In: Computer Science
Question 3: Mike has recently joined ‘MyBank’ as a security engineer. During his initial days, Mike’s line manager required him to observe the environment of the employees working in the head office. On his second day, Mike observed an employee using a USB stick into bank’s computer and his personal laptop back and forth. This situation concerned Mike… Answer the following: a. What makes Mike concerned? Discuss the implications of this security weakness on ‘MyBank’ in terms of the CIA triad. b. What could be done to restrict employees from using USB sticks into ‘MyBank’ owned computing devices. c. If an employee attempts to use a USB stick into ‘MyBank’ owned computing devices, what could be done to generate an alarm for this unusual activity? Do we need to configure a ‘system’ for this particular activity to happen? If yes, state the working of that system.
a)
The concern of mike is true! As he is a security engineer, it is his responsible for the confidential information. Not only confidential information but also all the working ajendas and customer details of an organisation should be secured. As a security engineer he has to take care of the things like confidentiality, password system, implementing security softwares etc. Apart from this he can monitor the employees and can find the attakers when there is any security breech accured.
When employees are using USB stick there may be a chance of transferring the confidential data, so most of the organisation donot allow access to the private devices. The leakage of the information may cause huge loss. Even there are many ransome attacks may occur do to this. The information which is accessed by the employees is very sensitive and contaions standards of oranisation, customer deatails , plans etc which have to be secrete.
In the case of MyBank senario the security system is too weak because no employer schould use there personal gadgets in the office environment. Now in MyBank the employees are using there USB stick to tranfer data. while transfering what if they transfer any confidential information. In accordance to CIA traid here C represents confidentiality, In MyBank situation by using USB sticks the data may get leaked which leads to breech of confidentiality. I maens integrity, here there may be chances of manipulating the data, so the organisation must have to use some software to provide limited access. A means availability, which says that the confidential information shoud not be avalilable for everyone. There must be a time limit to access that type of data.
b)
To restrict the activities like USB connections, an organisation should restrict the employees to use the USB sticks. It is fully recommended to disable the USB ports of the devices int he organisation, such that no one can access them. Software has been available for decades that allows organisations to manage access to USB ports. USB ports are accidental or malware copying of data to unprotected portable devices. Such software very often has options for logging, particularly for writing files to USB. USB ports are not just a security threat but they’re also an issue with increasingly stringent personal data protection law. This applies not just to data transferred via USB, but also email, instant messaging services and particularly internet. So better to disable the USB ports and instant mailing facilities and using the personal mails gadgets etc.
c)
The ubnoramal attempts by anyone the organisation must be noticible. There should strick rules if anyone comences the security breech. Not only security department but every one in the office must be responsible for the information. There should be revokations if they malpractice so that no one easily comenses it. There must be a monitoring department who must take care of the accessing things. For example, If any employee uses the thretening things like USB or accessing the confidential severs it shouldbe known to the deparment and they must immediatly take actions.
There must be implementation of the software which provides safety and also limits the access.
For example :
Solar wing security event manager
Intruder
Malwarebytes
CIS etc..
To achieve the effeicient security. Any system by defaultly donot come with limiting accesses so organisations have to take care of disabling some parst of the system which are threat pron.
Thank you.