The aim of this report is to address the issues and challenges being faced by the AO world plc organization considering the last IT installation and the operations involved within the activities of the organization. Since the organization is based on online services, it has become a considerable factor for addressing the vulnerabilities related to the challenges and issues in the security of the network. The organization collects many personal and sensitive information of the clients and those data or information are vulnerable to cyber-attack or intrusion. The attempt of this report is to identify the sectors which can be used to affect the integrity, availability,, and confidentiality of the system. The presented security assessment report will be helpful in creating threat profiles of the possible and already identified threats related to the proper and effective functioning of the organization. The security risks associated with the application of the network for the exchange and execution of the operational activities within the AO world can be listed as: Security breaches, data loss, viruses, hacking, and malicious attacks. Virtual Private Network adoption can be helpful for the staffs and the employees to access the data or information saved in the network during off-site. This approach can be helpful in securing the links and protecting the information being exchanged. This report provides an overview of the chosen organization as a case study and based on the thorough research over the organization a security assessment report has been presented. This report is capable of addressing the risks and issues through the application of the OCTAVE methodology in manner to identify the effective threats and issues and present a relative solution for the identified threats.
AO World plc has been one of the leading online retailer company that is providing various domestic appliances to the citizens of the UK through online platform. Mr. John Roberts founded it in the year 2000 and has implemented latest information technologies for the execution of the operational activities of the organization [3]. The transformation was implemented during 2013, when the organization had invested a big amount for the establishment on new information technology in manner to deliver the products and services to the UK citizens.
The security assessment report presented in the following paragraphs has been conducted through the application of the OCTAVE methodology (Operationally Critical Threat, Asset and Vulnerability Evaluation). It is helpful in systemization and enhancement of the identified security risks those have been analysed and identified in the following security risk assessment [10]. This report will be helpful for the AO to retrieve the sufficing results considering the evaluation of the security despite of using the funds and resources excessively. The proposed methodology will be utilizing the valuable human resources of the AO for the collection of information related to the security issues and improving them for the better an effective handling of the data or information saved in the system [2]. The information will gathered from the following personals of the organization:
According to Software Engineering Institute, OCTAVE “is designed to allow broad assessment of an organization’s operational risk environment with the goal of producing more robust results without the need for extensive risk assessment knowledge [4].”
AO’s IT infrastructure has been originally planned for the operations such as a complete independent for other divisions as a self-governing department including the logistics and the technical [7]. This led to the direct communication between the It department’s chief director and the security department’s chief director in manner to consider the aspects emphasizing on the information and data those have been emitted by the explanations provided on the interview on the medias [12]. Following is the list of the members of the analysis team:
PSTN Control Cards: Without having actual knowledge about the status of the service interruption and because of the communication network or hardware failure in the network, connecting the users and the organization could possibly lead to interruption in the PTSN Control Card operation status [6]. There are the possibilities of the accidental outage or interruption because of the failures due to the human faults. Following are the security requirements:
Integrity: the authorized technicians of the AO will only be allowed to access the network after verifying through the TDMF entry that is a PIN access code and having unique codes for each cabinets [11]. Other concerning objective is that the organization should be well aware with the activities including the modification, repair and installation through receiving the daily work schedules of the technicians involved in this project.
Confidentiality: Two primary security requirements are firstly, monitoring the service providers and the core network monitoring through the PSTN control card considering the open or close state of the monitoring cabinet door [17]. Secondly, violation related to this procedure without having a prior update to the system will be leading to the alert signalling through standard process.
Availability: There should be always availability of the access to the control card for the authorized individuals and the technicians in manner to enter the cabinet and make the needed changes [15]. Other factor associated with this availability is that it must be connected with the OCS in constant manner in manner to respond to the frequent periodic polling.
Following are the strategies that can be helpful in protecting the system from these threats: firstly, for an instance if the short outage of the control card services do not exceeds the proposed polling period, it will not be causing significant problem [13]. Secondly, standby technicians can be activated, even if there is outage of the power supply as the UPS system will be automatically supplying the power. For any other inconveniences, Mobile Patrol Security can be contacted.
Central Administration System (CAS) – OCS, OCIM, VPS, and AO server: The software or hardware failures because of the malfunctioning, destruction or tampering of the power and equipment supply loss those are capable of breaking down or temporary malfunctioning of the system. Following is the list of the security requirements:
Integrity: the administrative assistants will be maintaining all the assets those are helpful in routine maintenance and the inspections.
Confidentiality: The IT department’s Chief Director will be performing the activities related to the configuration and the initial installation of the components those have been included in the CAS [20]. Further modifications will need the approval of the director before making any changes or manipulation in the systems. “Operational status, of all components included, is real time monitoring by Chief Director of IT Department and Administrative Assistants, rotating into standby shifts, providing 24/7/365 QoS. [7].”
Availability: the Central Administration System should have the access to all the assets every time. Following recommendation can be presented as the protection strategies;
AO has been using the SDW cloud vendor in manner to allow temporary components’ breakdown for the real time redundancy. OCS, VPS, KIOSK, and OCIM provides the facility of Server Room (server physical location) that has a two factor authentication mechanism including the fingerprint biometric system and the PIN access system that can be helpful in enhancing the security of the systems and the physical locations [25]. The other components CAS and the connections including the kUI terminals, SDW, and KiND have been protected with the IDS system, VPN tunnelling, and hardware firewalls and these can be represented as the most beneficial approach.
KiND (Keruak Information Network Database): Because of the software or hardware tampering, loss in power supply, and equipment’s destruction, there are the possibilities in the failure of the KiND. Despite of these other factors such as modifications, deliberate or accidental manipulation with the data have the capability to malfunction the whole system including the operational interruptions [18]. Outdoor cabinet of the AO are monitoring the information related to the clients those are personal and sensitive can be easily exposed to every user of the KiND. Following are the security requirements for this issue:
Integrity: It is a considerable factor, that the individuals associated with the organization and its mechanisms should have the knowledge and experience of how to deal with the presented incident scenarios.
Confidentiality: The data or information save din the network should must be categorized at different levels considering the privileges associated with the access of the data [22].
Availability: there should be effectively monitoring on the KUI for 24*7. Following are some of the protection strategies: Firstly, the kUI users entering the Web Application through the application of the authentication mechanism should be classified in different user access groups and should be having the different information access rights. The VPN tunnelling willn be allowing the users to access the kUI despite of considering the facts associated with the unauthorized information leakage.
SDW (Sensage Data Warehouse): Due to the utilization of the SDW cloud services, there is not any approach of performing the qualitative security assessment utilizing the OCTAVE framework. This can be treated as the “black box” due to the unavailability of the knowledge and information associated with the inside assets present in the framework of the AO [21]. However, SDW can be represented as untrusted.
(KiND) Keruak Information Network Database
|
|
Concerning Areas |
Threat Properties |
1. Failure in the hardware due to the tampering of the software caused by the insider. |
Access: physical Asset: KiND Actor: insiders Outcome: destruction / loss and interruption Motive: accidental |
2. Failure in the retrieving or alteration of the data because of the software tamper Caused by the user either accidentally or intentionally and thus, hampering the entries related to the critical information [24] |
Access: physical & network Asset: KiND Actor: insiders Outcome: modification, disclosure, destruction / loss and interruption Motive: deliberate and accidental |
PSTN Control Cards |
|
1. The unauthorised user or technicians breaks the PSTN control card accidentally |
Access: physical Asset: PSTN control card Actor: insiders Outcome: Destruction / loss and Interruption Motive: accidental |
2. The unauthorised user or technicians permanently set the control card in manner to provide false / negative condition (no intrusion / no alerts) |
Access: physical Asset: PSTN control card Actor: insiders Outcome: modification and disclosure Motive: deliberate |
3. The cabinet gets breakdown accidentally by an outsider Outsiders (vehicle accident or some sort of similar incidents) |
Access: physical and network Asset: PSTN control card Actor: insiders Outcome: Destruction / loss and Interruption Motive: deliberate |
4. Vandals or Terrorists damages the outdoor cabinet |
Access: physical and network Asset: PSTN control card Actor: outsiders [23] Outcome: Destruction / loss and Interruption Motive: deliberate |
5. Technicians or any other authorized personnel accidentally break communication line of the PSTN control card |
Access: network Asset: PSTN control card Actor: insiders Outcome: Destruction / loss and Interruption Motive: accidental |
6. The unauthorized user or the technicians trap communication line intentionally and thus, blocks the remote access of the PSTN control card |
Access: network Asset: PSTN control card Actor: insiders Outcome: Destruction / loss and Interruption Motive: accidental |
The major focusing sector will be the information infrastructure of the AO through the examination and determination of the key components related to the technology architecture. This could led to the unauthorized actions against the previously identified critical assets taking into the considerations of the identified technological weaknesses [14]. An unauthorized user for proposing solutions and exploiting the solutions in manner to mitigate or minimize the exploitation caused by these weaknesses could utilize these weaknesses. following paragraph explains the vulnerabilities and related solutions those could be incorporated within the business continuity plan.
Considerable Components |
Vulnerabilities in the Technology |
Proposed solution |
Communication between the AO and its partners and customers |
The communication between the personals is being taken by the PSTN through the application of the control card. For the situation such as, total network failure, there will be not any communication between these entities resulting in the unavailability [16] of the information related to the condition of the cabinet. This will be alternatively resulting in the service interruption through deliberately or intentionally. |
In manner to have more than one ISPs, additional GSM connectors can be installed via different paths of the communication that will be helpful in providing the redundancy between the communication entities. |
Accessing the data or information related to the operational activities of the AO through the KiND Location of the Kind |
The data or information saved in the system could be disclosed by an unauthorized user or an unhappy insider and thus, could result in the disclosure of the data to him or her |
The approach can be made for the preparation of the new network database, separating it from the KiND that will be helpful in hosting the required and related data or information by the AO those have been installed within the systems of the AO and being maintained by the administrative of the AO [6] |
SDW (Sensage Data Warehouse) |
The OCTAVE framework methodology is not capable of utilizing the external cloud vendor and the analysis of the real time log data. Thus, it can be represented as untrusted no matter whether it has been tunnelled by the VPN or not or having a firewall |
Replacing the SDW redundancy system with another installed AO department that can be easily and effectively managed by the administrators of the AO |
Terminal physical location of the new entry KUI users New entry KUI users |
There are the possibilities of the physical damage to the physical location of the systems of the KUI users that could led to expose or destruction of data or information related to the AO’s operational activities [23]. There is another assumption as because of the no training provided to the new users, there are the possibilities of the loss or modification of the data or information. |
Transferring all the amployees of the KUI within the existing physical location of the AO can be a helpful approach in providing better and effective training. This training should also address the regulations and policies associated with the application of the services. |
The purpose of this policy would be to address the security issues identified in the first part of this report and through the implementation for the policies; the AO will be beneficial as follows:
References
Essay Writing Service Features
Our Experience
No matter how complex your assignment is, we can find the right professional for your specific task. Contact Essay is an essay writing company that hires only the smartest minds to help you with your projects. Our expertise allows us to provide students with high-quality academic writing, editing & proofreading services.Free Features
Free revision policy
$10Free bibliography & reference
$8Free title page
$8Free formatting
$8How Our Essay Writing Service Works
First, you will need to complete an order form. It's not difficult but, in case there is anything you find not to be clear, you may always call us so that we can guide you through it. On the order form, you will need to include some basic information concerning your order: subject, topic, number of pages, etc. We also encourage our clients to upload any relevant information or sources that will help.
Complete the order formOnce we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.
Writer’s assignmentAs soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.
Completing the order and download