6
.docx
keyboard_arrow_up
School
Schoolcraft College *
*We aren’t endorsed by this school
Course
238
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
3
Uploaded by DoctorRose19236
Bleu Innocent Bombade
6-2 Incident Analysis Brief
Cyber 200
Scenario Analysis: Security objective: Confidentiality
The loss of confidentiality has the greatest negative impact on the organization in this case. Evidence from the scenario is as follows:
a) The administrator noticed signs of intrusion into her office, with file cabinet drawers ajar and her workstation moved. This indicates a potential breach of confidentiality of sensitive data and information stored in these files.
b) Foreign connections were established on the company network using the payroll administrator's account. This suggests that confidential information may have been compromised and potentially extracted from the system.
c) Payroll reports generated after the incident contain "inaccuracies" being investigated by the HR department. This raises concerns about the confidentiality of employee financial data.
Negative impacts of loss of confidentiality:
o
People: Employees may fear that their personal information has been compromised, leading to feelings of insecurity and mistrust towards the organization. Affected employees may also fall victim to identity theft or financial fraud.
o
Process: Loss of confidentiality can lead to breaches of data protection regulations, financial losses, delays in payroll operations and reduced employee confidence in the payroll system.
o
Technologies: The organization's systems may be compromised, resulting in data loss, reputational damage and significant costs associated with system restoration.
Confidentiality is a common term that means guarding information from everyone except those with rights to it. Confidential information includes the following: Private data of individuals;
intellectual property of businesses; national security for countries and governments
Recommendations: Selected safety design fundamentals:
a)
Separation (of domains/duties)
b)
Fail-safe defaults/Fail Secure
Recommendations to remedy the loss of confidentiality:
a)
Implement strict access controls: Apply least privilege policies to limit access to sensitive information to only those employees who need it. This involves implementing a clear separation of roles and responsibilities, as well as robust access control mechanisms to prevent unauthorized intrusions.
b)
Improved intrusion detection: Implement an intrusion detection system that monitors abnormal activity on the network and systems. This can include the use of technologies such as access log analysis, packet inspection and intrusion detection systems (IDS). These measures enable security incidents to be detected quickly and corrective action taken.
The application of these recommendations implements the principle of separation by limiting access to sensitive information and separating roles and responsibilities. In addition, by improving intrusion detection, the security defect/security failure principle is implemented to identify and prevent security incidents.
To balance the impact on people, processes, and technologies, it is essential to raise employee awareness of information security, train staff in good security practices, and implement access control mechanisms that do not compromise the efficiency of operational processes.
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help