CYB_100_2-3

.docx

School

Southern New Hampshire University *

*We aren’t endorsed by this school

Course

100

Subject

Information Systems

Date

Dec 6, 2023

Type

docx

Pages

5

Uploaded by DrTree1894

Report
CYB 200 Module Two Case Study Template Control Recommendations Least Privilege Layering (Defense in Depth) Fail-Safe Defaults / Fail Secure Modularity Usability Security Objective Alignment (CIA) Explain your Choices (1-2 sentences) Automatically lock workstation sessions after a standard period of inactivity. (Completed as an example) X C I chose layering because it adds another layer of protection for the confidentiality of our data. If possible, close and lock your office door when leaving your computer. X C Adds a physical layer of security preventing access to the devices that contain sensitive information. Use technology to make sure that only authorized software executes, and unauthorized software is blocked from executing on assets. X X I Default to no access and allows access only to authorized software. Use automated tools to inventory all administrative accounts to ensure that only authorized individuals have elevated privileges. X I Prevents unauthorized data access by ensuring only authorized
Control Recommendations Least Privilege Layering (Defense in Depth) Fail-Safe Defaults / Fail Secure Modularity Usability Security Objective Alignment (CIA) Explain your Choices (1-2 sentences) individuals are giving elevated privileges and there is a log of who those individuals are. Use system configuration management tools to automatically reapply configuration settings to systems at regularly scheduled intervals. X I Prevents unauthorized users from using reconfigured settings to access the system. Maintain an inventory of all sensitive information stored or transmitted by the organization's technology systems, including those located on site or at a remote location. X X A If one section of data is stolen it can be isolated to find how it was accessed and prevent access to remaining data at other sites. Use approved whole-disk encryption software to encrypt the hard drive of all mobile devices. X X C Adds a layer of data protection that still allows
Control Recommendations Least Privilege Layering (Defense in Depth) Fail-Safe Defaults / Fail Secure Modularity Usability Security Objective Alignment (CIA) Explain your Choices (1-2 sentences) access by authorized sources. If USB storage devices are required, software should be used that can configure systems to allow the use of specific devices. X X C Defaults to no access for USB storage but software allows for USB to be allowed if and when appropriate. Configure systems not to write data to external removable media, if there is no business need for supporting such devices. X X C Same as USB devices Defaults to no access for external storage but software allows for external storage to be allowed if and when appropriate. If USB storage devices are required, all data stored on such devices must be encrypted. X X C USB storage devices can be easily stolen. Encryption is an extra layer
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help