CYB 200 Module Three Case Study TRQ

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

200

Subject

Information Systems

Date

Feb 20, 2024

Type

docx

Pages

7

Uploaded by ChancellorNightingale2248

Report
CYB 200 Module Three Case Study After reviewing the scenario in the Module Three Case Study Activity Guidelines and Rubric document, fill in the table below by completing the following steps: 1. Specify which Fundamental Security Design Principle applies to the control recommendations by marking the appropriate cells with an X . 2. Indicate which security objective (confidentiality, availability, or integrity) applies best to the control recommendations. 3. Explain your choices in one to two sentences with relevant justifications. Control Recommendations Isolation Encapsulation Complete Mediation Minimize Trust Surface (Reluctance to Trust) Trust Relationships Security Objective Alignment (CIA) Explain Your Choices (1–2 sentences) Deploy an automated tool on network perimeters that monitors for unauthorized transfer of sensitive information and blocks such transfers while alerting information security professionals. X C I chose encapsulation because the automated tool is ensuring that the resources are being used as they should be. I chose confidentiality because the system is now preventing any confidential data from being accessed by an unauthorized entity. Monitor all traffic leaving the organization to detect any unauthorized use. X C/I I chose complete mediation because access should be checked to ensure that it is allowed. I chose confidentiality because monitoring the traffic prevents confidential info is not
Control Recommendations Isolation Encapsulation Complete Mediation Minimize Trust Surface (Reluctance to Trust) Trust Relationships Security Objective Alignment (CIA) Explain Your Choices (1–2 sentences) leaving an organization unauthorized. I also chose integrity because the integrity of the confidential info is important to the organization. Use an automated tool, such as host-based data loss prevention, to enforce access controls to data even when data is copied off a system. X X X C I chose encapsulation, complete mediation, and trust relationships because they all help to prevent data loss by protecting the systems, ensuring that access to said data is permitted and that accessing data from a device separate from the host is allowed. This is considered confidentiality because access to the data should only be viewed by those authorized to access it, regardless from where it is being accessed.
Control Recommendations Isolation Encapsulation Complete Mediation Minimize Trust Surface (Reluctance to Trust) Trust Relationships Security Objective Alignment (CIA) Explain Your Choices (1–2 sentences) Physically or logically segregated systems should be used to isolate higher-risk software that is required for business operations. X A I chose isolation because by segregating the systems isolates the data to where it should be accessed. This limits the availability of the high-risk data to only those authorized to access it. Make sure that only the resources necessary to perform daily business tasks are assigned to the end users performing such tasks. X C I chose trust relationships because the rights and privileges of the users is established by the connection to their devices. I chose confidentiality because this ensures that data is not accessed by an unauthorized entity in error. Install application firewalls on critical servers to validate all traffic going in and out of the server. X I A firewall protects the network and ensures that data coming or leaving the organization is
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help