Case Study Phase 1
My company, Cisco Systems, Inc., is in risk to perils on various facade. If an aggressor wishes to hurt an affiliation and they have insider data on an affiliation’s entrance switch then they can screen, deny, and change traffic enters or leaves that affiliation (DHS 2018). Having more devices, applications, shows, and customers just puts your framework at a progressively genuine peril for being undermined (CISCO, n.d.). All of this could have an impact on the relationship in the company and also with approaching clients and partners. This can clearly explain why it is crucial to address and lighten vulnerabilities. For instance, everything considered a productive ambush can cost a business $301 per delegate,” which can total in excess of 5,000,000 dollars a significant association like this (Eichkorn, 2018).
As an expert of security, I have the responsibility to evaluate the vulnerability of my association or organization. Along these lines, I’d converse with chiefs and other staff individuals to get their contribution on issues and to simply increase a general point of view. I would likewise play out a couple of evaluations myself. I would initially evaluate to check whether there are any vulnerabilities with any of the frameworks on the association’s system. From there, I would have to have to decide whether there are any infections or different issues on each gadget and afterward I would guarantee that the entirety of the product and equipment on these gadgets are sheltered. My goal of this to not have issues emerging out of the product or equipment that the association employments. Then I would look at the spread out of the system framework and stages to figure out what vulnerabilities they present. From that point onward, I would look at the association’s hazard appraisal arrangements and related strategies that are set up.
Since I am the present organization’s expert, I have a set of rundown activities that I intend to do or execute to limit the dangers and vulnerabilities that this association has. One of the activities I can put in place is portioning and isolating the system and its and capacities. This action can have an affect on diminishing the effect or harm from assailants on the off chance that they ever enter the system. Also, I will solidify the system gadgets, restricting pointless parallel interchanges, and tying down access to our foundation gadgets. The other thing I can do is wipe out and erase all disclosure conventions and repetitive administrations notwithstanding constraining access and benefits of users for all device’s infrastructure. To best company network devices protection, there are also some extra steps I can implement in addition of what I mentioned above. The following steps I will mention below are great paying little mind to the size of your business. Cisco gave five-advance system security agenda. This security agenda makes a comprehensive security arrangement that averts ruptures just as fast tends to issue and different issues that may (CISCO, n.d.). The security agenda made by Cisco are listed as follow:
- Introduce a firewall and its presentation
- Quarterly Passwords update
- Maintenance of the Anti-Virus software
- Virtual Private Network creation
- Mandatory training supply for all network users
The application of all this security system will help me on spotting issues before they cause further harms or damages to the company. At the point when issues do emerge, a few countermeasures and different instruments I would use to rapidly address and amend these issues are you is encoding information on all level and actualize Secure Shell (SSH). For security purposes, other applications can be used to enforces the company data protection such as SSL, NMAP, Wireshark and Kerberos. The employment of high trained and experienced cybersecurity and framework staff is important because they could bring their experience perspective to the company and share their knowledges with few junior personnel’s. In the company, we would have eight security work force to give nonstop observing and discouragement. The last point will be to work in parallel with Law enforcement personnel that can with locate and prosecute the individuals who assault our system.
Case Study Phase 2: A Proposal for a Risk Assessment Methodology
Background Information about a Risk Assessment Methodology
A risk assessment is used to detect, approximate, and prioritize risk to a company’s assets, activities, and individuals, emanating from the processes and use of information systems (Sandberg, Amin, & Johansson, 2015). The fundamental goal of a risk assessment methodology is to assist managers to make informed decisions in responding appropriately to risks. It also provides a report to assist top managers make informed decisions regarding the security of an organization. This paper outline and describe steps that Cisco Systems, Inc. can take to implement an effective risk assessment methodology.
Steps to Take to Implement an Effective Risk Assessment Methodology
1. Determine information value
Most companies do not have sufficient financial resources for implementing information risk management. As such, an organization like Cisco should limit its scope to the most business-critical assets. The company should spend ample time in describing a standard for ascertaining the value of an asset. This step would help Cisco to save time and money. After a proper protocol has been formally integrated into the company’s information risk management policy, Cisco should group each asset as critical, minor, or major
2. Identify and prioritize assets
Since assets have different use and value, Cisco should work closely with end-users and management to outline the value of each asset. For each asset, the company should collect information such as software, hardware, data, end-users, functionality requirements, etc.
3. Identify threats
A threat is defined as any vulnerability that could be utilized to compromise security to bring damage or steal data from a company (Sandberg et al., 2015). Some of the threats that CISCO should worry about include hackers, malware, system failure, phishing, and insiders. The origin of all types of cyber-attacks occurs via an internal or an external source. An insider attack is an attack that is maliciously done by a person with permitted system access and targets a computer or network system. On the contrary, an outsider attack is done by adversaries who are not authorized to directly access any of the network nodes. Malicious insiders in insider attacks mostly are permitted to access servers and infrastructure which store sensitive and private information such as database servers and mail servers.
4. Identify vulnerabilities
This step is about looking at the chances that certain threats may have to occur. Vulnerability is defined as a gap that a threat can utilize to compromise security, destroy an organization, or leak sensitive data (Stallings et al., 2012). Cisco can find vulnerabilities through vulnerability analysis or audit reports.
5. Analyze controls and implement new controls
The last step in risk assessment entails analysis of controls that have been created in a company to reduce or eliminate the likelihood of a threat or vulnerability. Control measures can be executed via technical means, like automatic updates, encryption, continuous data leak detection, or two-factor authentication. Nontechnical means can also be used to implement controls, and they include policies and physical techniques such as keycard access (Stallings et al., 2012).
Cisco should classify controls as either preventive or detective. Preventive controls try to stop attacks such as encryption or continuous security monitoring. Detective controls, on the other hand, attempt to discover the time an attack took place and include continuous data exposure monitoring.
Fortune (n.d.). Equifax Data Breach, One Year Later: Obvious Errors and No Real Changes, New Report Says. Retrieved from http://fortune.com/2018/09/07/equifax-data-breach-one-year-anniversary/
Sandberg, H., Amin, S., & Johansson, K. H. (2015). Cyberphysical security in networked control systems: An introduction to the issue. IEEE Control Systems Magazine, 35(1), 20-23.
Stallings, W., Brown, L., Bauer, M. D., & Bhattacharjee, A. K. (2012). Computer security: principles and practice (pp. 978-0). Upper Saddle River, NJ: Pearson Education.
O’Brien, A. (2017). Giant Equifax data breach: 143 million people could be affected. Retrieved from https://money.cnn.com/2017/09/07/technology/business/equifax-data-breach/index.html
Wattles, J. (2017). How the Equifax data breach happened: What we know now. Retrieved from https://money.cnn.com/2017/09/16/technology/equifax-breach-security-hole/index.html