Assignment6_Instructions (1)

.pdf

School

Colorado State University, Global Campus *

*We aren’t endorsed by this school

Course

606

Subject

Information Systems

Date

May 3, 2024

Type

pdf

Pages

7

Uploaded by DeaconAtom14104 on coursehero.com

The CIA triad stands for confidentiality, integrity, and availability. (3 points) Confidentiality: Describe one approach that can be used to ensure the confidentiality of data in a digital environment. Explain how this approach helps in preventing unauthorized access to sensitive information. One method to maintain data confidentiality in a digital setting involves the use of a firewall. Firewalls serve an important part in maintaining the security and privacy of data. They achieve this by employing various techniques such as filtering packets, stateful examination, and application-layer filtering. They carefully review both incoming and outgoing network traffic, immediately avoiding any unauthorized access by utilizing established standards such as IP addresses, port numbers, and application protocols. By the implementation of security policies, firewalls effectively restrict access to sensitive information, ensuring that only authorized individuals are able to gain entry. Virtual Private Network (VPN) concentrators enhance security by encrypting data transmissions, ensuring the utmost confidentiality. Firewall systems equipped with Intrusion Detection and Prevention Systems (IDPS) are capable of promptly detecting and preventing malicious activities. By implementing these measures, firewalls act as security safeguards, regulating access to sensitive information and reducing the potential for unauthorized exposure in digital settings. Integrity: Identify one technique to maintain the integrity of data. Discuss how this technique ensures that the data remains accurate and unaltered unless authorized. One of the methods that aids in preserving the accuracy of data is through the use of checksums. Checksums are calculated using algorithms that generate a distinct value based on the content of the data. Checksums are compared before and after data transmission or storage. Any change made to the data, if intentional or accidental, will result in a unique checksum value, suggesting that the data has been compromised. This approach guarantees the integrity of the data by providing an opportunity for recognizing any changes that are made to it. If the checksum remains consistent, it indicates the data is accurate and wasn't tampered with. Checksums serve an essential part in digital communications, file transfers, and storage systems through guaranteeing data integrity and identifying any unauthorized modifications.
Availability: Suggest one practice that ensures the availability of data in information systems. Explain how this practice ensures that authorized users can readily access data when necessary. Implementing redundant storage systems is essential to guaranteeing the availability of data in information systems. Redundant storage is an approach that guarantees data is securely stored by making duplicate copies and distributing them across various storage devices or locations. In case of any hardware failure or loss of data, redundant storage ensures unaltered access to the data from different sources for authorized users. This practice enhances accessibility by decreasing the likelihood of data loss resulting from hardware failures, disasters, or unexpected incidents. As a result, authorized users can easily retrieve data whenever needed. Identify a piece of news related to cybersecurity. Provide a summary of the news and discuss how it relates to the NIST Cybersecurity Framework (CSF). (2 points) Ransomware Attack Targets Healthcare Provider A recent news report brought attention to a ransomware attack that aimed a major healthcare provider, causing significant disruptions to essential services and compromising the safety of
patient data. The organization's network infrastructure was targeted by an attack, leading to in the encryption of data and a request for ransom payment. . This news is following the NIST Cybersecurity Framework (CSF) in multiple ways. Firstly, it emphasizes the importance of the "Identify" function of the CSF, which emphasizes the understanding of cybersecurity risks. Healthcare organizations, being critical infrastructure, want to identify any vulnerabilities in their network infrastructure and systems in order to deal with potential threats. In addition, the attack highlights the significance of the "Protect" function of the CSF, which aims to implement safeguards against cyber threats. It is of the utmost importance for healthcare providers to set up strong security measures like firewalls, intrusion detection systems, and endpoint defense to effectively protect against ransomware attacks. In addition, the incident highlights the significance of the "Detect" function of the CSF, which involves going on monitoring and detection of cybersecurity events. recognizing any unusual network activity or suspicious conduct at an early stage might have enabled the healthcare provider to reduce the impact of the attack. In addition, the CSF highlights the importance of having an incident response plan to efficiently deal with and recover from cybersecurity incidents like ransomware attacks. It is essential for healthcare organizations to establish protocols for managing and mitigating attacks, ensuring the recovery of affected systems, and effectively communicating with the appropriate parties to minimize any negative effects on patient care and data security. Choose two keywords from the list below to research. For each keyword of your choice, answer the following questions: a. What is its definition? b. How can individuals and / or organizations prevent and protect against this cybersecurity threat? c. How can individuals and / or organizations respond and recover from this cybersecurity threat? (1.5 points * 2 keywords)
Your preview ends here
Eager to read complete document? Join bartleby learn and gain access to the full version
  • Access to all documents
  • Unlimited textbook solutions
  • 24/7 expert homework help