Our Services

Get 15% Discount on your First Order

[rank_math_breadcrumb]

Security Recommendations Reports

security recommendation for this attached document

Project Name

Group 2

University of Maryland Global Campus


ITEC 610 9041 Information Technology Foundations (2245)

Professor Tanis Stewart

June 24, 2024

1.
Setting and Situation

The Bureau of Research and Intelligence (BRI) is entrusted with the crucial responsibility of giving American diplomats intelligence from various sources, while strictly adhering to U.S. foreign policy and maintaining the utmost confidentiality. As advancements in technology emerge, new security and threats are presented.

BRI has encountered several significant breaches and challenges, which are as follows:

1. Network Compromise: State-sponsored hackers targeted BRI’s network, successfully gaining unauthorized access to sensitive intelligence data.

2. Misuse of Personal Email: The bureau chief utilized personal email for official purposes, thereby jeopardizing the exposure of sensitive information to potential risks.

3. HR System Breach: A flaw in the HR system allowed authorized individuals to access employees’ personal information. Unfortunately, the cause of this breach remains undetermined and unresolved.

4. Stolen Laptop: A teleworker’s laptop, containing classified information, was stolen and remains unrecovered, posing a significant security concern.

5. Contractor Leak: A contractor leaked classified documents, thereby exposing confidential communication between diplomats and the President, which is highly sensitive.

6. Malware Infection: Computers within various foreign embassies fell victim to malware infections, resulting in security risks and causing public embarrassment for the affected parties.

As a result of these reports, the U.S. Accountability Office conducted a thorough examination of BRI’s information security, and several vulnerabilities were identified:

Identification and Authentication Controls

It was discovered that the passwords in use were short and did not have an expiration date, making them the sole means of authentication. This posed a significant risk as it increased the likelihood of unauthorized access to sensitive data.

Authorization Controls

The access privileges granted to users were excessive, and the management of databases was poorly executed, with all operations being carried out under single accounts. This lack of proper oversight and control created an environment where potential breaches could occur undetected.

Data Security

It was observed that data-at-rest was not encrypted, leaving sensitive information vulnerable to unauthorized access. This lack of encryption meant that even unclassified databases could potentially be exploited to derive sensitive information.

System Security

The utilization of outdated WEP standards posed a significant risk. This allowed personal devices to connect to the network, potentially compromising the security of the entire system.

Additionally, it was found that BRI lacked comprehensive plans for incident recovery. This absence of a clear strategy, coupled with infested security controls and inconsistent patching, left the organization susceptible to prolonged disruptions and potential data breaches.

Physical Security

Unauthorized personnel gained access to secure areas, and former employees retained access privileges even after leaving the organization. This lack of proper access management and control further increased the risk of unauthorized access and potential data breaches.

End User Security

It was noted that security training provided to employees was minimal, and the use of social media was allowed in restricted areas. Additionally, public cloud services were utilized for data storage, which introduced additional security concerns. Furthermore, there were no ongoing background checks or policies in place for handling classified information, leaving the organization vulnerable to insider threats.

2.
Risk Assessment Methodology

There have been some high-profile security incidents at the Bureau of Research and Intelligence. Therefore, a comprehensive risk assessment had to be conducted. The methodology followed by the IT security consultant team in this regard conforms to what has been laid down by the National Institute of Standards and Technology. It represents a structured way of identifying, evaluating, and prioritizing risks to enhance the overall security posture at BRI.

The risk assessment methodology was based on NIST’s “Guide for Conducting Risk Assessments” (Special Publication 800-30). This framework provided a structured process to assess and manage risks, thus ensuring that all factors within BRI’s information technology environment were adequately reviewed. The methodology started with the setup phase, which included the definition of the purpose, scope, assumptions, and assessment constraints. The key objective of the exercise was to identify security risks that could have been used to compromise the functions and properties of BRI. The scope of risk assessment was quite extensive as it covered all IT systems and processes within BRI. Nevertheless, areas primarily attacked in the past, according to recent incidents, were the significant targets, while constraints included limited time and access.

Various critical activities were at the center of the risk assessment process. First, there was the identification of threats. Sources had to be identified that could act as a weakness to the vulnerabilities existing within BRI’s IT environment. This would entail nation-state actors, insider threats, and external hackers. So, sources of those threats had to be pointed out to better understand the different avenues through which BRI’s security could be jeopardized.

The group then went on to target the vulnerabilities within the IT infrastructure of BRI. Among them were weak password policies, overprivileged users, no data-at-rest encryption, and outdated security protocols that enhanced unauthorized access and exposed the threat of breaches. Analysis of these weaknesses helped the team identify where BRI’s security defenses were most vulnerable. The team then analyzed the possible impact that could have been the case upon the exploitation of these vulnerabilities and threats identified. This includes impacts such as data breaches, loss of sensitive information, and operational disruptions in BRI activities. Knowledge of the extent to which such impacts are necessary for risk prioritization.

The next step was the likelihood assessment of each identified threat that would potentially exploit a vulnerability. The assessment considers the historical data, aggregates threat vectors from intelligence, and assesses the current security posture in BRI. The joining of these two independent assessments, impact and likelihood assessments, gave a comprehensive overview of the possible Stygian threats against the IT setup deployed in BRI. As such, the team could review and prioritize those risks that needed immediate attention.

Subsequently, the assessment results were documented and detailed reports were prepared that gave directions and recommendations for all identified risks and their possible impacts and mitigation strategies. This report is to be presented to relevant parties so that they are informed of these security risks and how much effort each one needs to put in to handle them effectively.

The risk assessment methodology underpinned several essential reference materials and resources. The chief resource was the NIST publications, which presented a number of risk management principles and frameworks, ensuring the methodology’s conformance to industry standards. The SANS Reading Room provided a good volume covering white papers on different aspects of information technology security, which gave insight into the latest security trends and best practices. Publications and alerts from the United States Computer Emergency Readiness Team were also quite enlightening about new and emerging threats and vulnerabilities. Other sources, including CSO Magazine, Information Security Magazine, and Homeland Security News Wire, were tapped for updates and other information to keep the risk assessment framework current and relevant.

3. Risk Assessment Plan

4. Risk Assessment Findings

5. Security Recommendations Reports

6. Conclusion

Reference:

Stewart, T. (2024, June). ITEC 610 PROJECT DESCRIPTIONS: IT Security Risk Assessment. Reading.

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

LAB

See attached. Lab3: Defining a Security Policy Framework In this lab, you will research security policy frameworks. Next, you will determine the appropriate security policy definitions to mitigate specific risks, threats, or vulnerabilities. You will organize your results into a framework that can become part of a layered security strategy.

Health Information Tech

For this assignment discussion board, you will be selecting a specialty drug to research and share with the class.  After selecting a specialty drug, answer the following questions.  Remember, specialty drugs are high-cost drugs (more than $1,000/month) that treat rare chronic diseases. (Please make sure to include question numbers in

Discussion

What would be your approach to introduce potential information systems security (ISS) risks to management? Also, how could you enforce the security controls if policies were created based on your recommendations?  Course Textbook(s) Johnson, R., & Easttom, C. (2022). Security policies and implementation issues (3rd ed.). Jones & Bartlett Learning.

Health Insurance Exchange

See attached  Instructions For this assignment, you will research and analyze four insurance plans offered by a federally facilitated health insurance exchange (marketplace). Download the Excel “Health Insurance Exchange Assignment Template” which includes a completed submission example on one sheet and a blank template for you to complete. Part One:

cybersecurity

Page 1 of 1 Background In the past several years, the list of companies whose internal systems have been hacked has grown rapidly. Unfortunately, investment in security measures is only part of the answer. To be effective, managers in charge of cybersecurity need to adjust their mindsets and become as

Health

See attached instructions  Objectives  To gain familiarity with the Health Insurance Exchange (Marketplace) website (healthcare.gov).  To reinforce the process of “buying” insurance.  To understand the cost-sharing differences (or lack thereof) between plans.  To practice analysis of plans for decision making. Instructions For this assignment, you will

diagram types

  For this week’s discussion, we have decided to move forward with the software development. We are looking at some tools that allow us to better look at the upcoming project. There are several diagrams that all have different purposes of showing other things about the project. Of the following

CO

Capstone Design and Analysis of a Simple Computer System Objective: Students will design, simulate, and analyze the architecture of a simplified computer system, applying concepts from Stephen D. Burd’s materials such as the CPU, memory hierarchy, I/O, and instruction set architecture (ISA). Components: 1. System Design: . CPU Design: Create

error

Error Task  Introduction In this task, you will analyze and resolve duplicates and errors within a master patient index (MPI) in preparation for implementation into a health information exchange (HIE). Additionally, you will evaluate the quality of a data dictionary and create a presentation to summarize your findings.    The

Information Systems Assignment

See attached · Watch the video below: Using Microsoft Word, write two paragraphs total of at least 250 words each (more is acceptable) to address the following prompts: · 1st paragraph: What are the health care entities involved in Joey’s continuum of care?  Identify and describe these entities and the

CSIS 484

Discussion Thread: System Design and Interaction with God CSIS 484 Discussion Assignment Instructions The student will complete 2 standard Discussions in this course. The student will post one thread of at least 400 words by 11:59 p.m. (ET) on Thursday of the assigned Module: Week. The student must then post

Data models

Need to design Erwin and one one excel, data models.  1. star schema 2. Normalised 3. denotmalised i have attached two reports and I will need you to design the data models for  report A and report B. the attachments talk about the file layout for report a and report

Research

Healthcare settings  In this task, you will use a scenario and hypothetical data in a spreadsheet to identify and analyze trends from a healthcare setting. You will also create a memo that summarizes all your findings.    The purpose of this task is to recognize the impact of healthcare IT

Project Management

  The cost, time, and scope of a project are how the Project Manager controls a project. There are tools that are needed to help keep the project on time and on budget. If you are managing a large project, would you prefer Gantt charts or PERT/CPM charts to represent

Competencies

Please see attached details DAT 250 Project Two: Organizational Scenarios Scenario A: AmityTech Solutions (CCPA and GDPR) AmityTech Solutions is a well-established technical management company based in North America, providing comprehensive data management services to businesses across various industries. AmityTech specializes in offering secure data solutions, robust server infrastructure management,

Module 02 Course Project – Statement of Work and Project Plan

Table of Contents Introduction/Background 1 Scope of Work 2 Period of Performance 2 Place of Performance 2 Work Requirements 2 Schedule/Milestones 2 Acceptance Criteria 2 Other Requirements 2 Module 02 SOW [Insert Name] Network Administration Capstone Module 02 SOW [Insert Name] Network Administration Capstone 2 Introduction/Background Introduction/Background: The Statement of

Please see attached

Answer the following questions below with answers that states and justifies your position on the questions posted below. Support your ideas. Your post should be at least 500 words (maximum 550 words), formatted and cited in current APA style with support from at least 2 academic sources · What is