The Committee on National Security Systems (CNSS) is an US intergovernmental organisation tasked that set policy, standards, and guidelines for national system security. According to the CNSS,
TSY Business Ltd is a financial services firm that has recently dealt with several security incidents, including data breaches and unauthorised access to its
a) Identify the company's potential information security risks and vulnerabilities to assist you in prioritising the implementation of the CNSS controls based on the most critical risks.
b) Identify the CNSS controls required to address the risks and vulnerabilities. Provide a suitable implementation strategy for this purpose.
c) In the given scenario, which of the three CIA triads of information security are most at risk? Justify your answer.
Step by stepSolved in 3 steps
- Where do you believe information security begins and end for an organization? What are the earliest and latest points under an organization control at which its security polices and measures and disengage respectively Do you think either of these boundaries could be extended?arrow_forwardA security policy is a document that provides employees with clear instructions about acceptable use of company confidential information, explains how the company secures data resources and what it expects of the people who work with this information. Most importantly, the policy is designed with enough flexibility to be amended when necessary. You are working in organization X, and you are supposed to develop an issue-specific security policy, you can pick one issue from Table.1 [1] (In the photos) Your Task is: To develop the different sections of your policy and adequate procedure(s), you can refer to SANS Policy Templates [2]. References: [1] Developing an Information Security Policy: A Case Study Approach, Fayez Hussain Alqahtani. 4th Information Systems International Conference 2017, ISICO 2017, 6-8 November 2017, Bali, Indonesia. [2] https://www.sans.org/information-security-policy/arrow_forwardUse examples to demonstrate. the manner in which the normal personnel practices, controls, and information security ideas are integrated together to create a component of the information security function.arrow_forward
- Choosing The Right Security Framework For Your Organization The many challenges related to building and running an information security program can be overwhelming. The chief information security officer (CISO) is responsible for running Identity And Access Management (IAM), Data Loss Prevention (DLP) and many other security programs. On top of those daunting considerations are the complex areas of governance, risk and regulatory compliance. One of the most effective ways to build and maintain these programs is to use a hybrid security framework that is customized to meet business objectives, and to define policies and procedures for implementing and managing controls in the organization. It should be tailored to outline specific security controls and regulatory requirements that impact the business.Common Security FrameworksTo better understand security frameworks, let’s take a look at some of the most common and how they are constructed.NIST SP 800-53First published in 1990, National…arrow_forwardThe main goal of any IT security policy is to protect confidentiality, integrity, and availability (CIA) of data. One reason to have the BYOD security policy is to identify devices that introduce unnecessary vulnerabilities to the organization's computing resources. How is timely discovery of such vulnerabilities will reduce the attack vector on an organization's computing resources?arrow_forwardWhat are the most significant information technology security issues facing firms today? Do you think they've changed in the last five years, and do you think they'll continue to change? What steps can organizations take to ensure that they are wel-prepared for future security risks?arrow_forward
- Database System ConceptsComputer ScienceISBN:9780078022159Author:Abraham Silberschatz Professor, Henry F. Korth, S. SudarshanPublisher:McGraw-Hill EducationStarting Out with Python (4th Edition)Computer ScienceISBN:9780134444321Author:Tony GaddisPublisher:PEARSONDigital Fundamentals (11th Edition)Computer ScienceISBN:9780132737968Author:Thomas L. FloydPublisher:PEARSON
- C How to Program (8th Edition)Computer ScienceISBN:9780133976892Author:Paul J. Deitel, Harvey DeitelPublisher:PEARSONDatabase Systems: Design, Implementation, & Manag...Computer ScienceISBN:9781337627900Author:Carlos Coronel, Steven MorrisPublisher:Cengage LearningProgrammable Logic ControllersComputer ScienceISBN:9780073373843Author:Frank D. PetruzellaPublisher:McGraw-Hill Education