Wednesday, March 13, 2019
Hacking and Countermeasures: Controls
Aim Higher College makes to en current the pencil eraser of all its breeding. Recently we earn delayn suspicious and c atomic number 18less activity in the research information concentrate on. Data spunk technicians submit reported lights left field on, doors left open, successful logins to the research informationbase, as well as login attempts in the backup problem database after normal hours of operation. Beca role this is also the backup for our stemma information we need to keep this bea as secure as possible.In order maintain control over who has entree to what in the center we need first ensure that only those that need attack to the center are granted the appropriate permissions to the areas that they need. The revolving door should only allow genius soulfulness through at a snip, this bequeath serve to counter some star with surface access from slipping by with some one that does rescue access or allow a person with access well-favoured access to some that is non authorized in the build. This give be done with a using simple radio frequency naming (RFID) cards for the initial access to the buildings lobby.Both entry and liberation allow require that the card be say so that a log of who enters and leaves the building tush be kept. Entry to the staff offices leave alone simply be with a RFID card reader. With these cards, we can select what areas they behave access to according to their needs. The look double doors and access to the receiving area can only be opened from the inside of the building. By allowing one-way access we ensure that hacking of the reader is not possible. Biometric scanners should be used for all comminuted areas as a second method to prohibit card cloning. Those that have access to sensitive areas or doors that can allow more than one person through such as the shipping area and front double doors go out be issued a Personal Identity stay (PIV) cards. These card take to the woods with the bio metric scans. When the card is scanned it relays tothe biometric scanner the information that the scanner pull up stakes need to make the identification.This means that even if the cards RFID is cloned as soon as it is read it would be denied because the biometric information is not there. The biometric that we should use is an iris scanner. Rather than hand dimensions that can change or fingerprints. Fingerprints are easy to fool, if the finger is dry the scan may not read correctly, the maintenance if high as the sensor must be cleaned, impurities on the hand or air can give false readings, and in the end to prevent the spread of disease. Iris scanners do not require personal contact, eyeglasses, and contracts normally do not disrupt the reading.To make things easier the iris see is untold faster. The iris can be scanned as the person is walk up and then compared to the card when the PIV is read . In addition, it is my pass that the datacenter be physically separated betwee n the backup site and the research site. This ordain allow students and staff to gain access to the research center exclusively not the backup center. Only those that need to have access to the phone line side backup will be required to use biometrics and a PIV card. All servers will be locked in cabinets for the protection of the severs and SANs that are on site.This will deter theft of any equipment that might defend information. Security cameras will be used to monitor all access and movement within the building. Thirteen stationary static cameras will need to be in use to watch all hallways, doors, and the datacenters. Two intercommunicate detecting pan / tilt / zoom (PTZ) cameras will be paced in the center of the data centers (one in each) to follow and watch the activity of persons entering. This should be accompanied with a security department form that monitors movement, doors and windows. The diagrams below show the military strength of the cameras and access cont rol equipment and measures that are recommended.In the event of a role outage, it is passing recommended there is ample UPS in place for at least 15 minutes to allow for proper shut down. Preferable would be to have a backup generator so that information can be saved and moved to another site or to maintain functionality until the power amazes back on. Protection of the systems will consist of the floor being increase by at least eight inches from the ground and an automatic tenderness system in place to mitigate flooding. Because there are commonwealth working in these areaswe need to ensure that we have an adequate notify suppression and we need to keep in mind the equipment that is in the room.The recommendation here is to use an waterless go up suppression. While it may not be as cheap as using water, the damage of having a water system in the area will be much more expensive. weeweeless systems work by lowering the oxygen in the area to a point that the fire cannot co ntinue combustion without the unhealthful effects to persons like Halon or CO2. The have been proven to put out fires faster without any damage people. This will give all persons enough time to evacuate calmly in case of fire . Water systems only help in containing the fire until fire fighters can arrive, in the meantime, we are causing damage to our own equipment They cost of the damage would be in the millions to replace servers and other equipment.The estimated time after a fire with a water system is approximately one month if data can be recovered. Not that we have the physical aspect of the data centered covered we need to look at the technical or logical side of protecting the information. Safeguarding the confidentiality, integrity, accessibility, and the non-repudiation (CIA) is vital. As stated before an IDS and IPS will be put in to place to watch the system at all times to report and mitigate if not stop self-appointed activity to the business backup and research datab ases. This will help with monitor the entanglement and see what and where unauthorized traffic and attempts are coming from. Anti-virus and anti-malware programs will be installed on all systems in both databases to protect the information and programs.Firewall implementation between the networks is necessary to keep unauthorized attempts from getting in to the business side of the database. All information will be encrypted so that if the data is or any hardware is stolen then the information be more difficult to read and will hopefully discourage the thief. To prevent a brute force attack through a sympathize with tie after 3 attempts at a password the system will lock down that port and a flag will be sent to the data center technician on duty.To ensure that the person that is attempting to gain access to the server through a console connection a token that generates a random alphanumeric code will be used. As we all know people are where we see the biggest problems in securit y breaches and problems on any computer or network system. People need to understand what they are allowed and not allowed to do, this is where policies, procedures, and training come in to play. Byimplementing policies that use best practices, such as an unobjectionable use policy for all staff and students, we make it known what they are allowed to do, and what the consequences are should they choose to ignore the rules.Training all staff and students on security awareness is something that is necessary so that people to go or do things that can jeopardize the network. Making sure that procedures are documented help if there is a problem that can arise again, this reduces down time should the problem return. Making sure that a disaster recovery design (DRP) is in place, practiced and trained on regularly. This is critical to make sure that down time is as minimal as possible. The separation of duties helps to contribute up the processes involved to complete a task prevents one person from having total control over the whole system.Each person or team up is responsible for his or her area only and if required forces collusion so that someone else is needed to meet the end goal. It acts like a checks and balance. With these policies in place we need to ensure that they stay current with or business continuity plan and the goal of our mission statement. This will be set up by security reviews and audits. This helps to ensure we do not get smug as well. Performance evaluations help with ensuring that all staff is at their distributor point performance. Here is where performance correction for both junior and senior members comes in to play. We always need to keep even our staff up to naming and fine-tuned to keep one-step ahead. Background checks from time to time are a good way of making she that all employees are acting honestly.There by safeguarding from any circumstance outside of work, that would lead one to perform maliciously with in work for a pe rsonal gain. Required vacations will help with employees with being overwrought with situations at work. As people, we need to step back, rest, and retrieve focus. Forcing staff to take vacations helps this happen. Finally, rotation of duties helps to make the team come to a better understanding of the network as a whole. This allows all members to be cross platform trained, which helps when someone is sick, on required vacation, or a team is short from termination. Aim higher college has come a prospicient way in the two months now that security is serious concern.If we work together then we can make this college one that students and faculty sense safe coming to, to learn and teach. With colleges competing with online schools and courses, our information system needs to be at its most secure and bestperformance to keep pulling students in. These controls are just an insight as to the recommendations that looked at seriously and deeply considered to make sure that Aim Higher Col lege stays at the top.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.