Project 1: Risk Management Start Here After completing your master's degree, you have been hired by a contracting company as an information systems security officer, or ISSO, supporting systems for...

1 answer below »
The report should be 12 pages minimum, double-spaced with citations in APA format. Also, it needs to have parenthetical citations.


Project 1: Risk Management Start Here After completing your master's degree, you have been hired by a contracting company as an information systems security officer, or ISSO, supporting systems for federal clients. One morning, your boss asks you to come to her office. She tells you that you'll be working on a network security audit. Network security audits, based on FISMA standards, are used annually to determine the effectiveness of our security controls. The boss explains: "Prior to the security audit, I will need you to test, execute, collect, and compile your results into a security assessment report, or SAR. Once you're finished, you will submit the report to me and the executive leadership." Later, you receive a follow-up email from your boss with instructions. First you will conduct a risk and threat assessment of the enterprise network. Next, you will perform black box testing of the network using network analysis tools. After identifying any network vulnerabilities, you will lead efforts to remedy and mitigate those vulnerabilities using appropriate risk management controls. You will then perform a white box test, and compile the results in the final security assessment report. And provide this to leadership, along with an executive briefing in your lab analysis, so management has a baseline view of the security posture of the enterprise network, before the actual external IT audit. The email ends with this note: "Thank you for taking this on. Our executive leadership is excited to learn of your findings." Many companies and agencies conduct IT audits to test and assess the rigor of IT security controls in order to mitigate risks to IT networks. Such audits meet compliance mandates by regulatory organizations. Federal IT systems follow Federal Information System Management Act (FISMA) guidelines and report security compliance to US-CERT, the United States Computer Emergency Readiness Team, which handles defense and response to cyberattacks as part of the Department of Homeland Security. In addition, the Control Objective for Information Technology (COBIT) is a set of IT security guidelines that provides a framework for IT system security in the commercial sector. These audits are comprehensive and rigorous, and negative findings can lead to significant fines and other penalties. Therefore, industry and federal entities conduct internal self-audits in preparation for actual external IT audits, and compile security assessment reports. In this project, you will develop a 12-page written security assessment report and lab report for a company and submit both reports to the leadership of that company. There are six steps to complete the project. Most steps in this project should take no more than two hours to complete, and the project as a whole should take no more than two weeks. Begin with the workplace scenario and then continue to Step 1. Deliverables · Security assessment report (SAR): Your report should be 12 pages minimum, double-spaced with citations in APA format. The page count does not include figures, diagrams, tables, or citations. Project 1: Risk Management Step 1: Conduct a Security Analysis Baseline In the first step of the project, you will conduct a security analysis baseline of the IT systems, which will include a data-flow diagram of connections and endpoints, and all types of access points, including wireless. The baseline report will be part of the overall security assessment report (SAR). You will get your information from this data-flow diagram and report, which is generated by the Microsoft Threat Modeling Tool 2016. The scope should include network IT security for the whole organization. Include the following areas in this portion of the SAR: · Security requirements and goals for the preliminary security baseline activity. · Typical attacks to enterprise networks and their descriptions. Include Trojans, viruses, worms, denial of service, session hijacking, and social engineering. Include the impacts these attacks have on an organization. · Network infrastructure and diagram, including configuration and connections. Describe the security posture with respect to these components and the security employed: local area network (LAN), metropolitan area network (MAN), wide area network (WAN), enterprise. Use these questions to guide you: · What are the security risks and concerns? · What are ways to get real-time understanding of the security posture at any time? · How regularly should the security of the enterprise network be tested, and what type of tests should be used? · What are the processes in play, or to be established to respond to an incident? · Workforce skill is a critical success factor in any security program, and any security assessment must also review this component. Lack of a skilled workforce could also be a security vulnerability. Does the security workforce have the requisite technical skills and command of the necessary toolsets to do the job required? · Is there an adequate professional development roadmap in place to maintain and/or improve the skill set as needed? · Describe the ways to detect these malicious codes and what tactics bad actors use for evading detection. · Public and private access areas, web access points. Include in the network diagram the delineation between open and closed networks, where they coexist, and show the connections to the internet. · Physical hardware components. Include routers and switches. What security weaknesses or vulnerabilities are within these devices? · Operating systems, servers, network management systems as they relate to data in transit vulnerabilities: · endpoint access vulnerabilities · external storage vulnerabilities · media access control and Ethernet vulnerabilities · virtual private network vulnerabilities · Possible applications. This network will incorporate a BYOD (bring your own device) policy in the future. The IT auditing team and leadership need to understand current mobile applications and possible future applications and other wireless integrations. You will use some of this information in Project 2 and also in Project 5. The overall SAR should detail the security measures needed, or implementation status of those in progress, to address the identified vulnerabilities. Include: · remediation · mitigation · countermeasures · recovery Through your research, provide the methods used to provide the protections and defenses. From the identification of risk factors in the risk model, identify the appropriate security controls from NIST SP 800-53A and determine their applicability to the risks identified. The baseline should make up at least three of the 12 pages of the overall report. When you have completed your security analysis baseline, move on to the next step, in which you will use testing procedures that will help determine the company's overall network defense strategy. Project 1: Risk Management Step 2: Determine a Network Defense Strategy You've completed your initial assessment of the company's security with your baseline analysis. Now it's time to determine the best defenses for your network. Start by reading a publication by the National Institute of Standards and Technology, Special Publication 800-115, Technical Guide to Information Security Testing and Assessment, and outline how you would test violations. Identify how you will assess the effectiveness of these controls and write test procedures that could be used to test for effectiveness. Write them in a manner to allow a future information systems security officer to use them in preparing for an IT security audit or IT certification and accreditation. Within this portion of the SAR, explain the different testing types (black, white, and gray box testing). Include these test plans in the SAR. The strategy should take up at least two of the 12 pages of the overall report. Click the following link to learn more about cybersecurity for process control systems. After you've completed this step, it's time to define the process of penetration testing. In the next step, you'll develop rules of engagement (ROE). Project 1: Risk Management Step 3: Plan the Penetration Testing Engagement Now that you've completed your test plans, it's time to define your penetration testing process. Include all involved processes, people, and time frame. Develop a letter of intent to the organization, and within the letter, include some formal rules of engagement (ROE). The process and any documents can be notional or can refer to actual use cases. If actual use cases are included, cite them using APA format. This portion should be about two pages of the overall 12-page report. After you have outlined the steps of a penetration testing process, in the next step you will perform penetration testing. During the testing, you will determine if the security components are updated and if the latest patches are implemented, and if not, determine where the security gaps are. Project 1: Risk Management Step 5: Complete a Risk Management Cost Benefit Analysis You've completed the penetration testing, and now it's time to complete your SAR with a risk management cost benefit analysis. Within this analysis, think about the cost of violations and other areas if you do not add the controls. Then add in the cost for implementing your controls. When you have finished with the cost benefit analysis, which should be at least one page of your overall report, move to the final step, which is the completed SAR. Project 1: Risk Management Step 6: Compile and Submit the SAR and Lab Report You have completed comprehensive testing in preparation for this audit, provided recommended remediations, and developed a set of recommendations. Now you are ready to submit your SAR. The requirements for Project 1 are as follows: · Security assessment report (SAR): Your report should be 12 pages minimum, double-spaced with citations in APA format. The page count does not include figures, diagrams, tables, or citations. Running head: SECURITY ASSESSMENT REPORT 1 SECURITY ASSESSMENT REPORT 2 Security Assessment Report First Name Last Name University of Maryland University College Security Assessment Report Give me a very brief introduction to an organization of your choice and then describe the purpose of this SAR as a need to assess its security posture. This SAR will identify the organization’s network infrastructure, the network threats and vulnerabilities, a network defense strategy, testing techniques, procedures, and results. It will also discuss risk, mitigation costs, and recommendations for improving the security posture of the organization. Security Analysis Baseline (this section should be about 3 pages long…) Discuss security requirements and goals for the preliminary security baseline activity. Typical Attacks to Enterprise Networks Discuss and describe typical attacks to enterprise networks. Include Trojans, viruses, worms, denial of service, session hijacking, and social engineering. Include the impacts these attacks have on an organization. HINT: Review online provided material to include description of several network attacks. Network Infrastructure Research and provide a network diagram (enterprise-level if you can find one) to use as baseline network infrastructure (relating to the organization noted in your introduction). You will want to discuss LAN, MAN, and WAN connections and security employed. You may also use the data-flow diagram provided to you in the Threat Modeling Report -- this report provides security risk results of that particular diagram.
Answered 12 days AfterOct 13, 2021

Answer To: Project 1: Risk Management Start Here After completing your master's degree, you have been hired by...

Neha answered on Oct 26 2021
125 Votes
Running head: SECURITY ASSESSMENT REPORT                      1
SECURITY ASSESSMENT REPORT                             2
Security Assessment Report
First Name Last Name
University of Maryland University College
Security Assessment Report
This is the security assessment report for the organization. We will study about the network infrastructure and the different threats and the vulnerabilities present in the current network design. The organization has to maintain information about the doctors and patients. It is the hospital management system which will store information and process the data. I
n this report we will try to find out the network defense strategy, testing techniques, procedures and the results which can be utilized to understand the current infrastructure and how it can be modified. It also discusses about the risk and the mitigation cost. All this information can be used to understand the risk present in current network infrastructure and how they can be improved to enhance the security posture of the organization.
Security Analysis Baseline
The reason of having the risk assessment is to identify the vulnerabilities and the threads which are related with the organization of hospital management automated system. This risk assessment can be used to find out all the risk mitigation plans which are present in the hospital management system. The hospital management system was identified to have the high-risk system in the risk assessment done by the department.
It includes multiple components. The online system is the web-based application which is developed by the internal development team. The application involves Internet information server of the Microsoft and uses the active server pages.
The IT department of the organization hosts this application. The scope of this assessment is to understand different components which are included in the system except for the pay link. The in scope of the supporting system are network infrastructure and the firewalls. The web application, operating system and database are all in scope for the network risk.
Typical Attacks to Enterprise Networks
This organization is large in size and has complex structure. It relies on different connected endpoints. When we are having the good business operations and it makes the workflow for the organization easier to handle then it also creates different challenges for its security maintenance. The issue or the risk is the flexibility of the movement in the network which means that if the malicious actor is able to get access of the network then they will be free able to access network completely. These network security threads can make the organization highly exposed for the data breach.
· The unauthorized access of the system can be defined as a scenario in which attackers are able to access the network without having the permission. The reason for these types of attacks are weak passwords, previously compromised accounts, insider threads and lacking protection against the social engineering.
· We can have distributed denial of service attacks. The attackers can create botnets, or the large fleet of the compromised devices and they can be utilized to direct false traffic in the network or the server. It can take place at the network layer.
· The third one is the man in the middle attack. It involves the attackers intercepting traffic which can be between the network and the external sites. If the protocols are insecure or attackers are able to find the way to circumvent the security then they will be able to steal the data which is being transmitted, hijack the sessions or obtain the user credentials.
· There are many websites which accept input from the user and fail to validate them. The attackers are able to fill out the form and create the API call. The malicious code will be performed on the server and it will allow the attackers to get access of the system.
· Once the attackers are able to penetrate the network then they can use privilege escalation for expanding their reach. The vertical escalation will allow the attackers to get higher level of the privileges.
Network Infrastructure
The following diagram shows network infrastructure for the organization. We can see that there can be different manners in which the user will be able to enter into the system. There can be denial of service attack, insider threat or the malicious attack. It is important to check for the security of the native work at least after six months. It is important that each and every User is able to handle it and inform if they detect any type of attack on the network.
Public and Private Access Areas, web access points
The different web access points can be the router, switch or the system itself. The system has a web interface through which user can enter into the network.
Physical Hardware Components
The network includes routers and the switches. They are easy to attack, and user will be able to enter into the network. It includes the computer systems, servers, multiple routers and DHCP access point.
Operating systems, servers, network management system
    The network has Ethernet which is the most important part of the system. There can be attack on the Ethernet in which we will have packet in packet attack. In this attack the several network packets will be nested inside each other. The outer shell will have few packets and the inner ones will have malicious code or the commands. If there is any fault in the cable, then the damaged cable will suffer from the electrical interferences which can destroy the outer shell and activate the internal payloads.
Mobile and Future Applications
When we introduce the concept of bring your own device in the organization then it can create more risk to the network. The device used by the person may have virus or it can be connected with the...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here