100% satisfaction guarantee Immediately available after payment Both online and in PDF No strings attached 4.2 TrustPilot
logo-home
Exam (elaborations)

Unit 11: Cyber Security and Incident Management (Activity 2 - Protection Measures)

Rating
-
Sold
2
Pages
17
Grade
A+
Uploaded on
21-02-2023
Written in
2020/2021

This document consists of a total of 30 Protection Measures (combined into 9 sections and approx 5300 words) to the Activity 1 - Threats and Vulnerabilities document I've uploaded. I was able to write down 6 of these sections with almost 16 Protection Measures in my exam and got Distinction mark. These protection measures are quite flexible and you should be able to use it for some of your own threats too. TIP: You'll need to add around 16-18 Protection Measures at least to get full marks/Distinction in this activity. I'd suggest to spend more time on this than Activity 1 because Activity 2 is worth more.

Show more Read less
Institution
Course










Whoops! We can’t load your doc right now. Try again or contact support.

Written for

Study Level
Examinator
Subject
Unit

Document information

Uploaded on
February 21, 2023
Number of pages
17
Written in
2020/2021
Type
Exam (elaborations)
Contains
Questions & answers

Subjects

Content preview

Set Task Electronic Template – Unit 11

Task A - Activity 2 Template: Cyber security plan for the networked system

Use the section headings below for each protection measure.
1) Threat(s) addressed by the protection measure
2) Details of action(s) to be taken
3) Reasons for the actions
4) Overview of constraints – technical and financial
5) Overview of legal responsibilities
6) Overview of usability of the system
7) Outline cost-benefit
8) Test plan


Test plan

Test Test description Expected outcome Possible further
No action following
test
1

2

, 1) Threat(s) addressed by the protection measure
1. Wi-Fi connection is not encrypted; Outdated Protocols Used
2. Misconfigured NAT
10.MITM attack on Wi-Fi connections via ARP Poisoning
11.MITM Attack using Packet Sniffing

2) Details of action(s) to be taken
- Configure Wi-Fi Settings properly
- Enabled NAT in Wi-Fi settings
- Make sure the staff/employees of HC don’t use free public Wi-Fi
- Regularly check for browser updates
- Install browser plugins to enforce users to use only HTTPS
- Set up Packet Filtering in Firewall

3) Reasons for the actions
Configuring Wi-Fi protocols properly is ensuring that the Wi-Fi is secure and latest Wi-
Fi security protocols are in place. For HC, it is important that their connection is using
latest security protocols as they have free public Wi-Fi. Outdated protocols such as
WEP and WPA, which are set by default, does not have strong encryption and
authentication, and can easily be guessed and intercepted by a MITM attack.
Comparing to latest protocols such as WPA2 and WPA3 which provides better
encryption and authentication as they use AES encryption and authentication which
generates a pre shared key that’s hard to guessed. Even though it guessed and
connection is intercepted and data is stolen, the hacker wont be able to read the data
as it will be in an encrypted format. Hence, the data will be useless for him.

Enabling NAT is a part of configuring Wi-Fi as it is a facility build in modern routers.
NAT hides the company’s devices private (real) IP addresses and assigns a global IP
address to every device whenever they are requesting information from a website
meaning whenever they are trying to communicate with the internet. This reduces the
chance of ARP Poisoning and DDOS attack attempts as the attacker wont be able to
locate exact IP address because the real IP address will be hidden. Hence, securing
the server and data stored in it.

It is important that staff don’t use public free Wi-Fi even if the connection is
encrypted. This is because many unknown users or hackers will also be connected to
connection, and it is likely that they can target the staff user for phishing or MITM
attack. This can cause serious issues for the business if confidential information is
stolen. However, if staff is warned and taught about not connecting to the free Wi-Fi
and the consequences that HC and its staff will have to face, it will reduce the chances
of a staff member using free Wi-Fi and being a victim for cyber-attacks.

As browsers are constantly updating their software, so it is important that we stay up
to date with them. This is because some of the patches might be just security updates
which are very beneficial sometimes as they increase the security of using the
browser and requests sent from it.

There are plugins/extensions available in browser extension/plugin store that adds a
layer of encryption onto HTTP. It does this by rewriting the requests to those unsecure
sites to HTTPS by adding the digital certificate (SSL/TLS). Hence, limiting the chances
of an attacker intercepting the information requested or sent to a website as the
attacker would require to break SSL/TLS encryption which is hard to do.

, As ARP Poisoning is done when a hacker sends ARP Packets across the LAN containing
hacker’s MAC address and victim’s IP address. After receiving the packet, hacker’s
MAC address is attached with victim’s MAC address as their MAC cache has been
changed. To prevent this, it is important that firewall monitor what packets are
coming in the LAN. This is done via Packet Filtering which detects if a malicious or
poisoned packet is trying to come in the LAN or is in the LAN according to firewall
rules (policy). After detecting, It can filter and block malicious packets that show any
conflicting source information.

4) Overview of constraints – technical and financial
Technical – except Wi-Fi protocols and NAT configuration, everything else stated
above don’t need any technical networking knowledge. Wi-Fi and NAT configuration
would require some knowledge and according to the scenario, HC IT management
team do have the knowledge and skill.

Financial – no financial constraints as there is no cost involved.

5) Overview of legal responsibilities
It is important to configure Wi-Fi, enable NAT and setting up packet filtering as it will
comply HC with legalities as their data is secure.

6) Overview of usability of the system
Usability should be improved as updating the browser, configuring Wi-Fi, and packet
filtering will restrict the number of unwanted packets coming in the network and
slowing it down. However, enforcing HTTPS might reduce a bit of usability as some
websites might be blocked as they don’t won’t work with a SSL certificate.

7) Outline cost-benefit
There is no investment included in these security measures however if HC doesn’t
have a modern router with NAT facility then they will have to buy a new one with NAT
facility as it is important to configure it to mitigate ARP and DDOS attacks.

8) Test plan
Test Test description Expected outcome Possible further
No action following
test
1 Set up latest protocols in WPA2/WPA3 should be enabled If WPA2 is not
Wi-Fi settings enabled, then do the
test again. Record
the evidence in log

2 Enable NAT in Wi-Fi Settings should show that its If not, then enable
settings enabled is again. Record the
evidence in the log

3 Check browser settings Should show that the latest If not then install
to see if you are up to version is installed the latest
date version/update

4 Check firewall packer Should show the report of If any malicious
filtering report/log to see packets coming in and out of packet is spotted,
if any untrusted packets the LAN then block it
$19.22
Get access to the full document:

100% satisfaction guarantee
Immediately available after payment
Both online and in PDF
No strings attached


Also available in package deal

Get to know the seller

Seller avatar
Reputation scores are based on the amount of documents a seller has sold for a fee and the reviews they have received for those documents. There are three levels: Bronze, Silver and Gold. The better the reputation, the more your can rely on the quality of the sellers work.
Saim Bolton Sixth Form College
Follow You need to be logged in order to follow users or courses
Sold
202
Member since
3 year
Number of followers
139
Documents
19
Last sold
1 month ago
Sammy

Just helping folks like me to get good grades :)

3.6

42 reviews

5
15
4
9
3
9
2
4
1
5

Recently viewed by you

Why students choose Stuvia

Created by fellow students, verified by reviews

Quality you can trust: written by students who passed their tests and reviewed by others who've used these notes.

Didn't get what you expected? Choose another document

No worries! You can instantly pick a different document that better fits what you're looking for.

Pay as you like, start learning right away

No subscription, no commitments. Pay the way you're used to via credit card and download your PDF document instantly.

Student with book image

“Bought, downloaded, and aced it. It really can be that simple.”

Alisha Student

Frequently asked questions