Question

In: Computer Science

Question 3: Mike has recently joined ‘MyBank’ as a security engineer. During his initial days, Mike’s...

Question 3: Mike has recently joined ‘MyBank’ as a security engineer. During his initial days, Mike’s line manager required him to observe the environment of the employees working in the head office. On his second day, Mike observed an employee using a USB stick into bank’s computer and his personal laptop back and forth. This situation concerned Mike… Answer the following: a. What makes Mike concerned? Discuss the implications of this security weakness on ‘MyBank’ in terms of the CIA triad. b. What could be done to restrict employees from using USB sticks into ‘MyBank’ owned computing devices. c. If an employee attempts to use a USB stick into ‘MyBank’ owned computing devices, what could be done to generate an alarm for this unusual activity? Do we need to configure a ‘system’ for this particular activity to happen? If yes, state the working of that system.

Solutions

Expert Solution

a)

The concern of mike is true! As he is a security engineer, it is his responsible for the confidential information. Not only confidential information but also all the working ajendas and customer details of an organisation should be secured. As a security engineer he has to take care of the things like confidentiality, password system, implementing security softwares etc. Apart from this he can monitor the employees and can find the attakers when there is any security breech accured.

When employees are using USB stick there may be a chance of transferring the confidential data, so most of the organisation donot allow access to the private devices. The leakage of the information may cause huge loss. Even there are many ransome attacks may occur do to this. The information which is accessed by the employees is very sensitive and contaions standards of oranisation, customer deatails , plans etc which have to be secrete.

In the case of MyBank senario the security system is too weak because no employer schould use there personal gadgets in the office environment. Now in MyBank the employees are using there USB stick to tranfer data. while transfering what if they transfer any confidential information. In accordance to CIA traid here C represents confidentiality, In MyBank situation by using USB sticks the data may get leaked which leads to breech of confidentiality. I maens integrity, here there may be chances of manipulating the data, so the organisation must have to use some software to provide limited access. A means availability, which says that the confidential information shoud not be avalilable for everyone. There must be a time limit to access that type of data.

b)

To restrict the activities like USB connections, an organisation should restrict the employees to use the USB sticks. It is fully recommended to disable the USB ports of the devices int he organisation, such that no one can access them. Software has been available for decades that allows organisations to manage access to USB ports. USB ports are accidental or malware copying of data to unprotected portable devices. Such software very often has options for logging, particularly for writing files to USB. USB ports are not just a security threat but they’re also an issue with increasingly stringent personal data protection law. This applies not just to data transferred via USB, but also email, instant messaging services and particularly internet. So better to disable the USB ports and instant mailing facilities and using the personal mails gadgets etc.

c)

The ubnoramal attempts by anyone the organisation must be noticible. There should strick rules if anyone comences the security breech. Not only security department but every one in the office must be responsible for the information. There should be revokations if they malpractice so that no one easily comenses it. There must be a monitoring department who must take care of the accessing things. For example, If any employee uses the thretening things like USB or accessing the confidential severs it shouldbe known to the deparment and they must immediatly take actions.

There must be implementation of the software which provides safety and also limits the access.

For example :

Solar wing security event manager

Intruder

Malwarebytes

CIS  etc..

To achieve the effeicient security. Any system by defaultly donot come with limiting accesses so organisations have to take care of disabling some parst of the system which are threat pron.

Thank you.


Related Solutions

You have recently joined Royal Security Services as an information security intern. Your supervisor has asked...
You have recently joined Royal Security Services as an information security intern. Your supervisor has asked you to research two network firewalls. In this regard, you have to create a table by comparing features of firewalls in terms of filtering methods (stateless or stateful filtering), additional features these firewalls support (IDS, content filtering, etc.), and the cost of each firewall. Which one you would recommend to your supervisor? Justify your answer. please give answer in tabular form
You have recently joined Star Technical Solutions as an information security officer. The company has been...
You have recently joined Star Technical Solutions as an information security officer. The company has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, you want to use another protocol which offers stronger security than SSL. Which protocol is similar to SSL but offers stronger security? Justify your answer by comparing the features of SSL and your proposed protocol in a tabular form. b) One of...
You have recently joined Star Technical Solutions as an information security officer. The company has been...
You have recently joined Star Technical Solutions as an information security officer. The company has been using SSL in a business-to-business environment for a number of years. Despite the fact that there have been no compromises in security, you want to use another protocol which offers stronger security than SSL. Which protocol is similar to SSL but offers stronger security? Justify your answer by comparing the features of SSL and your proposed protocol in a tabular form.
Mike has chosen improvement of commercial systems and security threat as a research subject for his Informatics Ethics course.
Case Study 1Mike has chosen improvement of commercial systems and security threat as a research subject for his Informatics Ethics course. He develops an algorithm for the purpose of implementing his project in a practical process. He can fix the security vulnerabilities of some companies with this algorithm and he adds these vulnerabilities to his project as project grade. When one of the companies that Mike has entered searches the source of the attack, they find university laboratory as a...
Tommy has recently graduated from SUSS and has joined a well-known retailer that operates 3 department...
Tommy has recently graduated from SUSS and has joined a well-known retailer that operates 3 department stores in Singapore. His job function is that of a business analyst. It has been well-reported that retail business in Singapore is on the decline and his employer would like to determine if the forecast for the next few years will be equally bad. Tommy has been tasked to perform the analysis and his output will provide insights in the company's hiring and expansion...
10.  Jack has a friend, Mike, who recently sold his car to another friend, Sally. Sally agreed...
10.  Jack has a friend, Mike, who recently sold his car to another friend, Sally. Sally agreed to pay Mike $10,750 in 9 months 4 months ago and signed a note to that effect. Unfortunately, Mike needs some cash now. Jack agrees to take the note off of Mike’s hands for $10,300. What annual simple interest rate will Jack earn when Sally pays him at the end of the time period? 11.Kari wants to save for her kid’s college education. She...
10.  Jack has a friend, Mike, who recently sold his car to another friend, Sally. Sally agreed...
10.  Jack has a friend, Mike, who recently sold his car to another friend, Sally. Sally agreed to pay Mike $10,750 in 9 months 4 months ago and signed a note to that effect. Unfortunately, Mike needs some cash now. Jack agrees to take the note off of Mike’s hands for $10,300. What annual simple interest rate will Jack earn when Sally pays him at the end of the time period?
this is an ethical question regarding options ARMs posed by my insturctor: Alan recently joined Friendly...
this is an ethical question regarding options ARMs posed by my insturctor: Alan recently joined Friendly Investment and Financing Options (FIFO) as a loan officer. FIFO is a national company that specializes in mortgage lending. One of Alan’s responsibilities is to increase the amount of mortgages FIFO initiates. In a meeting he had with the CEO yesterday, Alan was told about a new mortgage that FIFO intends to market. The new mortgage is called an option adjustable rate mortgage, or...
You are a CIMA member who has recently joined a limited company that processes food. The...
You are a CIMA member who has recently joined a limited company that processes food. The company is effectively run by one director. The other directors are non-executive and all have close personal relationships.As a key member of the finance team you have discovered that some employees are being paid cash in hand and not via the formal payroll. You also have suspicions that some of these people are being employed illegally and you have no records of their formal...
Arham has recently joined as a purchase manager at Cripple Technologies Company in Muscat, Sultanate of...
Arham has recently joined as a purchase manager at Cripple Technologies Company in Muscat, Sultanate of Oman. He got request from the various departments that they need additional computers. He analyzed all requirements and finally decided to place orders for 100 computers. Cripple Technologies Company has the bidding policy for selecting the best tender, where they take proposals from different computer suppliers. After analyzing all the proposal they finalize the deal. Arham's son (Jasem) works at Fiddley Computer Corporation in...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT