Advanced Cyber Security 2022
UNIVERSITY OF SUNDERLAND
ASSIGNMENT COVERSHEET
Student ID: 219464961 Student Name/ Names of all group
members: Arbin Shrestha
Programme: Computer Systems Engineering Module Code and Name: CET324:
Advanced Cyber Security
Module Leader/ Module Tutor: Roshan Due Date: 05/06/2022 Hand
Kandel Date:05/06/2022
Assessment Title: Assignment 1
Learning Outcomes Assessed: (number as appropriate)
Mark
1
Arbin Shrestha (BSc (Hons) / 2nd trimester)
Advanced Cyber Security 2022
Areas for Commendation
Areas for Improvement
General Comments
Assessor Signature: Overall mark Moderator Signature
(subject to
ratification by the
assessment board)
……………………………………………………………………
I confirm that in submitting this assignment that I have read, understood and adhered to the University’s Rules and
procedures governing infringements of Assessment Regulations.
2
Arbin
PRINT Shrestha (BSc
Student Name: (Hons)
Arbin / 2nd trimester)
Shrestha Faculty Stamp (date/time)
Student Signature:
Module Code and Name: CET324 – Advanced CyberSecurity
Advanced Cyber Security 2022
3
Arbin Shrestha (BSc (Hons) / 2nd trimester)
Advanced Cyber Security 2022
Table of Contents
Part 1......................................................................................................................................................5
Introduction............................................................................................................................................5
Types of activities cyber clinic undertake to service stakeholders........................................................5
Benefits of the activities.........................................................................................................................6
Concerns that might arise by establishment of service..........................................................................7
Issues concerning liability and any legal and / or professional concerns..............................................7
Conclusion..............................................................................................................................................7
Part 2......................................................................................................................................................8
Introduction............................................................................................................................................8
Steps must be taken by individuals and as an organization for enhancing the cyber security...............8
Before breach......................................................................................................................................8
After Breach.......................................................................................................................................9
Benefits of the steps...............................................................................................................................9
Ethical and professional issues with the implementation of steps.......................................................10
Ethical issues....................................................................................................................................10
Professional issues............................................................................................................................11
Conclusion............................................................................................................................................11
References............................................................................................................................................12
4
Arbin Shrestha (BSc (Hons) / 2nd trimester)
Advanced Cyber Security 2022
Part 1
Introduction
According to survey 2021 by the government of the UK, in the four of ten business (39%), quarter of
charities (26%) report cyber security breaches or attacks in a year and this is more in the medium
business (65%), large business (64%) and high-income charities (51%) (Anon., 2021).
In cyber security, the most important thing is CIA (Confidentiality, Integrity, and Availability). For
confidentiality, we have authentication and authorization which helps to secure data from the access
of intruders or unknown users. We must confirm if data has not changed from the original data and
the data must be available to the authorized one.
Types of activities cyber clinic undertake to service stakeholders
This cyber clinic performs different activities to provide service to stakeholders.
i. Creating of awareness
Creating the awareness among individual, employee, employer and others about the risks,
threats and the measures for it.
ii. Perform actions (actions are Define, Detect, Defend and Deter)
This is the advice for the university to have the actions to define the risks, threats, etc,
detect the issues, breach, threats, etc, defend against the possible threats and risk and deter
means to warn the people about the possible risk and threats.
iii. Creating the cybersecurity committee at board-level and robust policy
There must be the board level committee and robust policy in the organization which
works in maintaining of cybersecurity.
iv. Use of security infrastructure
This means the organization must use the security infrastructure in the organization like
the use of firewall, IDS, IPS and others which helps to make the network secure.
5
Arbin Shrestha (BSc (Hons) / 2nd trimester)
Advanced Cyber Security 2022
v. Backup of the important business data
There must be the time-to-time backup of the data so that we could back up the data if
any attacks, casualties occur in the organization.
vi. Crown jewel and asset identification
Finding of important assets of organization.
Benefits of the activities
There are the great advantages of the activities to make the individual, organization secure from the
different attacks, risk and threats like the Man in the middle attacks, social engineering attacks etc.
The awareness is important activity as this helps people to use the multi-factor authentication, use of
the strong passwords (Al-Ghamdi, 2021).
Advice about the Define, Detect, Defend and Deter helps to know the environment of cybersecurity,
about confidentiality, integrity and availability then in detection, attacks are detected by process of
monitoring logs, honeypots, IDS etc., early detection means there is the much less of adverse effect
than intended. Defending helps to defend against real-time cyber-attacks where we use network IPS,
disaster recovery process etc. and deter warns to people about risks, threats and breaches (Onuoha,
2018). Creating a committee and robust policy helps an organization for monitoring, taking action if
any incident about security occurs. The robust policy makes users to use devices in secure manner
like use of complex password, multi-factor authentication uses etc.
Using security infrastructure like the firewall, antivirus, spam filter etc. help in the packet filtering,
detection of intruders etc. IDS monitors the resources computer and send the reports of the about the
anomaly and the strange patterns (Ashoor, 2011). Backup eradicate the consequences that we might
face after breach. We can get the data if we face virus, ransomware, disaster etc. and finding jewels
helps to secure the important assets.
6
Arbin Shrestha (BSc (Hons) / 2nd trimester)
Advanced Cyber Security 2022
Concerns that might arise by establishment of service
As a cyber clinic we also must be secure ourself as if any of the internal employee or service
provider steals the data and credentials and sell it. Then there can be the risk of penalty, collapsing of
the clinic. If we don’t follow the standards and take permissions while doing the VAPT (Vulnerable
Assessment and Penetration testing), find vulnerabilities then we could be penalized. We could be
liable if we cannot complete the work in time. We must be aware about the legal concerns and the
standards to work for the clients.
Issues concerning liability and any legal and / or professional concerns
The opening of cyber clinic is a good step but we must take care about legal concerns and liability.
We must have concern of the copyrights, trademark and patents. In copyrights we must be careful of
the tangible or fixed expression of an idea like use of the sounds, software and others. On trademark
like name, use of symbols and others. We need to be careful in the patents also. In professional
concern we must have punctual professional so that there won’t be delay in the work that we take
also we could find problem in finding of better cybersecurity professionals. In liability issue we must
be aware of assets that we work on. We could be liable if any breaches occurs when they share
credentials with us. We cannot do anything we like but must work under the standards of
organizations like European Union (EU) Directive on data protection, GDPR (General Data
Protection and Regulations) etc.
Conclusion
The different activities for providing service are explained with the benefits. The concerns are also
explained.
7
Arbin Shrestha (BSc (Hons) / 2nd trimester)
Advanced Cyber Security 2022
Part 2
Introduction
In this part I am having the different steps that we take before and after the breach in the organization
to be secure. The ethical and professional issue are discussed.
Steps must be taken by individuals and as an organization for enhancing the cyber security
Before breach
Step 1: Securing of network
We use the different security infrastructure in the network like the use of firewall, IDS, IPS and
others which helps the network out of the reach of the attackers, hackers etc. We could use the VPN
for the secure remote connection. This also include the privilege to the user and authorization in the
organization with different accounts and backup of data. Also, we must use the updated operating
system. These all work for the CIA (Confidentiality, Integrity and the Availability).
Step 2: Monitoring
The second step is the monitoring in which we monitor if the infrastructure we built are working
properly or not.
Step 3: Testing
In the testing step we test the network level as well as the host level security by the use of the
different tools to find out the weakness.
Step 4: Improving
In this fourth step we work on the improving on the weakness we find on testing.
8
Arbin Shrestha (BSc (Hons) / 2nd trimester)
Advanced Cyber Security 2022
After Breach
Response team creation
We create the response team which include IT professionals for the event happened so that they can
investigate the event.
Use of backup
We use the backed-up data for the work if any data has breached and manipulated.
Investigation and management
Our response team do investigation in the breach and find out the damage and manage it.
Contact users/clients
We need to contact all the users and clients of the network who are using it so that they couldn’t be
more affected by the breach.
Threat sharing
In the threat sharing we share the threat with the organizations like Cyber Security Information
Sharing Partnership (CISP), Warning Advice and Reporting Point (WARP) and others.
Prevent for future
For the future prevention we need to follow the steps before breach and create awareness. According
to (Steven Furnell, 2020) the awareness about cyber security to non-cyber employee is not common
in the UK business with only 1 in 9 businesses.
Benefits of the steps
In securing network, we use the firewall, IDS, IPS etc which helps us to filter the packets, block port
and can protect from the intruders. We will be able to inspect the incoming and outgoing packets (C.
Togay, 2022). The use of the SSL VPN for the mobile connection give client and server
authentication based on digital-certificate, confidentiality with integrity checking. (Sun, 2011).
9
Arbin Shrestha (BSc (Hons) / 2nd trimester)
Advanced Cyber Security 2022
In the monitoring of network, we monitor if they are working well or not which helps us to analyze
the effectiveness of the device that we used. In the testing, we can have the testing of the network
using the different tools and human resources like the hiring of the ethical hacker and the use of the
high-speed port scanner e.g. Nmap, ZMap, and others. We do the VAPT (Vulnerable Assessment
and Penetration Testing) which helps us to find the loopholes, weakness of our network. (P. Shi,
2019). We have the improving step to improve network like changing in the policy, addition of the
infrastructure, cyber security professional and others.
The creation on response team helps to distribute the pressure of IT admin, helps in the quick finding
of the damage in the organization and can stop more damage. For the continuity of the work, we can
use the backed up data. The investigation of the attacks and damage helps to spread the damage and
can easily share with the client that those things are affected by the breach. So that the client can be
more alert. We must share the threats that we face so that others don’t get the threats and attack in
same way. Then we work for the future security.
Ethical and professional issues with the implementation of steps
Ethical issues
The data that we have can be shared by the employee of the organization which could create the
threats in the organization. Also, the IT professionals must be in the ethics as they have the total
access in an organization. Because of less knowledge of the computer ethics and awareness the
employee might open the Phising sites, open the mails from the unknown sources and other. In the
computer ethics there can be the problem in the improper use of the internet which could bring the
ransomwares, Phising etc. (Shimmal, 2018)
Professional issues
In the professional issues there can be lack of cyber security human resources. The person who does
the monitoring could be the unethical and irresponsible which could emerge the issue in the cyber
10
Arbin Shrestha (BSc (Hons) / 2nd trimester)
Advanced Cyber Security 2022
security. Also person who takes the backup don’t take the backup in time which could result in the
loss of the data. IT admins might also miss to give the awareness to employee.
Conclusion
The different steps for the security are explained briefly.
11
Arbin Shrestha (BSc (Hons) / 2nd trimester)
Advanced Cyber Security 2022
References
Al-Ghamdi, M. I., 2021. Effects of knowledge of cyber security on prevention of attacks. Effects of
knowledge of cyber security on prevention of attacks, pp. 2214-7853.
Anon., 2021. GOV.UK. [Online]
Available at: https://www.gov.uk/government/statistics/cyber-security-breaches-survey-2021/cyber-
security-breaches-survey-2021?msclkid=74a4f9a1c82a11ec9cce790b99837947#contents
[Accessed 30 April 2022].
Ashoor, A. S., 2011. Importance of Intrusion Detection System (IDS), 2(1), pp. 1-4.
C. Togay, A. K. C. C. a. B. T., 2022. A Firewall Policy Anomaly Detection Framework for Reliable
Network Security. Transactions on Reliability, Volume 71, pp. 339-347.
Onuoha, D., 2018. SMPTE Motion Imaging Journal. Cyber Defense: Deter, Detect, and Defend, pp.
1-6.
P. Shi, F. Q. R. C. a. K. Z., 2019. The Penetration Testing Framework for Large-Scale Network
Based on Network Fingerprint. 2019 International Conference on Communications, Information
System and Computer Engineering (CISCE), pp. 378-381.
Shimmal, J., 2018. Legal Ethical and Professional Issues in Information Security. Legal Ethical and
Professional Issues in Information Security.
Steven Furnell, J. N. S., 2020. Home working and cyber security – an outbreak of unpreparedness?.
Computer Fraud & Security, 2020(8), pp. 6-12.
Sun, S. H., 2011. The advantages and the implementation of SSL VPN. Software Engineering and
Service Science, pp. 548-551.
Yuchong Li, Q. L., 2021. Energy Reports. A comprehensive review study of cyber-attacks and cyber
security;, Volume 7, pp. 8176-8186.
12
Arbin Shrestha (BSc (Hons) / 2nd trimester)