{"id":330,"date":"2024-09-21T22:44:23","date_gmt":"2024-09-21T22:44:23","guid":{"rendered":"https:\/\/sites.wp.odu.edu\/thammcyse200ssample\/?page_id=330"},"modified":"2024-11-15T23:48:49","modified_gmt":"2024-11-15T23:48:49","slug":"blog-2","status":"publish","type":"page","link":"https:\/\/sites.wp.odu.edu\/thammcyse200ssample\/blog-2\/","title":{"rendered":"CYSE 200T Assignments"},"content":{"rendered":"\n<p><\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:#8ed1fc\" class=\"has-inline-color\"><strong>Discussion Assignments<\/strong><\/mark><\/h2>\n\n\n\n<div class=\"wp-block-group is-layout-constrained wp-block-group-is-layout-constrained\"><div class=\"wp-block-group__inner-container\">\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-1 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p><strong><span style=\"text-decoration: underline\">DISCUSSION BOARD: Protecting Availability<\/span><\/strong><br>In this discussion board, you are the CISO for a publicly traded company. What<br>protections would you implement to ensure availability of your systems (and why)?<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>As CFO, \u201cAvailability\u201d in the CIA triad means keeping the data<br>available when needed. To manage cybersecurity risks, I can utilize<br>the NIST framework to create profiles. Starting by understanding<br>organizational resources, evaluating the current framework. Build the<br>best possible fortress to protect company data.<br>Deploying and making sure that server security is up to date, if<br>physical security measures are taken properly, along with disaster<br>recovery measures\u2013in case of emergency, server fails the availability<br>protocol is breached. Ensure strong password policy. Along with<br>authorization policy so that those who require access are<br>appropriately assigned access levels with authorization level. Making<br>sure that individuals can not access information which they are not<br>supposed to access to mitigate information breach or leak which<br>could potentially lead to server failure. Most importantly, conducting<br>employee awareness training is the fundamental part. Raising<br>awareness of phishing, Email spoofing, social engineering.<br>It is believed widely that if you see incompatibilities in \u201cavailability\u201d is<br>a \u201ccanary in the coalmine\u201d, as such I will be responsible for<br>safeguarding company data at the entry point of the company.<\/p>\n<\/div>\n<\/div>\n<\/div><\/div>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-2 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:33.33%\">\n<p><strong><span style=\"text-decoration: underline\">Opportunities for Workplace Deviance<\/span><\/strong><\/p>\n\n\n\n<p>How has cyber technology created opportunities for workplace deviance?<\/p>\n<\/div>\n\n\n\n<div class=\"wp-block-column is-layout-flow wp-block-column-is-layout-flow\" style=\"flex-basis:66.66%\">\n<p>In a general concept, workplace deviance is characterized by:<\/p>\n\n\n\n<ul>\n<li>-Aggressive behaviors: e.g. sexual harassments, hostile behaviors<\/li>\n\n\n\n<li>-Unproductive behavior: e.g. taking time intentionally, neglect obligation<\/li>\n\n\n\n<li>-Abuse of property: e.g. using company assets for personal gain, taking office supplies home<\/li>\n\n\n\n<li>-Politics within the company: e.g. Spreading disinformation to devalue someone, etc.<\/li>\n<\/ul>\n\n\n\n<p>Taking this general concept and applying to how cyber technology contribute to workplace deviance are:<\/p>\n\n\n\n<ul>\n<li>-Because you have an assigned dedicated computer to yourself, you can directly send emails or send IM to harass someone.<\/li>\n\n\n\n<li>-Using company PC and do shopping during working hours, using company provided pocket Wifi and use it home&#8211;taking advantage of anything provided from the company so you can work from home.<\/li>\n\n\n\n<li>-Working from home means you can work in a public space. It can raise risks of exposing vulnerability.<\/li>\n\n\n\n<li>-As researched in the reading\u00a0\u201cWhite-Collar\u00a0Cybercrime written by Payne(2018)\u201d\u00a0from last week, taking advantage of your access level (RBAC) to company data, then you can sell it to someone to get promotion or to devalue someone or company.<\/li>\n<\/ul>\n\n\n\n<p>Just a couple of examples; however technological advancement created a lot of opportunities for workplace deviance.<\/p>\n<\/div>\n<\/div>\n\n\n\n<h2 class=\"wp-block-heading\"><mark style=\"background-color:#8ed1fc\" class=\"has-inline-color\"><strong>Write-Up Assignments<\/strong><\/mark><\/h2>\n\n\n\n<div class=\"wp-block-columns is-layout-flex wp-container-core-columns-layout-3 wp-block-columns-is-layout-flex\">\n<div class=\"wp-block-column is-vertically-aligned-top is-layout-flow wp-block-column-is-layout-flow\">\n<p><strong>Write-Up Assignments 1 <\/strong><br>Using the\u00a0<a href=\"https:\/\/drive.google.com\/file\/d\/1898r4pGpKHN6bmKcwlxPdVZpCC6Moy8l\/view?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">Chai Article\u00a0(Links to an external site.)<\/a>, along with additional research you will conduct on your own, describe the CIA Triad, and the differences between Authentication &amp; Authorization, including an example.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:#abb8c3\" class=\"has-inline-color\">Write-Up CIA Triad<br><\/mark><\/strong>CIA triad is also known as AIC triad. CIA is abbreviated for \u201cConfidentiality\u201d,<br>\u201cIntegrity\u201d and \u201cAvailability.\u201d It is a model designed for organizations to create security<br>policies and used as a basis for the development of security systems.<br>Confidentiality involves the efforts to make sure company\u2019s information is secure<br>and private. For example, access to personal information of employees such as resumes,<br>addresses, phone numbers should be limited to HR or certain executives.<br>Integrity involves the efforts to maintain data being accessed, viewed or transported<br>from being altered wrongfully. For example, information in the email was intercepted by<br>malicious actor and altered meaning data has lost its integrity.<br>Availability involves the people can access the information when is needed and it is<br>done so by appropriate personnel. It is important to reflect the policy of confidentiality and<br>integrity.<br>Difference between authentication and authorization<br>Commonly, authentication is a process to verify the identity of user trying to access,<br>in other words login to the service. Authorization is a process to determine what the user is<br>granted to perform. According to the authentication level set in the application or<br>computer, each user can perform is what is authorized to do. Common example is when a<br>user tries to access some page in application or service then gets an error message. This is<br>because the user does not have access rights, meaning an unauthorized access.<\/p>\n<\/div>\n<\/div>\n\n\n\n<p><strong>Write-Up Assignments 2<\/strong><br>In this write-up you will use the\u00a0<a href=\"https:\/\/docs.google.com\/document\/d\/1DvxnWUSLe27H5u8A6yyIS9Qz7BVt_8p2WeNHctGVboY\/edit?usp=sharing\" target=\"_blank\" rel=\"noreferrer noopener\">SCADA SystemsLinks to an external site.<\/a>\u00a0article, along with your own research, to explain the vulnerabilities associated with critical infrastructure systems, and the role SCADA applications play in mitigating these risks.<\/p>\n\n\n\n<p><strong><mark style=\"background-color:#abb8c3\" class=\"has-inline-color\">Write-Up &#8211; SCADA Systems<br><\/mark><\/strong>To explain and better understand the vulnerabilities associated with critical infrastructure<br>systems, and the role SCADA applications play in mitigating these risks, I used SCADA<br>Systems<sup data-fn=\"8df18138-f56e-430e-940b-89840d021508\" class=\"fn\"><a href=\"#8df18138-f56e-430e-940b-89840d021508\" id=\"8df18138-f56e-430e-940b-89840d021508-link\">1<\/a><\/sup> and One Flaw too Many: Vulnerabilities in SCADA Systems<sup data-fn=\"9bcd74f2-f99e-4f1f-a616-0c8e8ee8cfcc\" class=\"fn\"><a href=\"#9bcd74f2-f99e-4f1f-a616-0c8e8ee8cfcc\" id=\"9bcd74f2-f99e-4f1f-a616-0c8e8ee8cfcc-link\">2<\/a><\/sup>.<br>SCADA is an automation system for monitoring and managing industrial processes and devices.<br>The system consists of multiple contact points that work as data collection sensor monitors<br>within the network. Each technology can create vulnerabilities.<br>\u25cf HMI can be accessed remotely anywhere by using mobile devices<br>\u25cf There are many technology solutions provided to enhance HMI system. PaaS, Saas<br>applications such as DeltaV SaaS SCADA<sup data-fn=\"1af240c8-0171-45f1-92e6-cdbb7319e9ae\" class=\"fn\"><a href=\"#1af240c8-0171-45f1-92e6-cdbb7319e9ae\" id=\"1af240c8-0171-45f1-92e6-cdbb7319e9ae-link\">3<\/a><\/sup>3<br>\u25cf Vulnerabilities are reported Through the communication protocol of PLC or RTU which<br>acts as a microprocessor and collects data from industrial equipment.<br>The most vulnerable part of the SCADA system is the control interface\u2013Human Machine<br>Interface. HMI is where human operators can visually manage and monitor information, sensors,<br>make critical decisions related to the condition of system, and troubleshoot.<br>Therefore, to mitigate the potential risk, it is important to<br>\u25cf Evaluate and ensure that each technology solution do not bring potential vulnerabilities.<br>\u25cf Enforcing MFA, not accessing from public wifi \u2013HMI can be accessed remotely anywhere<br>by using mobile devices<br>\u25cf Access level management (RBAC)<br>\u25cf Security awareness training<br>SCADA vendors such as, SIEMENS provide routers to address communication vulnerabilities<br>with industrial VPN, and firewall solutions<sup data-fn=\"dfafb44e-7751-4d52-8563-fda14d46cf5e\" class=\"fn\"><a href=\"#dfafb44e-7751-4d52-8563-fda14d46cf5e\" id=\"dfafb44e-7751-4d52-8563-fda14d46cf5e-link\">4<\/a><\/sup>.4 Because SCADA solution is provided by multiple<br>vendors, companies or the government might select the lowest cost solution. However,<br>considering the risk that can potentially be caused to the infrastructure system. Companies<br>should carefully select the solution and enforce security training to further prevent potential<br>threats.<\/p>\n\n\n\n<p><strong>Write-Up Assignments 3<\/strong><br>During this week&#8217;s reading, you&#8217;ve been exposed to different points of view regarding human contribution to cyber threats.\u00a0 Now, put on your Chief Information Security Officer hat.\u00a0 Realizing that you have a limited budget (the amount is unimportant), how would you balance the tradeoff of training and additional cybersecurity technology?\u00a0 That is, how would you allocate your limited funds?\u00a0 Explain your reasoning.<br><strong><mark style=\"background-color:#abb8c3\" class=\"has-inline-color\">Write-Up Human Factor<br><\/mark><\/strong>It is important to focus on the return on investments and maximizing the security return.<br>Since the human factor is the weakest link to cyber threats\u2013commonly believed that 85% is<br>accounted for regardless the size of the organization. Cybersecurity training to address human<br>error is a high-return investment.<br>Although often cited in multiple sources from the return on investment point of view, is that the<br>result of security awareness training is unmeasurable. However, enabling employees to<br>recognize threats contributes to prevention. According to Infosec<sup data-fn=\"836f5c93-d9be-4a86-932d-255d9c7ce6df\" class=\"fn\"><a href=\"#836f5c93-d9be-4a86-932d-255d9c7ce6df\" id=\"836f5c93-d9be-4a86-932d-255d9c7ce6df-link\">5<\/a><\/sup>, Cost to remediate from<br>security incidents after proper security training is approximately 10% lower. Reduction in<br>incidents leads to productivity gain and financial gain, as I learned from Linkedin article<sup data-fn=\"e9dfac07-297f-4498-a77f-38693913135a\" class=\"fn\"><a href=\"#e9dfac07-297f-4498-a77f-38693913135a\" id=\"e9dfac07-297f-4498-a77f-38693913135a-link\">6<\/a><\/sup>.<br>That said, a balanced cost distribution is essential. Within the allocated budget,<br>estimating the cost of preventive measures for roughly 65% on technology investments to 35%<br>on awareness training. After conducting the risk assessment to determine what is required to<br>fortify security measures. Then, I would like to explore what type of technology update will be<br>beneficial to reduce human error further.<\/p>\n\n\n<ol class=\"wp-block-footnotes\"><li id=\"8df18138-f56e-430e-940b-89840d021508\">https:\/\/www.scadasystems.net\/ <a href=\"#8df18138-f56e-430e-940b-89840d021508-link\" aria-label=\"Jump to footnote reference 1\">\u21a9\ufe0e<\/a><\/li><li id=\"9bcd74f2-f99e-4f1f-a616-0c8e8ee8cfcc\">https:\/\/www.trendmicro.com\/vinfo\/us\/security\/news\/vulnerabilities-and-exploits\/one-flaw-too-many-vulnerabilities-in-scada-systems <a href=\"#9bcd74f2-f99e-4f1f-a616-0c8e8ee8cfcc-link\" aria-label=\"Jump to footnote reference 2\">\u21a9\ufe0e<\/a><\/li><li id=\"1af240c8-0171-45f1-92e6-cdbb7319e9ae\"> https:\/\/www.emerson.com\/en-us\/automation\/control-and-safety-systems\/zedi-saas-scada <a href=\"#1af240c8-0171-45f1-92e6-cdbb7319e9ae-link\" aria-label=\"Jump to footnote reference 3\">\u21a9\ufe0e<\/a><\/li><li id=\"dfafb44e-7751-4d52-8563-fda14d46cf5e\">https:\/\/www.siemens.com\/global\/en\/products\/automation\/industrial-communication\/network-security\/scala <a href=\"#dfafb44e-7751-4d52-8563-fda14d46cf5e-link\" aria-label=\"Jump to footnote reference 4\">\u21a9\ufe0e<\/a><\/li><li id=\"836f5c93-d9be-4a86-932d-255d9c7ce6df\">https:\/\/www.infosecinstitute.com\/resources\/security-awareness\/the-roi-of-security-awareness-training-2\/#j<br>ump5:~:text=for%20your%20organization.-,Step%201%3A%20measure%20your%20security%20costs,-<br>To%20measure%20the <a href=\"#836f5c93-d9be-4a86-932d-255d9c7ce6df-link\" aria-label=\"Jump to footnote reference 5\">\u21a9\ufe0e<\/a><\/li><li id=\"e9dfac07-297f-4498-a77f-38693913135a\">https:\/\/www.linkedin.com\/pulse\/roi-cybersecurity-training-why-invest-security-education <a href=\"#e9dfac07-297f-4498-a77f-38693913135a-link\" aria-label=\"Jump to footnote reference 6\">\u21a9\ufe0e<\/a><\/li><\/ol>","protected":false},"excerpt":{"rendered":"<p>Discussion Assignments DISCUSSION BOARD: Protecting AvailabilityIn this discussion board, you are the CISO for a publicly traded company. Whatprotections would you implement to ensure availability of your systems (and why)? As CFO, \u201cAvailability\u201d in the CIA triad means keeping the dataavailable when needed. To manage cybersecurity risks, I can utilizethe NIST framework to create profiles&#8230;. <\/p>\n<div class=\"link-more\"><a href=\"https:\/\/sites.wp.odu.edu\/thammcyse200ssample\/blog-2\/\">Read More<\/a><\/div>\n","protected":false},"author":29584,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"[{\"id\":\"8df18138-f56e-430e-940b-89840d021508\",\"content\":\"https:\\\/\\\/www.scadasystems.net\\\/\"},{\"id\":\"9bcd74f2-f99e-4f1f-a616-0c8e8ee8cfcc\",\"content\":\"https:\\\/\\\/www.trendmicro.com\\\/vinfo\\\/us\\\/security\\\/news\\\/vulnerabilities-and-exploits\\\/one-flaw-too-many-vulnerabilities-in-scada-systems\"},{\"id\":\"1af240c8-0171-45f1-92e6-cdbb7319e9ae\",\"content\":\" https:\\\/\\\/www.emerson.com\\\/en-us\\\/automation\\\/control-and-safety-systems\\\/zedi-saas-scada\"},{\"id\":\"dfafb44e-7751-4d52-8563-fda14d46cf5e\",\"content\":\"https:\\\/\\\/www.siemens.com\\\/global\\\/en\\\/products\\\/automation\\\/industrial-communication\\\/network-security\\\/scala\"},{\"id\":\"836f5c93-d9be-4a86-932d-255d9c7ce6df\",\"content\":\"https:\\\/\\\/www.infosecinstitute.com\\\/resources\\\/security-awareness\\\/the-roi-of-security-awareness-training-2\\\/#j<br>ump5:~:text=for%20your%20organization.-,Step%201%3A%20measure%20your%20security%20costs,-<br>To%20measure%20the\"},{\"id\":\"e9dfac07-297f-4498-a77f-38693913135a\",\"content\":\"https:\\\/\\\/www.linkedin.com\\\/pulse\\\/roi-cybersecurity-training-why-invest-security-education\"}]"},"_links":{"self":[{"href":"https:\/\/sites.wp.odu.edu\/thammcyse200ssample\/wp-json\/wp\/v2\/pages\/330"}],"collection":[{"href":"https:\/\/sites.wp.odu.edu\/thammcyse200ssample\/wp-json\/wp\/v2\/pages"}],"about":[{"href":"https:\/\/sites.wp.odu.edu\/thammcyse200ssample\/wp-json\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/thammcyse200ssample\/wp-json\/wp\/v2\/users\/29584"}],"replies":[{"embeddable":true,"href":"https:\/\/sites.wp.odu.edu\/thammcyse200ssample\/wp-json\/wp\/v2\/comments?post=330"}],"version-history":[{"count":4,"href":"https:\/\/sites.wp.odu.edu\/thammcyse200ssample\/wp-json\/wp\/v2\/pages\/330\/revisions"}],"predecessor-version":[{"id":376,"href":"https:\/\/sites.wp.odu.edu\/thammcyse200ssample\/wp-json\/wp\/v2\/pages\/330\/revisions\/376"}],"wp:attachment":[{"href":"https:\/\/sites.wp.odu.edu\/thammcyse200ssample\/wp-json\/wp\/v2\/media?parent=330"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}