Data Security of First Onion

Octave findings:

 

  1. Sensitive HR department hard copy files found in Budget and Management department
  2. HR soft copy files can be accessed by President's assistant
  3. Sensitive emails from customer loan department being sent in within intranet in plain text
  4. Sensitive emails from loan default department being sent to outside legal firm.
  5. Backups are performed weekly on magnetic tape, are not encrypted but stored in a secure vault
  6. Some departments have Norton antivirus and some have McAfee.
  7. Some departments have latest antivirus updates and some do not.
  8. Audit trail and transaction logs are monitored weekly and usually Friday afternoon.
  9. Customer data server with sensitive information is now positioned in public view outside President's office
  10. Not all networks and subnets have firewalls to restrict flow of information incoming and outgoing.
  11. All computers running UNIX and Windows NT or 2000 are tested with Webenforcer.
  12. Tripwire is used to verify file and system integrity and in particular for servers, routers, switches and web pages.

You have 45 minutes to complete the following

  1. Review the list of data security observations
  2. Make comments about each observation - for example, whether this is a serious problem, or not so serious, whether you would give this a priority or not, whether you would have to wait for availability of funds or not, etc.
  3. List what assets are vulnerable and what the potential impact on the organization if the assets were compromised. 
  4. What are the threats tot he confidentiality, integrity and/or availability of the assets.
  5. How could the threats be exploited?
  6. What means might an intruder use?
  7. What motive might the intruder have?
  8. How could you protect against the threats?
  9. From a Risk-Management point of view what would be the expected loss?
  10. What other observations or comments would you like to make?
Group #  
How many in the group?  
    email of member
Name of member 1
Name of member 2
Name of member 3
Name of member 4
Who is responsible for submitting this exercise?
  Comments
1 Sensitive HR department hard copy files found in Budget and Management department

 

2 HR soft copy files can be accessed by President's assistant

 

3 Sensitive emails from customer loan department being sent in within intranet in plain text

 

4 Sensitive emails from loan default department being sent to outside legal firm.

 

5 Backups are performed weekly on magnetic tape, are not encrypted but stored in a secure vault

 

6 Some departments have Norton antivirus and some have McAfee.

 

7 Some departments have latest antivirus updates and some do not.

 

8 Audit trail and transaction logs are monitored weekly and usually Friday afternoon.

 

9 Customer data server with sensitive information is now positioned in public view outside President's office

 

10 Not all networks and subnets have firewalls to restrict flow of information incoming and outgoing.

 

11 All computers running UNIX and Windows NT or 2000 are tested with Webenforcer.

 

12 Tripwire is used to verify file and system integrity and in particular for servers, routers, switches and web pages.

 

Home | 4990 Project 1 | 4990 Syllabus  | 4990 Class Schedule | HOMEWORK | Attendance |