Overview of the Problem and Initial Findings
Cyber Security is one of the most crucial problems forming the contemporary improvisation development supporting the development of the implicational development for listing the utilization of the effective implication of the activities (Abawajy 2014, pp-237). The improvement of the cyber activities had listed the utilization of the cyber system development for the fire and rescue services. Many fire and rescue services have introduced mobile based system for their fire and rescue service activities as it have helped them in reaching the site at an increased speed. The introduction of the Internet Cloud system has made it possible for all vendors to extend their fire and rescue service operations to a larger extend with the help of technology development and improved fire safety equipments (Korpela 2015, pp-75). The issues of cyber security would result in listing the formation of the hindrance of security, privacy, misconception of the information of the mobile data terminal solution, and information of the mobile data terminal solution infiltration for the fire and rescue service operations. The alignment of the factors would align for the implication of the factors for security integration. The security issues would be dealt for aligning with the development of the factors that would help in easing the processes of the fire and rescue service operations development (Kortjan and Von Solms 2014, pp-32). The integration would be utilized for easing the processes developing the integration of the factors listing the utilization of the development factors.
Cyber security development is one of the most crucial factors that would integrate the alignment of the operations for integrating the simplification of the cyber issues for the information of the mobile data terminal solution storage (Abawajy 2014, pp-242). The combination of the operations would help the formation of the global functional development. The integration would be helpful for easing the alignment of the operations supporting the formation of the activities. The improvement of the cyber activities had listed the utilization of the cyber system development for the fire and rescue services. The cyber security development would be implied for aligning with the mobile based system development. The issues of cyber security would result in listing the formation of the hindrance of security, privacy, misconception of the information of the mobile data terminal solution, and information of the mobile data terminal solution infiltration for the fire and rescue service operations. The alignment of the factors would align for the implication of the factors for security integration (Safa, Von Solms and Futcher 2016, pp-71). The security issues would be dealt for aligning with the development of the factors that would help in easing the processes of the fire and rescue service operations development. The cyber security issues would be analyzed in the following report and it would form the utilization of the effective integration and formation development. The utilization would be formed for listing the analysis of the improved communication development. The simplification would be helpful for listing the utilization of the effective performance integration. The study had been developed for integrating the successive alignment of the development consideration of the factor development for the fire and rescue service development (Korpela 2015, pp-76). The study would list the various documentation and reports that are helpful for aligning with the factors of developing the improvement activities. The fire and rescue services would have to face the following
Risk Assessment for Authentication Methods
According to Abawajy (2014, pp-35), the key research methods adopted for the study of the probable security issues for the development of the mobile data terminal for the fire and rescue operation services were program security analysis, data security protection, and defect research. The combination of the three methods of research would be helpful for developing the list of errors that would cause the harm for the operations. The defect research would be based on the analysis of the kernel for the common security threats affecting the vulnerabilities of the mobile platform. The native code execution of C language and C++ language also results in forming the hidden danger for the security considerations of the mobile data security (Kortjan and Von Solms 2014, pp-35). The complete security consideration for the mobile data terminal would be based on the security sandbox that is present in Linux kernel and the permissions while installation. There are many security issues that not related to the platform selected for the development of the mobile data terminal. The passwords, user information, and other sensitive data would be stored in the mobile data terminal and the requirement for keeping the information safe from the infiltration would be required in the for fire and rescue services. According to Korpela (2015, pp-73), the passing of information in a non encrypted form would also result in forming the possible issues for the operations and moreover, intent mechanism flaw is also a major flaw for the android operations.
According to Kortjan and Von Solms (2014, pp-35), many fire and rescue services have introduced mobile based system for their fire and rescue service activities as it have helped them in reaching the customers on larger scale. The deployment of the functional development of the activities for the online operations would be assisted by the implication of the functional development. The use of the effective project execution would imply the deployment of the professional development functions. The utilization of the specific deployment would be helpful for considering the alignment of the activities favouring the utilization of the improved functional development model (Luiijf and te Paske 2015). The implication would be helpful for aligning the possibility of adjusting global operations. The deployment of the functional development of the activities for the online operations would be assisted by the implication of the functional development. The use of the effective project execution would imply the deployment of the professional development functions. The policies included in the development of the authentication for the information processing in mobile data terminal for the fire and rescue operations would include,
- Development of the respect for the business requirements
- Development of the policy for controlling the information access
- Controlling the access to the networks and its varied services
- Management of the access rights for all the users present in the system
- Development of the process for the user registration for the system
- Setting up the user access controlling the user provision process in the system
- Setting up the restriction for controlling the secret authentication services
- Privileged rights for access should be restricted for being used
- Access rights would be limited to the alignment of the proper development and execution
- Review of rights affecting the access in the system after specific intervals
- User Authentication would be encrypted for protection from being misused
- Restriction of the information access and the application use
- Formal Password protection for the user development
- Utility programs and source codes would be controlled
Other Security Lockdown Requirements
The various authentication operations would include the following facilities,
Password Protection: The use of the password protection would be helpful for developing the support and development of the proper documentation would be aligned for using the formation of the effective and alignment methods (Luiijf and te Paske 2015). The utilization of the password protection would be developed for forming the alignment of the support and development. The use of the password protection would be aligned for the development of the effective alignment processing for the development of the listing of professional development of the activities. The password protection would be required for the development of the improved limitation of the processes.
Public key cryptosystem: The use of the public key cryptosystem would be helpful for developing the support and development of the proper documentation would be aligned for using the formation of the effective and alignment methods. According to Luiijf and te Paske (2015), the utilization of the public key cryptosystem would be developed for forming the alignment of the support and development. The use of the public key cryptosystem would be aligned for the development of the effective alignment processing for the development of the listing of professional development of the activities. According to Bada and Sasse (2014), the setting up the user access controlling the user provision process in the system would be helpful for forming the effective identification of the user that can help in forming the proper authentication in the organization. The access set up of the users with the effective alignment of the proper documentation would help the users with the development of the access control for the mobile data terminal of fire and rescue services. The public key cryptosystem would be required for the development of the improved limitation of the processes. The management of the access rights for all the users present in the system would provide successive functions that would limit the information access in the fire and rescue services (Arachchilage and Love 2014, pp-306). The access rights would also be helpful for supporting the alignment of the possible factors that are limited by the formation of the improved communication and development. It is possible that the access rights functions would help in easing the alignment of the improved functional and development factor for the organization.
Hash functions: The use of the hash functions would be helpful for developing the support and development of the proper documentation would be aligned for using the formation of the effective and alignment methods (Von Solms and Roussel 2015, pp-157). The utilization of the hash functions would be developed for forming the alignment of the support and development. The use of the hash functions would be aligned for the development of the effective alignment processing for the development of the listing of professional development of the activities. According to Bada and Sasse (2014), the setting up the user access controlling the user provision process in the system would be helpful for forming the effective identification of the user that can help in forming the proper authentication in the organization. The access set up of the users with the effective alignment of the proper documentation would help the users with the development of the access control for the mobile data terminal of fire and rescue services. The hash functions would be required for the development of the improved limitation of the processes. The management of the access rights for all the users present in the system would provide successive functions that would limit the information access in the fire and rescue services (Arachchilage and Love 2014, pp-306). The access rights would also be helpful for supporting the alignment of the possible factors that are limited by the formation of the improved communication and development. It is possible that the access rights functions would help in easing the alignment of the improved functional and development factor for the organization.
Security Standards and Recommendations
Digital signature: According to Bada and Sasse (2014), the setting up the user access controlling the user provision process in the system would be helpful for forming the effective identification of the user that can help in forming the proper authentication in the organization. The access set up of the users with the effective alignment of the proper documentation would help the users with the development of the access control for the mobile data terminal of fire and rescue services. The use of the digital signature would be helpful for developing the support and development of the proper documentation would be aligned for using the formation of the effective and alignment methods (Al-Janabi and Al-Shourbaji 2016, p.1650007). The utilization of the digital signature would be developed for forming the alignment of the support and development. The use of the digital signature would be aligned for the development of the effective alignment processing for the development of the listing of professional development of the activities. The digital signature would be required for the development of the improved limitation of the processes. The management of the access rights for all the users present in the system would provide successive functions that would limit the information access in the fire and rescue services (Arachchilage and Love 2014, pp-306). The access rights would also be helpful for supporting the alignment of the possible factors that are limited by the formation of the improved communication and development. It is possible that the access rights functions would help in easing the alignment of the improved functional and development factor for the organization.
CIA Triad Assessment
Confidentiality |
Integrity |
Availability |
The information for the mobile terminal data security would be highly confidential |
The information stored would be integrated for the development of the effective information |
It should be available in case of emergency and compatibility. |
The two main types of access control requirements for the mobile terminal data security of fire and rescue services were physical access controls and logical access controls (Bada and Sasse 2014). The combination of the two access controls would be helpful for the implementation of the improved security considerations for the organizational development. The utilization of the successive improvement methods would help them in taking care of the operations that would support the alignment of the successful integration development. The implication of the effective and profound system development for the security consideration would be helpful for the execution of the operations aligning with the Microsoft security considerations. The windows security domain (users, computers, sites) would be aligned with the active directories for forming the effective security considerations (Von Solms and Roussel 2015, pp-157). The key research methods adopted for the study of the probable security issues for the development of the mobile data terminal for the fire and rescue operation services had been program security analysis, data security protection, and defect research. The combination of the three methods of research had been helpful for developing the list of errors that had cause the harm for the operations. According to (Al-Janabi and Al-Shourbaji 2016, p.1650007), the defect research had been based on the analysis of the kernel for the common security threats affecting the vulnerabilities of the mobile platform. The native code execution of C language and C++ language also results in forming the hidden danger for the security considerations of the mobile data security (Fenz, Plieschnegger and Hobel 2016, pp-452). The complete security consideration for the mobile data terminal had been based on the security sandbox that is present in Linux kernel and the permissions while installation. There are many security issues that not related to the platform selected for the development of the mobile data terminal. The passwords, user information, and other sensitive data had been stored in the mobile data terminal and the requirement for keeping the information safe from the infiltration had been required in the for fire and rescue services (Alotaibi et al. 2016). The passing of information in a non encrypted form had also result in forming the possible issues for the operations and moreover, intent mechanism flaw is also a major flaw for the android operations. According to Fenz, Plieschnegger and Hobel (2016, pp-454), the following are the ISO27002 guidelines of access control for the security system lockdown requirements,
Summary and Professional Reflection
Business Requirement Identification: The development of the respect for the business requirements for the mobile data terminal of fire and rescue operations would be deployed for easing the processing of the smart development and alignment of the facilities supporting the implication of the successive activity development model (Alotaibi et al. 2016). The identification of the business requirements would be required for executing the successful deployment of the analysis.
Access rights: The management of the access rights for all the users present in the system would provide successive functions that would limit the information access in the fire and rescue services (Arachchilage and Love 2014, pp-306). The access rights would also be helpful for supporting the alignment of the possible factors that are limited by the formation of the improved communication and development. It is possible that the access rights functions would help in easing the alignment of the improved functional and development factor for the organization.
User Registration: The development of the process for the user registration for the system would be helpful for forming the effective identification of the user that can help in forming the proper authentication in the organization (Arachchilage and Love 2014, pp-306). The registration of the users with the effective alignment of the proper documentation would help the users with the development of the access control for the mobile data terminal of fire and rescue services.
User Access set up: According to Bada and Sasse (2014), the setting up the user access controlling the user provision process in the system would be helpful for forming the effective identification of the user that can help in forming the proper authentication in the organization. The access set up of the users with the effective alignment of the proper documentation would help the users with the development of the access control for the mobile data terminal of fire and rescue services.
User restriction set up: Setting up the restriction for controlling the secret authentication services would be helpful for forming the effective identification of the user that can help in forming the proper authentication in the organization (Alotaibi et al. 2016). The restriction set up of the users with the effective alignment of the proper documentation would help the users with the development of the restriction control for the mobile data terminal of fire and rescue services.
Lockdown Requirements for security Threats
Privileged rights: The management of the privileged rights for all the users present in the system would provide successive functions that would limit the information access in the fire and rescue services (Cruz et al. 2014, pp-59). The privileged rights would also be helpful for supporting the alignment of the possible factors that are limited by the formation of the improved communication and development. It is possible that the privileged rights functions would help in easing the alignment of the improved functional and development factor for the organization.
Access Control: The controlling of the access to the networks and its varied services would provide successive functions that would limit the information access in the fire and rescue services (Arachchilage and Love 2014, pp-306). The access control would also be helpful for supporting the alignment of the possible factors that are limited by the formation of the improved communication and development. It is possible that the access control functions would help in easing the alignment of the improved functional and development factor for the organization.
Disadvantages of Lockdown
Limitation of access rights: The management of the limitation of access rights for all the users present in the system would provide successive functions that would limit the information access in the fire and rescue services (Cruz et al. 2014, pp-59). The limitation of access rights would also be helpful for supporting the alignment of the possible factors that are limited by the formation of the improved communication and development. It is possible that the limitation of access rights functions would help in easing the alignment of the improved functional and development factor for the organization.
Information Access Limitation: The development of the policy for controlling the information access in the mobile data terminal would also be required for the formation of the effective and improved functional development operations (Basamh, Qudaih and Ibrahim 2014, pp-23). The information access limitation would be required for controlling the development of the specific data protection for fire and rescue operations.
Recommendations for Security Lockdown
Review of the access rights: The review of rights affecting the access in the system after specific intervals for all the users present in the system would provide successive functions that would limit the information access in the fire and rescue services (Yunos, Ab Hamid and Ahmad 2016, pp-1065). The timely review of access rights would also be helpful for supporting the alignment of the possible factors that are limited by the formation of the improved communication and development. It is possible that the timely review of access rights functions would help in easing the alignment of the improved functional and development factor for the organization.
Restriction of user access: The restriction of the information access and the application use for all the users present in the system would provide successive functions that would limit the information access in the fire and rescue services (Yunos, Ab Hamid and Ahmad 2016, pp-1066). The restriction of user access would also be helpful for supporting the alignment of the possible factors that are limited by the formation of the improved communication and development. It is possible that the restriction of user access functions would help in easing the alignment of the improved functional and development factor for the organization.
The internet security development had been eased due to the utilization of the improved functional and development factors (Bada and Sasse 2014). The internet communication processes had been eased for the simplification of the development factors so that the effective utilization could be deployed. The cyber security implication had been supported by the alignment of the possible development and integration operations. The improvement of the cyber activities had listed the utilization of the cyber system development for the fire and rescue services (Cruz et al. 2014, pp-59). Many fire and rescue services had introduced mobile based system for their fire and rescue service activities as it had helped them in reaching the customers on larger scale. The introduction of the Internet Cloud system has made it possible for all vendors to extend their fire and rescue service operations to a larger extend with the help of ecommerce platform and online activities. The utilization of the specific deployment had been helpful for considering the alignment of the activities favouring the utilization of the improved functional development model. The implication had been helpful for aligning the possibility of adjusting global operations (Mokha 2017). The deployment of the functional development of the activities for the online operations had been assisted by the implication of the functional development. The use of the effective project execution had implied the deployment of the professional development functions. The cyber security development had been implied for aligning with the mobile based system development (Valli, Martinus and Johnstone 2014). The cyber security issues had result in forming the major alignment of the hindrances for the development project. The issues of cyber security had resulted in listing the formation of the hindrance of security, privacy, misconception of the information of the mobile data terminal solution, and information of the mobile data terminal solution infiltration for the fire and rescue service operations. The alignment of the factors had aligned for the implication of the factors for security integration (Mokha 2017). The security issues had been dealt for aligning with the development of the factors that had help in easing the processes of the fire and rescue service operations development. The integration had been utilized for easing the processes developing the integration of the factors listing the utilization of the development factors (Eustace et al. 2018, pp-166). The study had been developed for integrating the successive alignment of the development consideration of the factor development for the fire and rescue service development. The study had list the various documentation and reports that are helpful for aligning with the factors of developing the improvement activities. The cyber security development would be implied for aligning with the mobile based system development. The cyber security issues would result in forming the major alignment of the hindrances for the development project.
I had been studying the prospect of the cyber security activities for the various fire and rescue services. The study had also helped me in defining the simplification of the cyber security authorization processes for the fire and rescue service. It would also help me in forming the effective reports that can be used for improvement of the development. The study allowed me to define the integration of the factors for lining with the use of the improved development models. The listing of the various issues and integration operations would be deployed for integrating the integration of the factors that can deploy the integration of the activities so that the professional activities would be deployed. The study was developed for considering the effective simplification of the activities that is favourable for the integration of the activities. The integration would be helpful for forming the utilization of the improved functional development factors. The alignment would be deployed for easing the professional development models so that the integration could be evaluated. I had been successful for aligning the implication of the proper system development. The implication has helped me in developing an understanding for the execution of the successful integration would combine the implication of professional development factors. The study allowed us for configuring the alignment of the activities so that the security for the mobile information of the mobile data terminal solution terminal solution would be possible. The case study of fire and rescue service helped me in understanding the needs of using the privacy system for the mobile information of the mobile data terminal solution terminal solution. The mobile information of the mobile data terminal solution terminal solution was deployed for easing the information of the mobile information of the mobile data terminal solution terminal solution access for the fire truck operators in locating the final organization development.
References
Abawajy, J., (2014). User preference of cyber security awareness delivery methods. Behaviour & Information Technology, vol. 33, no. 3, pp.237-248.
Al-Janabi, S. and Al-Shourbaji, I., (2016). A study of cyber security awareness in educational environment in the Middle East. Journal of Information & Knowledge Management, vol. 15, no. 01, p.1650007.
Alotaibi, F., Furnell, S., Stengel, I. and Papadaki, M., (2016). A Review of Using Gaming Technology for Cyber-Security Awareness.
Arachchilage, N.A.G. and Love, S., (2014). Security awareness of computer users: A phishing threat avoidance perspective. Computers in Human Behavior, vol. 38, pp.304-312.
Bada, M. and Sasse, A., (2014). Cyber Security Awareness Campaigns: Why do they fail to change behaviour?.
Basamh, S.S., Qudaih, H.A. and Ibrahim, J., (2014). An overview on cyber security awareness in Muslim countries. International Journal of Information and Communication Technology Research, vol. 4, no. 1, pp.21-24.
Bullée, J.W.H., Montoya, L., Pieters, W., Junger, M. and Hartel, P.H., (2015). The persuasion and security awareness experiment: reducing the success of social engineering attacks. Journal of experimental criminology, vol. 11, no. 1, pp.97-115.
Coventry, L., Briggs, P., Jeske, D. and van Moorsel, A., (2014), June. Scene: A structured means for creating and evaluating behavioral nudges in a cyber security environment. In International Conference of Design, User Experience, and Usability (pp. 229-239). Springer, Cham.
Cruz, T., Proença, J., Simões, P., Aubigny, M., Ouedraogo, M., Graziano, A. and Yasakhetu, L., (2014), July. Improving cyber-security awareness on industrial control systems: The CockpitCI approach. In 13th European Conference on Cyber Warfare and Security ECCWS-(2014) The University of Piraeus Piraeus, Greece (p. 59).
Eustace, K., Islam, R., Tsang, P. and Fellows, G., (2018). Human Factors, Self-awareness and Intervention Approaches in Cyber Security When Using Mobile Devices and Social Networks. In Security and Privacy in Communication Networks: SecureComm (2017) International Workshops, ATCS and SePrIoT, Niagara Falls, ON, Canada, October 22–25, (2017), Proceedings vol. 13 (pp. 166-181). Springer International Publishing.
Fenz, S., Plieschnegger, S. and Hobel, H., (2016). Mapping information security standard iso 27002 to an ontological structure. Information & Computer Security, 24(5), pp.452-473.
Hall, M.J., Hansen, D.D. and Jones, K., (2015), June. Cross-domain situational awareness and collaborative working for cyber security. In Cyber Situational Awareness, Data Analytics and Assessment (CyberSA), (2015) International Conference on (pp. 1-8). IEEE.
Han, J.W., Hoe, O.J., Wing, J.S. and Brohi, S.N., (2017), December. A Conceptual Security Approach with Awareness Strategy and Implementation Policy to Eliminate Ransomware. In Proceedings of the (2017) International Conference on Computer Science and Artificial Intelligence (pp. 222-226). ACM.
Hendrix, M., Al-Sherbaz, A. and Victoria, B., (2016). Game based cyber security training: are serious games suitable for cyber security training?. International Journal of Serious Games, 3(1), pp.53-61.
Knowles, W., Prince, D., Hutchison, D., Disso, J.F.P. and Jones, K., (2015). A survey of cyber security management in industrial control systems. International journal of critical infrastructure protection, vol. 9, pp.52-80.
Kokkonen, T., Hautamäki, J., Siltanen, J. and Hämäläinen, T., (2016), May. Model for sharing the information of cyber security situation awareness between organizations. In Telecommunications (ICT), (2016) 23rd International Conference on (pp. 1-5). IEEE.
Korpela, K., (2015). Improving cyber security awareness and training programs with data analytics. Information Security Journal: A Global Perspective, 24(1-3), pp.72-77.
Kortjan, N. and Von Solms, R., (2014). A conceptual framework for cyber-security awareness and education in SA. South African Computer Journal, 52(1), pp.29-41.
Kurniawan, E. and Riadi, I., (2018). Security level analysis of academic information systems based on standard ISO 27002: 2003 using SSE-CMM. arXiv preprint arXiv:1802.03613.
Le Compte, A., Elizondo, D. and Watson, T., (2015), May. A renewed approach to serious games for cyber security. In Cyber conflict: Architectures in cyberspace (CyCon), (2015) 7th international conference on (pp. 203-216). IEEE.
Luiijf, H.A.M. and te Paske, B.J., (2015). Cyber security of industrial control systems. TNO.
McCormac, A., Zwaans, T., Parsons, K., Calic, D., Butavicius, M. and Pattinson, M., (2017). Individual differences and information security awareness. Computers in Human Behavior, 69, pp.151-156.
Mokha, A.K., (2017). A Study on Awareness of Cyber Crime and Security. Research Journal of Humanities and Social Sciences.
Nobles, C., (2018). Cyber threats in civil aviation. In Cyber Security and Threats: Concepts, Methodologies, Tools, and Applications (pp. 1185-1207). IGI Global.
Raman, R., Lal, A. and Achuthan, K., (2014), March. Serious games based approach to cyber security concept learning: Indian context. In Green Computing Communication and Electrical Engineering (ICGCCEE), (2014) International Conference on (pp. 1-5). IEEE.
Safa, N.S., Von Solms, R. and Furnell, S., (2016). Information security policy compliance model in organizations. Computers & Security, 56, pp.70-82.
Safa, N.S., Von Solms, R. and Futcher, L., (2016). Human aspects of information security in organisations. Computer Fraud & Security, (2016)(2), pp.15-18.
Valli, C., Martinus, I. and Johnstone, M., (2014), January. Small to medium enterprise cyber security awareness: an initial survey of Western Australian business. In Proceedings of the International Conference on Security and Management (SAM) (p. 1). The Steering Committee of The World Congress in Computer Science, Computer Engineering and Applied Computing (WorldComp).
van Schaik, P., Jeske, D., Onibokun, J., Coventry, L., Jansen, J. and Kusev, P., (2017). Risk perceptions of cyber-security and precautionary behaviour. Computers in Human Behavior, 75, pp.547-559.
Von Solms, B. and Roussel, J., (2015), November. A Solution to improve the cyber security of home users. In AFRICAN CYBER CITIZENSHIP CONFERENCE (2015) (ACCC(2015)) (p. 157).
Willson, D. and Dalziel, H., (2015). Cyber Security Awareness for Lawyers. Syngress.
Yunos, Z., Ab Hamid, R.S. and Ahmad, M., (2016), July. Development of a cyber security awareness strategy using focus group discussion. In SAI Computing Conference (SAI), (2016) (pp. 1063-1067). IEEE.