Great Deal! Get Instant $10 FREE in Account on First Order + 10% Cashback on Every Order Order Now

Security Risks Our initial protection measures were aimed at protection based on reports that identified cyber-attacks on European banks stealing customers’ credit card information. To combat the...

1 answer below »

Security Risks
    Our initial protection measures were aimed at protection based on reports that identified cyber-attacks on European banks stealing customers’ credit card information. To combat the theft of our citizens’ financial data we must increase the security measures of both data in transit and data stored on databases. Heightened encryption methods reduce the damage of data stolen during transmission. The second area of concern was the economic downturn caused by interest rates being increased and the lowering of small company spending on cyber-security measures. Missteps in providing adequate cyber security may lead to the disclosure of customer data. It is our responsibility as the Federal Government to protect the nation’s best interests. Support of the infrastructure of our economy relies on the protection of commerce and the privacy of our citizens.
Economic Downturn
Issues associated with the economic downturn can be lessened by applying measures that aid in reduction in downtime, increase support of small business cyber-security measures, and offer training for personnel wishing to enter the cyber-security field. To encourage businesses to keep a minimum level of security either a tax reduction for products that aid in cyber-security can be offered and penalties based on compliance failure. A Business Continuity Plan (BCP) offers guidance for actions a company should take when there are issues with their ability to continue business after some event affects operations.
To enact a BCP the company should outline the roles that would identify which personnel are leading specific efforts. This would include the hiring policy that is focused on finding an experienced candidate to fill roles in leadership defined in the BCP. Other tactics to minimize impacts from the economy are increasing the network uptime. It is necessary to create redundancy measures for network loads such as load balancing, DNS failover, and secondary operations sites. Often external collaboration methods can help identify these sites. Cloud computing allows information to be stored off-site and accessible to the customer with the license agreement. The cloud storage option allows for data backups to recover data that may be co
upted, encrypted from an attack, or otherwise unavailable at the normal company site.
Criminal Hacking
    The hacking of computer systems has become a commonplace topic for at least the last decade. Each subsequent attack has experts looking deeper into the value of the efforts that security personnel must include to protect the networks in the future. When dealing with cyber hacking there is not a one size fits all plan, the technology is growing, and new vulnerabilities are being discovered rapidly. There are measures that companies can take to reduce the likelihood of loss when these attacks inevitably find their way onto the network
    Policy is one key method in identifying the staples of security that a company can follow to allow baseline measures. Things to consider are antivirus, authorized software, and the information that can be shared. As the Federal Government, we are limited in what policies we can enforce on private companies’ systems. We can encourage support, provide training, and metrics that can show the value of utilizing the policies we suggest. The use of outdated antivirus will provide lower amounts of protection compared to updated packages. Remaining cu
ent gives hackers less opportunity to find weaknesses in the cyber-security armor they provide. Encouraging an authorized software list for companies requires that approved software from trusted vendors will be identified and used for operations. This may impact some users due to a lack of familiarity. Another good practice is the limitation of information sharing. This is regarding the access employees have to customer data that is not relevant to their jobs.
    Other things to consider when creating cyber security policy that deters hacking:
· Remote Access
· Role-Based Access Controls
· Data Encryption Methods
Public Sentiment
    If our citizens do not feel confident in our decisions, they will disregard any suggestions that we make for the protection of the American networks. We must be diligent in working with public relations to establish a positive outlook on our decisions. Americans must know that we respect the privacy of their information and are taking each precaution we can in establishing safe internet communication methods by following advisories designed by the National Institute of Standards and Technology (NIST), funding research efforts, and requiring
each notifications so that any loss of their data will be reported.
    As an act of faith, we can increase financial funding to support private sector cyber security issues. This will allow for greater access to security tools, training efforts for personnel, and encourage information sharing between private sector professionals and government representatives.
    Stakeholders
    FBI
    DISA
    Department of Treasury
    NIST
    Congress
    Attorney General's Office
    Department of Homeland Security
Critical to every cybersecurity strategy is identification of all stakeholders. In the event of a cyber
each, or often just a cyberattack, certain stakeholders require notification. As you review each round of activity, create a spreadsheet or table with your team that lists stakeholders to be notified. Include this in your AAR.
Retain notes on the control decisions from each round, in addition to the CISO De
ief Report, as you move to the next step of stakeholder identification. 
Round One of the simulation is complete.  All five teams faced the following scenarios: Criminal Hacking and Economic Downturn.
    
    
    Round
        Â 
    Federal Government
    Avisitel
    DTL Powe
    Mistral Bank
    Hytema
    Criminal Hacking
    Â 
    Â 
    Â 
    Â 
    Â 
    Economic Downturn
    Â 
    Â 
    Â 
    Â 
    Â 
Here is how the teams performed after Round One:
In terms of overall Index Score, Hytema and Mistral were tied for the best performance followed close behind by the Federal Government.  Downtime and Profitability are areas to watch closely for the private sector players.  The Federal Government should focus on ways to improve Popular Sentiment and Surplus (Budget) moving forward.
R
Prof G.
    Student Name: Mitsuko Brown | Role: Cyber Security Policy Analyst
        Category
    Decisions
    Round 1
    Antivirus Policy
    Quality of antivirus solution used
    State-of-the-art
    
    Frequency of scans
    Multiple times per day
    
    Frequency of patch updates
    Always once released
    Authorized Software Policy
    Type of software permitted for use by employees
    Approved software
    
    Software evaluation frequency in months
    6
    
    Violation penalties
    Focus on termination
    Breach Notification Policy
    Degree of openness of
each notification
    Only critical incidents
    
    Investigative agencies to call in for major security
eaches
    CERT
    
    Violation penalties
    Focus on termination
    Emergency Bypass Policy
    Spending on emergency bypass policy
    $ 125,000
    
    Response to violations of typical separation of duties protocol
    Not allowed
    
    Violation penalties
    Focus on suspensions
    General Access Policies
    Degree of freedom given to employees regarding communications over the Internet
    Restricted
    
    Degree of freedom over
owsing non-business sites
    Restricted
    
    Degree of logging of Internet access and other system actions and accesses
    All actions
    
    Number of permitted login attempts
    3
    
    Password validity in days
    45
    
    Password length requirements
    8
    
    Non-use of prior passwords
    3
    
    Violation penalties
    Focus on warnings
    Hiring and Employee Policy
    IT team size
    Average
    
    Full-time employees as a percentage of the workforce
    0.9
    
    Hiring by average experience in years
    7
    
    Spending on background check of DSS or other vendors
    $ 15,000
    
    Forced rotation of employees
    Enable
    
    Forced vacation for employees
    Enable
    Information Sharing Policy
    No. of people in groups to overlook and enforce internal information sharing
    4
    
    Internal information sharing by role-based access control
    Strictly need-to-know
    
    Degree of external information sharing
    Strictly need-to-know
    
    Frequency of disclosure for Infragard communication in days
    14 days
    
    Violation penalties
    Suspensions
    Remote Access Policy
    Degree of remote access by employee grade
    Middle management
    
    Access privileges permitted
    Medium - read/write
    
    Violation penalties
    Focus on termination
    
        Rounds
    Rationale
    Round 1
    Strong antivirus solution is critical for protecting federal government information assets especially when cyber threat impact probability is high and the impact of a cyber
each is very high. The US Government will enforce strong password requirements with MFA. 45 day password changes are sufficient with strong password requirements. The security demands of the US Government require more monitoring than other entities less targeted by hackers
    
    
    Student Name: Esi FYNN-AIKINS | Role: Chief Information Security Officer
        Category
    Decisions
    Round 1
    Business Continuity Planning
    Degree of IT data storage redundancy
    Low
    
    Degree of IT network redundancy
    High
    
    Levels of power backup redundancy
    2
    
    Number of backup sites
    1
    
    Number of redundant backup communication links
    3
    
    Policy review frequency in months
    6
    Database Security
    Frequency of forcing password changes in days
    90
    
    Degree of separation of roles for admin and operator roles
    Complete
    
    Control privileges
    Restricted
    
    OS services and associated ports
    Disable
    
    Database honeypots
    Enable
    External Collaboration
    Degree of collaboration with allies and Interpol
    High
    Federal Government Information Classification
    Strictness of cybersecurity information classification
    Top secret/SCI
    Information Privacy Policy
    Privacy program investment spending
    $ 250,000
    
    Appoint a dedicated privacy office
    Yes
    
    Privacy training spending for employees
    $ 400,000
    
    Degree of information and record retention
    All information
    
    Violation penalties
    Focus on suspensions
    Role Based Access Control
    Degree of role-based access control
    High
    Training and Auditing
    Focus on training area: network vulnerabilities
    35%
    
    Focus on training area: controls
    25%
    
    Focus on training area: encryption
    30%
    
    Focus on training area: penetration testing
    10%
    
    Frequency of physical audits of the equipment
    Once a yea
    
        Rounds
    Rationale
    Round 1
    Increased data redundancy can eat up server storage space. Redundancy will be low and done intentionally. A high network redundancy will minimize the chances of e
ors, damage, or shutdowns. A medium-power backup akin to a 2N system will still keep things up and running. It is better to have more redundant backup communication links is essential to ensure effective alternative communication. One offsite backup site is enough for storing data needed in the event of a
each. Critical functions should be reviewed and updated every 6 months to help resume operations quickly after an incident. Role separation stops an attacker using access control. 90 days password change policy limits an attacker's stay inside a hacked account. Enabling honeypots will lure and deflect attackers at the same time to learn their techniques. OSes must be hardened in this instance. Privacy program cost includes cost for a response management tool, estimated incidents per year, cost for time spent on the incident intake and assessment, reporting cost and internal and outside counsel costs. Employees who violate privacy policy will be suspended pending investigation. Cost for training 115 employees in 10 regional offices at an average cost of $390. More focus should be on assessing vulnerabilities, encrypting data, and providing controls. Auditing equipment once a year will reduce cost involved in the audit but still meet requirements for certification.
    
    
    Student Name: Mfonobong Noah | Role: General counsel
        Category
    Decisions
    Round 1
    Advisories
    NSA security configuration guide creation spending
    $ 25,000
    
    NIST li
ary funding
    $ 500,000
    CERT Controls
    CERT funding
    $ 1,250,000
    
    Frequency of automated advisories in days
    10
    
    Experience of CERT responders in years
    2
    
    Training allocation funding
    $ 1,250,000
    
    Vulnerability database maintenance funding
    $ 500,000
    ISACs
    Funding for the ISAC
    $ 1,250,000
    
    Training and certification programs funding
    $ 1,405,000
Answered 2 days After Jun 18, 2022

Solution

Anjali answered on Jun 20 2022
95 Votes
Security Risks
 There are numerous security risks that can threaten the growth of the economy therefore it is necessary to take three different steps to manage the threats and its consequences on the different stakeholders that are involved in the sector. The government of the USA is taking several initiatives to manage the security risks related to the IT infrastructure implemented in the organization. The security risk impacts the different stakeholders involved in the financial sector of the US significantly therefore it is the issue of concern for the US government to combat the risk related to cyber security. The inside threat attacks and the data
eaches or we can say that the risk related to denial of service attack, SQL injection and phishing attacks are the major threats that are impacting the growth of private or the public sector in this country. Therefore the government is planning to implement the different strategies that are incorporating the use of technologies like cloud-based solutions and imposing the laws or reforms according to which the different team members or the employees of the organization need to follow the protocols to manage the sensitivity of the information. There are other strategies like encryption methods or the two way authentication method or QR system that needs to be implemented in the business operations of the organization that helps to manage the cyber security risk and the business continuity can also get enhanced at the time of risk by the implementation of these strategies in the organization. The government of the USA needs to invest on the infrastructure and training of the different employees who are working in these organizations that help to provide the awareness related to new market trends to preserve the sensitivity of the information related to different sectors like financial institutions, healthcare sectors and educational sector of this country.
Economic Downturn
 The economic downturn is also a threat for the development of the economy and the impact of this threat can be reduced by applying the measures that help to increase the support to the private sector by the federal government of the USA. Training programmes for the different personnel who are responsible for cyber security in the private sector play a crucial role to disseminate the information related to the new security measures that are quite effective to manage the implications involved in the cyber security threat. It also helps to foster the business to continuity during the period of economic downturn and a proactive business continuity plan can be designed on the basis of different guidelines that need to be followed by the employees of the organization. This proactive business continuity plan comprises the use of technology for managing the security and it also offers three different guidelines for the company's employees that impact the business operations also. The business continuity plan includes the strategy that helps to combat the risks related to DNS failure, load balancing and the risk related to ransom ware. The risk related to loss of information due to the availability of the weak nodes in the network can also be managed by the implementation of proactive business continuity plans that include the use of strategies like use of cloud-based services and IDS etc.
Criminal Hacking
 Criminal hacking is very prevalent in the US in which the cyber attackers attack the system of the user and ask for money or we can say that huge amount of money. Like the Ransomware attack originated in the US and it impacted the different economies in different manners, the impact of this attack was very huge in terms of software and hardware that is required for information sharing between the different departments. While dealing with the risk related to the criminal hacking the government needs to plan a proactive approach that helps to preserve the software or hardware or IT infrastructure that is implemented in the organization and it is not very easy for the officials of the US government. The major challenge to manage the risk related to the criminal hacking is that a lot of technical expertise is required to regain the system and to identify the weak node in the network. The likelihood of the losses is very high in this case therefore it is a major challenge for the government of the USA to preserve the sensitive information of the different sectors like financial sector, banking sector, healthcare sector, educational sector and other public or private sectors of USA. For this purpose the government has implemented laws that need to be followed by all the civilians and in case of any violation high penalties will be there for the different residents of the USA. Policy building is an effective strategy that helps to stabilize different sections or the sectors that are prone to security risk therefore it is recommended to invest in the research and development department that helps to build up the new strategies or policies to manage the use of different assets in the organization. Remote access policy is also prone to these kinds of attacks therefore it is necessary to build a specific plan for the remote access policy to manage the use of different assets from the place of the user. It is also recommended to regulate the use of different devices or the infrastructure that are required for information sharing between the different individuals that are available at global places. Regular patchwork is also required to manage the risk related to the ransomware. Another good practice that helps to manage the sensitivity of the information is to regulate the information sharing method between the different departments. The different authorisation or rules must be provided to different employees according to the need that helps to regulate the access to the different systems that ca
y the sensitive information. There are methods like remote access, role-based access control and data encryption methods that can be implemented by the government of the USA to manage the risk related to information sharing between the different departments and their criminal hacking.
Public Sentiment
The citizens of the country may not accept  the change implemented in the country and they are resistant to change so it is the responsibility of the government to tell them the different benefits of implementing the strategy. It is the responsibility of the public bodies who are working in the public sector to tell them the advantages of implementing the new strategy in the country that can impact the decision of the different citizens who are involved in the usage of IT infrastructure for the different sectors. The government of US take the advantage of different public sectors to train and provide the information related to the new change implemented in the country that helps to manage the change resistivity easily and the absorption of the change in the country can be done easily by implementing these kind of training sessions for the different...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here