Business Obligations
1. In terms of cyber security requirements and obligations, explain:
a) Business obligations
b) Regulatory obligations
c) Customer obligations
In order to meet cyber security requirements, it is a must for the organization to meet the following requirements:
- Business Obligations: The company needs to fulfill its commitment in regards to security. This states that the management needs to ensure that the company’s information like customer data, employee data should be kept highly secured (Infotech, 2022).
- Regulatory Obligations: The company’s security team must meet the legal, compliance, or contractual duties. These restrictions vary by industry and are tailored to each country’s regulations in order to increase customer trust (SSH, 2022). For example, Payment card industry standards state that any business that accepts credit card payments must keep and transmit credit card information during and after a transaction.
- Customer Obligations: These Obligations refer to the security commitments that the company must make in order to meet its customers’ security obligations. (Infotech, 2022). For example, if an employee works in the manufacturing industry, a customer can ask him to encrypt all of his confidential blueprint files.
2. Define and provide five examples of cyber security procedures.
5 examples of cyber security procedures are listed below:
- Acceptable use practices: It specifies the procedures that a user of an IT organization’s resources must follow in order to gain access to the company’s network. (Hayslip, 2018).
- Disaster recovery plan: This is a broader component of the business continuity plan that includes suggestions from both IT and cyber security teams on how to deal with the issue that has arisen as a result of the disaster. (Ritchie, 2022).
- Information security policy: This policy covers several security controls that ensure that the organizations, confidential information is highly protected. For doing this, many organizations ask their employees to sign a contract that makes them accountable to secure corporate information.
- Business Continuity plan: The policy explains how the company will continue to operate in an emergency to cope with a potential threat in order to stay in business in the long run. (Ritchie, 2022).
- Remote access Policy: This policy outlines how employees will connect to the company’s internal network while working remotely. Organizations may find the policies useful in securing their networks in unknown situations such as a corona epidemic (Reciprocity, 2022).
3. What is a cyber security framework? What are the seven most popular ITC security frameworks in Australia?
Cyber security framework is the combination of best practices that the company should use to be in a better position to manage their cyber security risks. The seven most popular ITC security framework has been listed below:
- Australian Signal Directorate
- National Institute of Standard and Technology
- Royal Australian college of general practitioner
- International Organization of Standard
- The computer emergency response team
- The protective security policy framework
- Certified Practicing Accountant (Standfield, 2019).
4. What is the aim of application security?
The aim of application security is to secure the confidential data within the application one is operating (vmware, 2022). Application security contains all activities that brief a safe software development life cycle to grow teams. The last aim of application security is to enhance safety practice and through that, to identify, fix and preferably stop safety issues within the application. Moreover, application safety is the procedure of developing, testing and adding safety features within the application to stop safety vulnerability against risks like unauthorized access and modification.
5. Explain:
a) Disaster recovery policies
b) Business continuity planning
a) Disaster recovery policies is a recovery plan that acts as a support to Organisation’s policies and procedures in implementing the recovery processes appropriately (Druva, 2022). For doing this, the appropriate team responsible for managing the disaster must take corrective actions to ensure that the business is able to quickly recover from it.
b) Business continuity planning is the process of developing preventive and recovery procedures to deal with potential cyber hazards to a company or to assure process continuity following a cyberattack. Apart from that, it ensures operational continuity before and during the implementation of the disaster recovery plan (AWS, 2022).
6. What does an operational security policy include?
Operational security policy explains how the organization’s operational functions are carried out throughout the year in order to maintain confidentiality. The key focus areas of the policy include risk analysis, scanning for vulnerabilities and ensuring that host configurations are compliant, bug fix management, reporting on an incident, etc (IRS, 2022). Moreover, the operational security policy permits high safety within the business information processing services.
7. List and explain three network security tools and techniques to deal with threat vectors and cyber-attacks.
Regulatory Obligations
The three network security tools and techniques that help to deal with the threat vector and cyber attach are listed below:
- Encryption tools: It protects the data by unscrambling the text so that it becomes unreadable by unauthorized users (Brainstation, 2022).
- Antivirus software: This software is designed with the purpose to detect viruses and other harmful malware in order to protect the system
- Network instruction detection: The role of these network tools is to analyse the data that is associated with the network in order to detect internal as well as external network-based threats (Brainstation, 2022).
8. In terms of designing infrastructure requirements, provide four of the most critical technical requirements.
While designing infrastructure, it is important for the Organization to pay heed to the technical requirements of the contract. Some of the main technical requirements are listed below:
- Project designing as well as construction requirements
- Performance requirements (increased network availability)
- Maintenance of Performance requirements
- Other technical assessments are mainly related to preparatory practices (APMG International, 2022).
9. How can a documentation tool can help with the creation of a robust implementation plan?
Cybersecurity documentation is regarded as a vital tool for the employees to be well informed about the standard operating procedure that discloses the attack that takes place on a digital (internet) level. The documentation enables them to be well prepared to deal with the breach that happens in the internet security. This further is helpful for them to remove any chaos and take step by step approach to solve the network issue in a timely and efficient manner (bakertilly, 2022).
10. Briefly explain:
a) Firewalls
b) Intrusion Detection System (IDS)
c) Intrusion Prevention System (IPS)
a) Firewalls is a network security device that effectively monitors as well as filters both incoming and outgoing network traffic that is highly dependent on previously set security policies within the Organisations (Norton, 2022).
b) An intrusion detection system (IDS) is software that monitors a web server and detects malicious activities in real-time. (Barracuda, 2022). Based on this notification a security operation centre analyst and event respondent can examine the matters and take the suitable task to remediate the risk.
c) Intrusion Prevention System (IPS) is a network security system that carefully analyses traffic patterns in the internet network to identify and prevent risks. (Palo Alto Networks, 2022). Moreover, Intrusion Prevention System is a tool that continuously monitors a link for malicious activity and takes action to stop it.
11. Briefly explain:
a) Australian Signals Directorate
b) National Institute of Standards and Technology
a) Australian Signals Directorate is one crucial member of Australia’s national security community. The company supports the Australian government by the way of law enforcement and criminal intelligence activities. Their main aim is to detect criminal activities in a timely manner and prevent such incidents from occurring in the Australian network (Austrilian Government, 2022).
b) National Institute of Standard and Technology is engaged in providing a combination of services that comprise measurements, standards, legal metrology, etc. to provide solutions for measurement traceability, quality assurance, and the harmonization of documented standards and regulatory norms (NIST, 2022).
12. What is the International Organisation for Standardisation (ISO)?
International Organization for Standardisation (ISO) is the world’s largest Organisation that monitors the work of other organizations by engaging in auditing the company’s quality management system (9000Store, 2022).
References
9000Store. (2022). Who is ISO? Retrieved from 9000store: https://the9000store.com/articles/who-is-iso/
APMG International. (2022). Designing the Technical Requirements. Retrieved from APMG International: https://ppp-certification.com/ppp-certification-guide/42-designing-technical-requirements
Austrilian Government. (2022). Australian Signals Directorate. Retrieved from Austrilian Government:
https://www.careersinintelligence.gov.au/who-we-are/nic-agency-roles/australian-signals-directorate
AWS. (2022). Business Continuity Planning. Retrieved from AWS:
https://docs.aws.amazon.com/whitepapers/latest/disaster-recovery-workloads-on-aws/business-continuity-plan-bcp.html
bakertilly. (2022). Cybersecurity management: implementing cybersecurity controls. Retrieved from bakertilly:
https://www.bakertilly.com/insights/cybersecurity-management-implementing-cybersecurity-controls
Barracuda. (2022). What is a Intrusion Detection System? Retrieved from Barracuda:
https://www.barracuda.com/glossary/intrusion-detection-system
Brainstation. (2022). Cybersecurity Tools. Retrieved from Brainstation: https://brainstation.io/career-guides/what-tools-do-cybersecurity-analysts-use
Druva. (2022). Disaster recovery plan definition. Retrieved from Druva: https://www.druva.com/glossary/what-is-a-disaster-recovery-plan-definition-and-related-faqs/
Hayslip, G. (2018, Mar 16). CSO. Retrieved from https://www.csoonline.com/article/3263738/9-policies-and-procedures-you-need-to-know-about-if-youre-starting-a-new-security-program.html
Infotech. (2022). Satisfy Customer Requirements for Information Security. Retrieved from Infotech:
https://www.infotech.com/research/ss/satisfy-customer-requirements-for-information-security
IRS. (2022). Operational Security Policies and Procedures. Retrieved from IRS: https://www.irs.gov/privacy-disclosure/operational-security-policies-and-procedures
NIST. (2022). MEASURE. INNOVATE. LEAD. Retrieved from NIST: https://www.nist.gov/
Norton. (2022). What is a firewall? Firewalls explained and why you need one. Retrieved from Norton:
https://us.norton.com/internetsecurity-emerging-threats-what-is-firewall.html
Palo Alto Networks. (2022). What is an Intrusion Prevention System? Retrieved from Palo Alto Networks:
https://www.paloaltonetworks.com/cyberpedia/what-is-an-intrusion-prevention-system-ips
Reciprocity. (2022). Why Are Remote Access Policies Important? Retrieved from Reciprocity:
https://reciprocity.com/resources/why-are-remote-access-policies-important/
Ritchie, D. (2022). How to Create a Cybersecurity Disaster Recovery Plan. Retrieved from Readwrite:
https://readwrite.com/cybersecurity-disaster-recovery-plan/
SSH. (2022). Regulatory Compliance in Cybersecurity. Retrieved from SSH: https://www.ssh.com/academy/compliance
Standfield, N. (2019, Oct 8). The 7 Most Common IT Security Framework Options in Australia. Retrieved from Standfield IT: https://www.stanfieldit.com/it-security-framework/
vmware. (2022). What is application security? Retrieved from vmware:
https://www.vmware.com/topics/glossary/content/application-security.html