Security assigment 2nd sem
Security assigment 2nd sem
As digital technologies have risen, colleges such as Colombo Advanced College (CAC) are
now based on high level IT solutions in function of key operations including lectures, student
handling of data, academic research, and administrative function. Having more than 2,500
students and 150 administrative staff, CAC manages a strong and complicated IT network. The
college recently became the target of a Ransonware attack which inflicted widespread damage
and halted its academic and administrative services. Evidently, the current defenses and
policies of the college were not sufficient in defending agains the advanced cyber risks they
experienced.
In my job as a Junior Network Security Professional at TechSecure Solutions (Pvt) Ltd. I have
to assess CAC’s security and develop a plan for increasing the cybersecurity framework of
CAC. The following assignment will look at different threats that the college poses including
Ransomware, Phishing attempts, unauthorized access, as well as the possibility of physical
intrusion. Moreover, the evaluation will examine the existing security measures currently
established, and explain why firewalls, intrusion detection, multi-factor authentication (MFA),
and encryption are critical to cybersecurity.
In the scope of Activity 1, I will identify critical IT security threats and consider
countermeasures that can be used in a physical and digital world. I will explain how network
monitoring; correct firewall rules, VPN’s configurations, DMZ’s and Static IPs all contribute
to enhanced network security through NAT. Also, I will present strategies for risk detection and
management to ensure that the college’s security and normal workings are assured.
In the following part of this assignment, additional information is given on how Colombo
Aadvanced College can adopt an efficient ISMS as per specification such as ISO/IEC 27001.
It requires bringing clear policies, adopting strategies on disaster resilience, maintaining the
level of consistent system re-examinations, training staff and students on cybersecurity and
having the place on a constant lookout for security falling-outs.
This task seeks to help the college to create a secure, trusted, and visionary technology
environment in which treasured data is guarded, legal necessities are met and smooth learning
and administrative processes are taken place.
Activity 2
Briefing Paper,
2.1 Introduction,
As education institutions in today’s world, it’s important for Colombo Advanced College to put
priority on cybersecurity, to protect the student and faculty data made sensitive by the
educational institution, maintain efficient operation of the institution and also to comply with
legal regulations. The college has recently been the victim of a ransomware attack, which goes
to show the holes in their IT infrastructure and security policies.
To face these challenges, Information Security Management System (ISMS) was to be
implemented. While implementing an ISMS structure IS data security (confidentiality,
integrity, availability) by identifying, assessing and mitigating risks to ensure the IS data
security. This serves the college well by allowing it to create a secure and robust IT environment
by aligning with internationally recognized standards such as ISO/IEC 27001.
2.2 Key principals of ISMS and it’s Importance for CAC (Colombo
advanced collage),
An educational institution of repute in areas of ICT, engineering, and business studies;
Colombo Advanced College deals with huge amounts of confidential data especially pertaining
to student records, research materials, and administrative information. This critical data must
be safeguarded and the operational efficiency maintained and this can only be achieved through
the Information Security Management System (ISMS). An ISMS puts into structure a
framework within the institution to ensure that information is covert, changeless and accessible
(CIA Triad), ensuring the institution is protected from cyber threats, for example, ransomware,
unapproved access and information breaches.
• Obviously, this facilitates the implementations of security controls, among others, like
robust firewalls, multi-factor authentication for faculty logins, and encrypted data
storage to protect sensitive information.
• Having separate plans and protocols for the recovery of their system and operations in
case of cyberattacks or any system failures.
• Adaptation of the security policies to the developing cyber security threats and
regulatory changes.
• Adopting the various ideas to train the students, faculty, and administrative staff so as
to make them aware about and stop potential security breaches.
• Sensitive Data Protection – The institution stores many student and personal
information. However, this data is on the verge of breaching if not with proper security
measures which would set one up for identity theft, fraud or even academic dishonesty.
• Increasing Regulations – By adopting such an ISMS, Sri Lanka is regulated under
Data Protection Act and ISO/IEC 27001 thereby the risk of penalties and legal problem
reduces.
• Loss of Student Confidence – A data breach can lead to lose of student’s trust, which
moves the line between education and learning and can affect education to an extent.
• The College’s Cyber threats – While a cyber threats like ransomware attack can affect
learning management systems and system administrative processes, the college must
be ready to continue its day-to-day operations. The ISMS is more significant,
guaranteeing that the essential systems shall remain accessible.
• Reducing Risks: When the college is proactively finding risks and taking the
appropriate action to address any risk of security issues, risks are greatly reduced. For
example, access controls restrict the critical data to read, only by the authorized
personnel to limit the risk of breaches.
• ISMS as Effective Crisis Response: In case of security breach ISMS gives clear set
of procedures for handling incidents with upshot that college can minimize the impact
and get a handle on quickly. This ensures that any disturbance is dealt so as to save the
college’s reputation.
Colombo Advanced College needs to address a number of crucial components and procedures
in order to establish and sustain an ISMS,
• Leadership Support - Successful implementation of an ISMS will demand the support
of the college’s leadership in helping set goals, allocation of resources and a view to
security on all levels.
• Communicate Information security policies - The college should develop the clear
information security policies regarding how information can be accessed, how user
accounts should be managed, how security incidents should be responded.
• Human Errors: (Training and Awareness) Regular training for staff & students in the
security practices like recognize the phishing attempts and password creating becomes
strong level will reduce the human errors which may compromise the security.
• Security Breach: The college and its processes need to be up to date on a security
breach, including occasion of incident, damage control, communication with
occasioned parties, and documentation to the relevant authorities.
• Regular Monitoring and Auditing: Monitoring and auditing should be done on regular
basis such as penetration test to find out vulnerability, if that system is still secure or
not.
• Evolution: The ISMS should develop continuously by incorporating feedback from
audit, incident report, etc. and updates in the security threats and regulations to ensure
its effectiveness.
By focusing on these crucial elements, Colombo Advanced College can develop a robust and
adaptable ISMS that ensures ongoing protection of its sensitive data.
2. Establish Objectives and Scope: Determine what specific aspects of the college’s
information needs be protected (e.g. student data and or faculty communications) as
well as specific, measurable goals supported by the institution’s priorities.
3. Produce: Security Policies and Procedures: Based on the results of the assessment,
prepare appropriate security policies and procedures covering the reduction of
identified risk issues and regular protection.
5. Train Staff and Students: Provide training to the staff and the students as the
responsibility of the staff and students within ISMS framework and cultivate a culture
of strong security conscious in the college.
6. Continuous Evaluation and Improvement: Always use the results of the evaluation of
the ISMS, conduct the regular audits, and use the feedback to enhance the system on a
continuous basis.
This will ensure that Colombo Advanced College will put in place a secure and adaptive ISMS
to safeguard its information.
2.9 Conclusion,
Situated at Colombo Advanced College, an Information Security Management System (ISMS)
must be implemented to protect sensitive data and keep the institution’s digital infrastructure
safe. If the college can follow a structed approach that evaluates current security measures, sets
the objective to deal with, implement strong policies and regularly evaluate the system, can
effectively mitigate risks and reduce the chances of security breaches. ISMS, with an emphasis
on the CIA Triad (Confidentiality, Integrity, Availability), will help the college avoid
noncompliance laws, enhance confidence from the shareholders, and streamline the operations.
Eventually, with the adoption of ISMS, Colombo Advanced College will ensure a secure
environment and continue to keep up its academic mission by taking care of data security as
well.
Activity 3
3.1 Introduction,
Educational institutions such as Colombo Advanced College (CAC) store and process gigantic
data volumes of sensitive data which includes student records, academic research and
administrative data, so data security is a paramount issue. After a ransomware attack has
recently been executed and it is figured we need more secured data security sensitive, this
review shall review existing data protection strategies at the college, analyze any legal
applicable frameworks and suggest improvements to the college’s IT security in light of the
whole college objectives.
2. Incident response: After the ransomware attack, the college has realized that it needs
better organized and proactive risk management approach.
Weaknesses,
1. Lack of Formal Framework: There is no consistency in the risk assessment procedures
and these do not address the complete aspects. There is not enough definition of key
components including data classification, risk prioritization, risk mitigation, etc.
2. Periodicness of Risk Assessments: There are no predefined or periodic risk
assessments, and as a result, the college might not pick up new risks in time.
Recommendation.
Therefore, Colombo Advanced College is suggested to develop an organizational risk
management framework such as ISO/IEC 27001 to help in systematic control of all information
security risks. More complete evaluation and more alignment with the college's overall goals
and objectives would be ensured by this.
With the reliance on digital systems Samsung at the CAC had to pay extra attention to data
protection strategies for the safeguard of student, faculty and research data. More specifically,
the college’s recent ransomware attack revealed tainted vulnerabilities in the framework of the
college’s security; therefore, the importance of following set data protection standards and
devising effective risk mitigation measures is undeniable.
Current Data Security Measures,
Colombo Advanced College employs many security methods to protect its digital assets,
• Encryption: Student records and research information are encrypted both in storage and
in transmission to avoid unauthorized access of miscellaneous data.
• Management of user access: Role based permissions are the access rule for accessing
the confidential information. Nevertheless, more actions are needed to apply tighter
access controls to prevent the access to sensitive data by anyone but essential personnel.
• Methods for Data Backup: Although CAC runs backup periodically, there is no such
automated solution nor geographically distributed backups, a considerable risk in case
of system wide failure.
• Procedures for Responding to incidents: On case bases, security breaches are handled
but lack a central incident management system which leads it to always be absent,
inconsistent track and delayed response.
Relevant Law and regulation Frameworks,
CAC must adhere to important data protection laws in order to preserve compliance and respect
moral data handling standards, such as,
• General Data Protection Regulation (GDPR): With the global collaborations of CAC,
paying attention to GDPR is not an option. It includes giving explicit consent by
implementation of explicit consent mechanisms, implementing privacy by design, and
notify of data breach within the 72-hour regulatory window.
• Sri Lanka Data Protection Act (Proposed): Sri Lanka is in late stage of formalizing its
data protection framework and CAC must proactively integrate the best practices as
much ahead in the compliance requirement to improve the protection of personal data.
• A change in Times: The growth in the awareness of the cyber threats is the institution’s
first step in the way of tackling future threats with incident response and data security.
• Undefined Data Ownership: In the absence of a clear policy on research data ownership,
the question of who owns the data, as well as who gets to determine how it will be
accessed, is undefined.
Suggested Improvements,
In order to improve its security posture, CAC ought to,
• Provide Scheduled Security Audits for evaluating GDPR and upcoming Sri Lanka’s
data protection law compliance.
• Also, we can implement Automated Backup Solutions such as offsite storage to protect
the data and recover it in the case of cyberattacks.
• Create a Centralized Incident Management System to smoothen the way for reporting
and response to the security incident.
• Define guidelines for who owns clear data for example, research data as well as student
records.
Thus, in taking these measures, CAC can set a secure security framework and comply to
regulatory requirements while safeguarding vital institutional data from growing cyber-attacks.
To continue to secure Colombo Advanced College (CAC) in the tactical, strategic, and
operational security theatre correctly, it is imperative that the current approach to risk
management at CAC aligns to international benchmarks. ISO/IEC 27001 is one of the most
known frameworks for this purpose, offer a structured methodology to set up an Information
Security Management System (ISMS) and reduce the risks of security effectively.
• Also, compliance assessment to make sure that CAC abides by data protection
regulations like GDPR and Sri Lanka’s Data Protection Act. As a result, the audit will
expose gaps in which the institution may not be fully compliant, helping avoid legal
and financial consequence for the company.
• Evaluation of how ready the college is in case of any security breach (Incident Response
Readiness). We will also check the effectiveness with existing plans of responding to
incidents, and will identify how improvement could be made, like in areas of log
management, threat detection and response times.
• Security Policies and Their Controls: CAC’s Capacity to Meet its Security Policies and
Controls: the ability of CAC’s intrusion detection systems, intrusion prevention
systems, user authentication methods, and data encryption processes.
• Firewall removal: Replacing the existing firewalls with new firewalls that add no added
value as they are solely for security reasons.
• Aligning internal policies: Apply internal policies in line with GDPR & Sri Lanka’s
Data Protection Act to enable CAC to conform to evolving regulatory requirements.
• Automate Setup of Backups with Off Site Storage: Have backups with off-site storage
to decrease downtime and provide data redundancy if there’s a cyber-attack.
Through conducting regular IT security audits, CAC will effectively improve its capability to
recognize, prevention, and response to cyber threats hence making the digital learning
environment for students, faculty, and staff safer and more secure.
The institution’s IT security strategy for Colombo Advanced College (CAC) must be
seamlessly intersected with the institution’s wider organisational goals and policies to ensure
security and resiliency of their digital infrastructure. The approach allows security measures to
not be seen as standalone initiatives but foundational measures supportive of academic and
administrative operations. Security alignment as a culture of cybersecurity awareness gives less
risk and more compliance to the Legal and regulatory requirements.
Making Sure IT Security Complies with Organizational Objectives,
• IT security policies should be strategically integrated with CAC’s core mission of
providing a safe and effective learning environment. Continually, security policies need
to be assessed periodically and updated to suit coming cyber threats as well as new
institutional needs.
• Security Awareness and Training: Since CAC is an academic institution, they must
provide continuous training in cybersecurity to the stake holders. It should educate all
the stakeholders about the meaning of data protection, phishing risks, password security
and compliance protocols.
• Security Integration: The absence of security integration can result in a data breach
which will hurt stakeholder trust and cause the college to lose its reputation as a top
academic institution.
• Encourage culture of cyber responsibility to ensure that every stake holder, including
administrators, students etc exist in a cyber responsible culture.
Expending these actions will enable Colombo Advanced College to improve its security
posture and reduce risks, while allowing its creation of a robust and future proofed
cybersecurity framework that will serve to support its longterm mission and objectives.
3.7 Conclusion,
Though Colombo Advanced College (CAC) has made some necessary security steps, the
college’s data protection measures are totally needed. There are a number of key areas that need
improvement on the formalized risk assessments, regulatory compliance, and stronger
alignment between IT security policies and institutional goals. However, to get rid of it we must
address these gaps in order to curb cyber threats, data breach and engineer a resilient security
posture.
With a structured risk management framework in place such as ISO/IEC 27001, the proactive
approach will be adopted and all risks will be systematically identified, assessed and mitigated.
IT security audits on a regular basis, constant monitoring and timely updates to security
controls will also enhance the institution’s capacity to get more alert and respond to any
emerging measures.
A proper IT security plan needs to synchronize with the college mission in order to develop an
elevated awareness about cybersecurity across the community. A collaborative defense model
will strengthen institutional resilience through active participation of all members of the college
in security best practices. Implementation of security functions into core operations allows
CAC to adhere to regulatory requirements which protect academic and administrative data
according to GDPR and Sri Lanka’s Data Protection Act and other applicable laws.
By establishing such strategic initiatives, Colombo Advanced College would be able to build
an IT environment that is secure and future proof while making sure that the level of data
protection and compliance remained at its highest.
Activity 4
Report: Appraisal of an ISMS for Colombo Advanced College and Design of a Suitable
Security Policy
4.1 Introduction,
Colombo Advanced College (CAC) will be implemented with the help of an Information
Security Management System (ISMS) to cover all the institution information and systems from
being compromised henceforth. The plan is outlined below:
Phase 1 – Preliminary Planning and Evaluation,
Objective – Assess the CAC ISMS’s scope and conduct a comprehensive risk analysis.
Steps to take,
• Does it involve members of the IT department, academic leadership and administrative
staff? Then form an ISMS project team.
• Establish the ISMS scope that is most critical, predominantly ISMS scope covering
student records, academic research data, administrative functions.
• Understand CAC’s risk factors, review all of their systems, and check their data.
• Then, gap analysis is done between the actual security and what is desired by being able
to identify existing security weaknesses, such as old infrastructure and low security
policy.
• Write the procedures for data backup, encryption, patch management and vulnerability
testing, and form a framework of ISMS.
• Effector line used to securely store sensitive data at rest and in transit using the
encryption.
• Multi factor authentication (MFA) and role based access controls (RBAC) are on the
critical systems and data.
• Install firewalls and deploy intrusion detection prevention systems (IDS / IPS), and
endpoint protection to secure network.
• To block, patch management and software whitelisting the unauthorized applications
and their vulnerabilities can be automated.
• Ensure readiness and effectiveness of threat response, disaster recovery and incident
response scenarios by running threat tests and simulation scenarios.
• Compliance to data protection regulations in cases like GDPR or local laws in areas of
third-party audits.
• Create a procedure for always advancement, processing findings of the audit, adopting
the lessons learnt, and changing with the development of security threats.
• Monitor security events that are being happening, e.g., intrusion detection and network
traffic analysis.
This structured approach will clearly recommend to CAC how to build and maintain a robust
ISMS that will protect critical information and systems as well as establish a culture of security
awareness and resilience.
Availability of CAC’s ISMS is ensured by the existence of a robust security policy. This policy
sets security of all the data in workplace, the access to the data and the managements of the
incidents. A disaster recovery focus of the college security policy outline is provided below.
4.3.1 Key elements of the security strategy,
• Data classification protocols that establish ways to protect sensitive information (for
instance, student records, research data) with encryption in transit as well as in rest.
• Adhere to the principle of least privilege which in this case meant to impose the access
control policies according to the principle of least privilege imposing that users have
access to the data that are only suitable to their role.
• Enforce multi factor authentication (MFA) for those systems considered vital to access.
2. Network Security,
• Establish a centralized incident reporting system in place to take actions as soon as the
breach to ensure a solution.
• Define and enforce data backup schedule and ensure backups are securely stored either
offline or separate secured location.
• Set up an Establish Recovery Time Objectives (RTO) and Establish Recovery Point
Objectives (RPO) to reduce impact of data loss and maintain business continuity.
5. Awareness and Training for Employees,
• On a continuous basis, have staff undergo complaints training regarding new phishing
threats, passwords security, data protection, and reporting suspicious activity.
• It also makes sense to launch regular security awareness campaigns to encourage the
development of a secure security culture at the college.
The Disaster Recovery Plan (DRP) describes what CAC will do if the network runs afoul with
a major security breach, natural disaster or system failure. Key components include:
• Backups: Ensures that backup/copy of all critical applications and student records for
the specified RTO and RPO are kept encrypted and available so that the corresponding
data can be recovered using data recovery.
• Processes: Clear protocols for informing both the key stakeholders like faculty,
students, IT teams and regulatory bodies in case of incident and recovery status.
• In any situation, the instant it happens, perform a Post Incident Review: Analysis of the
incident to identify its root cause, assess the effectiveness of the response, and develop
the security enhancements necessary.
• Several automation security monitoring tools will spot real time threats such as
unauthorized intrusions or ransomware attack.
• Disconnect Affected Systems: Isolating devices that are infected to avoid further
damage in the systems; blocking malicious IP addresses.
The purpose of having this security policy is to ensure that Colombo Advanced College’s
remains resilient against cyber threats as well as any other security issue, with the view to
ensure continuity in its operation and integrity of its data.
4.4 The functions of Stakeholders in putting a security Audit into
practice.
Key stakeholders in the administration, faculty, students and staff at all levels of the institution
are instrumental in the successful implementation of CAC’s Information Security Management
System (ISMS) and security policies. Stakeholders and their role is provided below.
• Role - They should provide strategic direction, allocate resources and provide
institutional support for ISMS initiatives.
Responsibilities,
• Help in the compliance with data protection regulations as well as institutional
policies.
• Ensure that existing security projects and infrastructure can meet departmental
needs.
• Confirming set security priories and integrate cybersecurity into the college’s
overall strategy.
2. IT Department,
• It supervises the data backup and recovery procedure of data so that the business
should be running fine.
• Staying on the lookout if, when systems aren’t functioning the way they should,
they may be disabled, they may fail and repeatedly monitor for potential threats
and incidents.
3. Heads of Academic and Administrative,
• Role - Ensure that the policies support the operational needs of academic and
administrative departments in security terms.
Responsibilities,
• It also promotes faculty and staff adherence towards best security practices.
• With an access control and data protection policy, it can be the means to
enforcing that security policy.
• Role - It must adhere to CAC’s security policies as well as the security of the
institutional data.
Responsibilities,
• Participate in cybersecurity awareness training.
• Heads should also follow password management and data protection guidelines.
If CAC clearly defines roles and responsibilities, the security audit process can remain
effective, become compliant, and continuously better the cybersecurity framework.
4.5 Conclusion,
1. Introduction
The Commitment at Colombo Advanced College ensures safety for digital realms where
students and staff members and institutional data reside. The policy specifies all protective
measures needed to secure the college's information assets together with its networks and IT
infrastructure. The college executes these guidelines to stop cyber threats and defend sensitive
information with reliable response actions for security incidents.
2. Objective
The policy's main objectives include two parts,
• The policy needs to protect both IT infrastructure and confidential data against
unauthorized modification and destruction as well as unauthorized access.
• The organization needs to implement security standards that affect all users who operate
system functions.
• All data protection practices must adhere to national as well as international standards.
• The organization must establish a clear setup for responding when security incidents
occur.
• The institution will work to strengthen security methods that apply to hybrid education
and distant access systems.
3. Scope,
This policy applies to,
• The policy extends to all users who work at the college including employees, students
and external vendors and handle IT resources.
• Sensitive Data - The protection of sensitive data includes financial operations alongside
payroll and proprietary research that demands data encryption during storage as well as
transmission.
• Public data - The protection protocol for public data includes course materials and
general announcements which needs minimal encryption together with secure access
control.
• The Disaster Recovery Plan (DRP) needs to restore data within 48 hours throughout
breached or failed conditions.
• Every person accessing the system needs a special login ID paired with a strong
password.
5.2 Authentication Measure,
• Access to sensitive systems is required to use Multi Factor Authentication (MFA).
• Passwords have to be at least 8 characters long with uppercase and lowercase letters
and numbers are also required.
6. Network Security,
6.1 Firewall and Intrusion Prevention,
• Therefore, a Next-Generation Firewall (NGFW) also needs to be installed to restrict
unauthorized access as well as cyber threats.
• The used intrusion detection systems (IDS) and intrusion prevention systems (IPS) will
scan network activity in real time.
• They will be separated so as to cut down on the possible security breaches of the
administrative and student networks.
• If a device can not provide the antivirus software compliance, then the device will be
denied network access until the compliance can be achieved.
7.2 Patch Management,
• First, all systems and software from operating systems and applications to network
devices, must be updated regularly with the latest security patches and fixes are.
• There is a 24x7 dedicated incident response team (IRT) to respond to the incidents and
reduce the impact.
• So that each Security Event occurs will have a completed Security Incident Report
(SIR) documenting all events so that proper documentation and follow-up occur.
• This part of training will teach an employee how to recognize phishing emails, use
secure passwords, dealing with sensitive information, and how to travel the Web safely.
• Training will include how to recognise phishing emails, use secure password, manage
sensitive information and safely navigate on online resources.
10. Continuous Monitoring and Auditing,
10.1 Real-time Monitoring,
• A Security Information and Event Management (SIEM) system will be used to monitor
network traffic, system logs, as well as security tools alerts in time.
• The audit results will be updated for the security measure and defenders against new
threats.
• It should be secured to its remote desktop with MFA and logging for all remote
connections.
• Comply with the laws and regulations applicable in Sri Lanka in relation to data
protection such as Sri Lankan Personal Data Protection Act (PDPA), and other such
laws.
• Where there is an application or relevance, we plan to integrate security practices and
policies to international standards such as ISO/IEC 27001 or the NIST Cybersecurity
Framework for example GDPR.
• This security policy may be violated with disciplinary action, up to and including
termination or expulsion, as appropriate.
• This policy is responsible for being adhered to by managers and department heads to
ensure that the teams of these professionals comply with the said policy; and further
reporting any violations.
• The policy will be updated each year or promptly if an emerging threat appears or a
new technology comes into view.