and HIPAA, require an IT security
audit to ensure that your information systems meet their standards for the collection,
usage, retention and destruction of sensitive or personal data.” (Tierney, 2020)
• Improved security posture: Audits help identify security gaps, enabling the organization to
resolve them before they are breached.
• Improved compliance: Regular audits ensure compliance with industry standards, reduce legal
and financial risks.
• Operational disruptions: Without proper planning, audits can cause temporary disruptions,
especially if they involve critical systems.
Administrative staff: users of information systems that handle sensitive student and
research data.
Data Protection Officer: Ensures that the organization complies with data protection
laws such as the Data Protection Act of Sri Lanka.
Executive Management: Key decision makers who approve security policies and
allocate resources for implementation.
“A risk assessment is a systematic process used to identify potential hazards and risks in a
situation, then analyze what would happen should these hazards take place. As a decision-
making tool, risk assessment aims to determine which measures should be implemented to
eliminate or control those risks, as well as specify which of them should be prioritized according
to their likelihood and impact on the business.
Risk assessment is one of the major components of a risk analysis. Risk analysis is a process
with multiple steps that intends to identify and analyze all of the potential risks and issues that
are detrimental to the business or enterprise.” (Andales, 2024)
Risk assessment refers to identifying, evaluating, and prioritizing risks for an asset, loan, or
investment in an organization. Risk assessment is essential to determine how valuable a specific
investment is, and the best process to minimize risk. Risk assessment is important to determine
the rate of return an investor should earn in order to treat potential risk as a valuable investment.
The Colombo Advanced College must comply with several key regulations and processes for
data protection:
Sri Lanka's Data Protection Act: mandates the safe handling of personal information,
including encryption, data reduction, and secure communication protocols.
ISO/IEC 27001: Provides a framework for establishing ISMS that is critical to protecting
sensitive data and ensuring compliance with global standards.
By complying with these regulations, the College:
Reduce security risks: Proper encryption, access control, and regular security audits
reduce the likelihood of data breaches.
Ensure data integrity and availability: Implementing secure backup processes and disaster
recovery plans to make data accessible and protected from unauthorized modifications.
Enhance reputation and trust: Adherence to international standards demonstrates the
organization's commitment to data security, building trust with students, staff, and
partners.
4 Activity 04
“An IT disaster recovery plan (DRP) is a written document that spells out the policies, step-by-
step procedures, and responsibilities to recover an organization's IT systems and data and get IT
operations back up and running when a disaster happens. This plan is a sub-component of the
organization's Business Continuity Plan (BCP).
Once developed, the DR plan must be tested (or exercised) to ensure that the IT team can fully
recover the organization's IT systems regardless of the type of disaster.
“A business continuity plan (BCP) is a system of prevention and recovery from potential threats
to a company. The plan ensures that personnel and assets are protected and are able to function
quickly in the event of a disaster.
KEY TAKEAWAYS
Business continuity plans (BCPs) are prevention and recovery systems for potential
threats, such as natural disasters or cyber-attacks.
BCP is designed to protect personnel and assets and make sure they can function quickly
when disaster strikes.
BCPs should be tested to ensure there are no weaknesses, which can be identified and
corrected.” (Kenton, 2024)
4.2 Disaster Recovery Plan (DRP) and Incident Response Plan (IRP) for
Colombo Advanced College
The DRP for Colombo Advanced College includes proactive and reactive measures.
Proactive Steps:
Regular data backups are stored securely, both on-site and offline.
Network fragmentation to isolate critical systems from threats.
Regular system patches and updates to close security vulnerabilities.
Multi-factor authentication (MFA) and encryption for sensitive data.
Continuous monitoring with Intrusion Detection Systems (IDS).
Reactive steps:
Activated incident response team (IRT) in case of a violation.
Immediate isolation of affected systems to prevent further damage.
Restore data from recent backups.
Communicate with stakeholders to raise awareness about violations and recovery
measures.
Policy:
All sensitive data must be encrypted using AES-256.
Encrypted communication (TLS/SSL) will be required for data sharing.
VPN should be used with mobile devices and remote access encryption.
Stakeholders: Department of Information Technology, Data Protection Officer.
The ISO/IEC 27001 standard provides companies of any size and all aspects of activity with
guidance on establishing, implementing, maintaining, and continuously improving an
information security management system.
“ISO 27001 is the leading international standard focused on information security. It was
published by the International Organization for Standardization (ISO), in partnership with
the International Electro technical Commission (IEC). Both are leading international
organizations that develop international standards.
For better understanding of ISO 27001 meaning, it’s important to know that this standard is part
of a set of standards developed to handle information security: the ISO/IEC 27000 series. ISO
27001 is the most important part of that set because it describes how to manage all aspects of
security, and its full name is “ISO/IEC 27001 – Information security, cybersecurity and privacy
protection — Information security management systems — Requirements.”” (Kosutic)
5. Disaster Recovery and BCP: Backup systems, setting recovery plans, and conducting
regular exercises.
6. ISO 27001 Certification: Aligning and certifying ISMS with ISO 27001 standards.
4.8 Conclusion
ISMS for Colombo Advanced College will significantly improve the security posture of the
institute and ensure data security, business continuity and compliance with international
standards. By implementing a combination of policies, advanced security tools, and regular
audits, the college can protect its network infrastructure from future attacks and ensure
uninterrupted academic and administrative operations.
5 References
Acronis. (2023, January 16). https://www.acronis.com/en-us/blog/posts/disaster-recovery-plan/.
Andales, J. (2024, September 12). https://safetyculture.com/topics/risk-assessment/.
Kenton, W. (2024, August 18). https://www.investopedia.com/terms/b/business-continuity-
planning.asp.
Kosutic, D. (n.d.). https://advisera.com/27001academy/what-is-iso-27001/.
Tierney, M. (2020, April 09). https://blog.netwrix.com/2020/04/09/it-security-audit/.
Tucci, L. (n.d.). https://www.techtarget.com/searchsecurity/definition/What-is-risk-management-
and-why-is-it-important.
Yasar, K. (n.d.). https://www.techtarget.com/whatis/definition/information-security-
management-system-ISMS.