Things‐I‐want‐to‐know‐more‐about‐ops 401 class 3 reading 3 - reedraheem/Things-I-want-to-know-more-about- GitHub Wiki
Readings: Cyber Risk Analysis
Consider a bank ATM that allows users to access bank account balances. What measures can the ATM incorporate to cover the principles of the CIA triad?
Confidentiality: User Authentication: Implement strong user authentication methods, such as PIN codes or biometric verification, to ensure that only authorized individuals can access the account balances.
Encrypted Communication: Use encryption protocols (such as SSL/TLS) to secure the communication between the ATM and the bank's servers, preventing unauthorized interception or eavesdropping of sensitive information.
Integrity: Data Validation: Implement data validation mechanisms to ensure that account balance information is accurate and reliable. This can include checksums or digital signatures to verify the integrity of data during transmission and storage.
Availability: Redundancy and Failover: Implement redundant systems and failover mechanisms to ensure uninterrupted access to account balances. This can include redundant servers, backup power supply, and redundant network connectivity to prevent service disruptions.
Monitoring and Incident Response: Continuously monitor the ATM system and promptly respond to any issues that may impact availability. Implement mechanisms to detect and mitigate service disruptions, such as automated system health checks and alerting systems.
Name three best practices that support the CIA triad.
Role-Based Access Control (RBAC): Implementing RBAC is a best practice that helps enforce confidentiality and integrity. RBAC involves assigning specific roles and access permissions to users based on their responsibilities and job functions. This ensures that individuals only have access to the information and resources necessary to perform their duties. By implementing RBAC, organizations can prevent unauthorized access to sensitive data, minimize the risk of data breaches, and maintain the integrity of systems and information.
Regular Data Backups and Disaster Recovery Planning: Regular data backups and disaster recovery planning are essential practices for ensuring availability and integrity. Organizations should establish regular backup procedures to create copies of critical data and store them securely. Additionally, a robust disaster recovery plan should be in place to address potential incidents or disruptions that could affect the availability of systems and data. This includes strategies for data restoration, system recovery, and continuity of operations, ensuring that services can be restored promptly in the event of an outage or disaster.
Encryption: Encryption is a fundamental practice that supports confidentiality and integrity. It involves encoding data in a way that makes it unreadable to unauthorized individuals. By encrypting sensitive data, even if it is intercepted or accessed unlawfully, it remains protected and confidential. Encryption should be applied to data in transit (such as network communications) and data at rest (stored on devices or servers). Implementing strong encryption algorithms and secure key management practices ensures that data remains confidential and maintains its integrity throughout its lifecycle.
What are the three stages of the risk management lifecycle? What is each stage’s main goal or objective?
Risk Assessment/Identification: The goal of the risk assessment or identification stage is to identify and analyze potential risks that could impact an organization. This involves identifying assets, assessing vulnerabilities, and evaluating threats. The main objective is to gain a comprehensive understanding of the risks an organization faces and prioritize them based on their potential impact and likelihood.
Risk Mitigation/Control: The risk mitigation or control stage focuses on developing and implementing measures to reduce or control identified risks. This involves designing and implementing controls, safeguards, and countermeasures to minimize the probability or impact of risks. The main objective is to mitigate risks to an acceptable level based on the organization's risk tolerance and regulatory requirements. This stage also includes documenting and communicating the implemented controls to relevant stakeholders.
Risk Monitoring and Review: The risk monitoring and review stage involves ongoing monitoring, reassessment, and review of the effectiveness of implemented controls. This includes continuously monitoring the risk landscape, reviewing control effectiveness, and reassessing risks based on changes in the business environment or emerging threats. The main objective is to ensure that the implemented controls remain effective and relevant, identify any new risks or changes in existing risks, and make necessary adjustments to the risk management approach.
Reference:Chat Gpt Assisted