CYB 200 Module Three Case Study TRQ
.docx
keyboard_arrow_up
School
Southern New Hampshire University *
*We aren’t endorsed by this school
Course
200
Subject
Information Systems
Date
Feb 20, 2024
Type
docx
Pages
7
Uploaded by ChancellorNightingale2248
CYB 200 Module Three Case Study
After reviewing the scenario in the Module Three Case Study Activity Guidelines and Rubric document, fill in the table below by completing the following steps:
1.
Specify which Fundamental Security Design Principle applies to the control recommendations by marking the appropriate cells with an X
.
2.
Indicate which security objective (confidentiality, availability, or integrity) applies best to the control recommendations.
3.
Explain your choices in one to two sentences with relevant justifications.
Control
Recommendations
Isolation
Encapsulation
Complete
Mediation
Minimize Trust
Surface
(Reluctance to
Trust)
Trust
Relationships
Security
Objective
Alignment
(CIA)
Explain Your Choices
(1–2 sentences)
Deploy an automated tool
on network perimeters that monitors for unauthorized transfer of sensitive information and blocks such transfers while alerting information security professionals.
X
C
I chose encapsulation because the automated tool is ensuring that the resources are being used as they should be. I chose confidentiality because the system is now preventing any confidential data from
being accessed by an unauthorized entity.
Monitor all traffic leaving the organization to detect any unauthorized use.
X
C/I
I chose complete mediation because access should be checked to ensure that it is allowed. I chose confidentiality because monitoring the traffic prevents confidential info is not
Control
Recommendations
Isolation
Encapsulation
Complete
Mediation
Minimize Trust
Surface
(Reluctance to
Trust)
Trust
Relationships
Security
Objective
Alignment
(CIA)
Explain Your Choices
(1–2 sentences)
leaving an organization unauthorized. I also chose integrity because the integrity of the confidential info is important to the organization.
Use an automated tool, such as host-based data loss prevention, to enforce access controls to data even when data is copied off a system.
X
X
X
C
I chose encapsulation, complete mediation, and trust relationships
because they all help to prevent data loss by protecting the systems, ensuring that
access to said data is permitted and that accessing data from a device separate from the host is allowed. This is considered confidentiality because access to the data should only be viewed by those authorized to access it, regardless from where it is being accessed.
Control
Recommendations
Isolation
Encapsulation
Complete
Mediation
Minimize Trust
Surface
(Reluctance to
Trust)
Trust
Relationships
Security
Objective
Alignment
(CIA)
Explain Your Choices
(1–2 sentences)
Physically or logically segregated systems should be used to isolate higher-risk software that is required for business operations.
X
A
I chose isolation because by segregating the systems isolates the data to where it should be accessed. This limits the availability of the high-risk data to only those authorized to access it.
Make sure that only the resources necessary to perform daily business tasks are assigned to the end users performing such
tasks.
X
C
I chose trust relationships because the rights and privileges of the users is established by the connection to their devices. I chose confidentiality because this ensures that data is not accessed by an unauthorized entity in error.
Install application firewalls
on critical servers to validate all traffic going in and out of the server.
X
I
A firewall protects the
network and ensures that data coming or leaving the organization is
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help