Assignment 2
Assignment 2
Assignment-2
GUSTO University
Table of Contents
Introduction.................................................................................................3
Task-1..........................................................................................................3
What is a Risk?.........................................................................................3
Task-2..........................................................................................................7
Task-2.2..................................................................................................11
Task-2.2.1...........................................................................................14
Task-3........................................................................................................17
1
HND-53 Aung Myat Min
Task-4........................................................................................................21
What is Stakeholder?.............................................................................21
Security Audit.........................................................................................23
Task 4.1..................................................................................................24
Conclusion.................................................................................................32
References................................................................................................33
2
HND-53 Aung Myat Min
Introduction
As a Junior Security Engineer at BIM Cybersecurity, Myanmar's
largest cybersecurity solutions provider, I am responsible for a critical
project for UAB Bank, one of the country's leading financial institutions.
Our company offers comprehensive services, including information
security consulting, assessment, monitoring, and enhancement of
application and network infrastructure protection. My current assignment
involves identifying and assessing IT security risks associated with UAB
Bank’s critical data and infrastructure. This requires using advanced
equipment, tools, and techniques to conduct thorough risk analysis and
security assessments. The goal is to create a detailed report
recommending robust technology solutions and management strategies
aligned with security policies and procedures. Additionally, I will evaluate
various tools and software to ensure effective IT security measures are in
place, managing risks related to access authorization, regulatory
compliance, and contingency planning. This project is crucial for
safeguarding the bank's operations and strengthening its cybersecurity
framework.
Task-1
What is a Risk?
Risk refers to the potential for loss, damage, harm, or negative
impacts on objectives. It can arise from various sources including
uncertainty in financial markets, threats from project failures, legal
liabilities, accidents, natural disasters, and deliberate attacks from
adversaries.
(Times, 2024)
3
HND-53 Aung Myat Min
4
HND-53 Aung Myat Min
5
HND-53 Aung Myat Min
6
HND-53 Aung Myat Min
Task-2
7
HND-53 Aung Myat Min
8
HND-53 Aung Myat Min
Data protection and security regulations are essential for UAB Bank
due to several reasons:
1. Legal Compliance: It is mandatory for UAB Bank to comply with
regulations such as GDPR and DPA. Failure to comply can result in
severe penalties, including hefty fines, legal action, and reputational
damage.
2. Customer Trust and Reputation: Implementing effective data
protection measures enhances customer trust and confidence in
UAB Bank's ability to safeguard their sensitive information. A
reputation for robust data protection practices can differentiate the
bank in a competitive market and attract and retain customers.
3. Risk Mitigation: Data breaches and security incidents can have
significant financial and reputational consequences for UAB Bank.
Compliance with data protection regulations helps mitigate the risk
of data breaches by establishing security protocols, implementing
safeguards, and conducting regular audits and assessments.
4. Global Business Operations: Compliance with regulations like
GDPR becomes imperative as UAB Bank expands its operations
globally or engages with international partners. Ensuring alignment
with global standards facilitates smooth business transactions and
partnerships while avoiding regulatory conflicts and legal
challenges.
9
HND-53 Aung Myat Min
10
HND-53 Aung Myat Min
ISO 17799:2005:
UAB Bank uses ISO 31000:2018 and ISO 17799:2005 to establish
best practices for information security management. These standards help
the bank maintain the confidentiality, integrity, and availability of its
information assets. By implementing ISO 17799:2005, UAB Bank develops
strong security management practices that protect sensitive data and
systems from unauthorised access, disclosure, alteration, or destruction.
Compliance with ISO 17799:2005 demonstrates UAB Bank's commitment
to upholding the highest standards of information security and meeting
regulatory requirements. This approach ensures that UAB Bank protects
the interests of its customers, stakeholders, and the integrity of its
operations in the ever-evolving landscape of cybersecurity threats.
Overall, by incorporating ISO 31000:2018 and ISO 17799:2005 into its risk
management and information security practices, UAB Bank demonstrates
its dedication to managing risks effectively and maintaining a secure
operational environment.
Task-2.2
11
HND-53 Aung Myat Min
12
HND-53 Aung Myat Min
13
HND-53 Aung Myat Min
Task-2.2.1
14
HND-53 Aung Myat Min
15
HND-53 Aung Myat Min
16
HND-53 Aung Myat Min
Task-3
17
HND-53 Aung Myat Min
20
HND-53 Aung Myat Min
Task-4
What is Stakeholder?
A stakeholder is a person, a group, or an organisation that has an
interest in a business, project, or organisation, and can be influenced by
or affect its activities and decision-making. Stakeholders can be members
of the organisation or have no official affiliation, and they can have a
direct or indirect impact on its activities.
(FERNANDO, 2024)
21
HND-53 Aung Myat Min
22
HND-53 Aung Myat Min
Security Audit
In a security audit, various stakeholders play crucial roles to ensure
a comprehensive and effective review. Top management sets the audit
objectives, reviews findings, and allocates necessary resources. The IT
department provides technical data and assists auditors in understanding
the system's intricacies. The HR department supplies records on
employee training and enforces security policies. Legal and compliance
teams ensure that the organisation adheres to regulatory standards, while
the finance department manages budgets and reviews financial aspects.
The operations team demonstrates daily security practices, and external
auditors or consultants offer independent evaluations. Employees
participate by engaging in surveys and providing feedback, offering
valuable insights into the security culture and practices within the
organisation. Each stakeholder's involvement is essential for identifying
vulnerabilities and areas for improvement, ensuring a robust security
posture.
Security audits are necessary for several reasons:
1. To identify and reduce risks: Security audits help find possible
security risks, threats, and vulnerabilities that may harm the
organisation's operations, assets, or reputation. By knowing
weaknesses, organisations can take actions to reduce risks and
improve their security.
2. To comply with regulations: Security audits make sure that the
organisation follows relevant laws, regulations, and industry
standards for information security. Compliance is essential to avoid
legal penalties, maintain trust with stakeholders, and protect
sensitive data.
23
HND-53 Aung Myat Min
Task 4.1
Creating plans to make sure that essential company activities
continue both during and after disruptions is known as business continuity
planning. This includes assessing risks, spotting potential threats like
pandemics, cyberattacks, and natural disasters, and putting procedures in
place to mitigate those risks. This entails describing the processes for data
backup and recovery, alternate work locations, and methods of
communication for UAB Bank. The effectiveness of the plan is ensured by
regular tests and updates. UAB Bank maintains regulatory compliance and
client trust by guaranteeing continuous service.
UAB Bank's Disaster Recovery Plan is a comprehensive strategy
designed to ensure the organisation can continue its critical functions
during and after disruptions.
24
HND-53 Aung Myat Min
25
HND-53 Aung Myat Min
26
HND-53 Aung Myat Min
27
HND-53 Aung Myat Min
28
HND-53 Aung Myat Min
29
HND-53 Aung Myat Min
30
HND-53 Aung Myat Min
31
HND-53 Aung Myat Min
Conclusion
In conclusion, this report emphasises the vital importance of data
protection and security regulations for UAB Bank. It underscores the
necessity of adhering to ISO standards, especially ISO 31000 for risk
management. The report outlines UAB Bank's adoption of these standards
and IT security audits, showing their effectiveness in bolstering the bank's
security measures. Additionally, it evaluates the bank's data security
policy, its objectives, and its success, highlighting the need for alignment
with practical security practices. By including sample security policies, a
disaster recovery plan framework, and identifying key stakeholders, the
report provides UAB Bank with a comprehensive guide for improving its
data protection, security, and risk management strategies.
32
HND-53 Aung Myat Min
References
Content, L., 2024. A complete guide to the risk assessment process.
[Online]
Available at: https://www.lucidchart.com/blog/risk-assessment-process
[Accessed 10 May 2024].
FERNANDO, J., 2024. What Are Stakeholders: Definition, Types, and
Examples. [Online]
Available at:
https://www.investopedia.com/terms/s/stakeholder.asp#:~:text=A
%20stakeholder%20has%20a%20vested,%2C%20governments%2C%20or
%20trade%20associations.
[Accessed 14 May 2024].
Gillis, A. S., 2022. security audit. [Online]
Available at: https://www.techtarget.com/searchcio/definition/security-
audit
[Accessed 12 May 2024].
imperva, 2024. Data Protection. [Online]
Available at: https://www.imperva.com/learn/data-security/data-
protection/
[Accessed 11 May 2024].
Journal, I., 2024. What Is a Data Processing Agreement (DPA)?. [Online]
Available at: https://ironcladapp.com/journal/contracts/what-is-a-data-
processing-agreement-dpa/
[Accessed 11 May 2024].
MANAGEMENT, P., 2020. What is the purpose of policies in the
workplace?. [Online]
Available at: https://www.powerdms.com/policy-learning-center/what-is-
the-purpose-of-policies-in-the-workplace
[Accessed 12 May 2024].
Readt, 2024. Risk Assessment. [Online]
Available at: https://www.ready.gov/business/planning/risk-
33
HND-53 Aung Myat Min
assessment#:~:text=A%20risk%20assessment%20is%20a,within%20or
%20because%20of%20it.
[Accessed 10 May 2024].
Times, E., 2024. Economic Times. [Online]
Available at: https://economictimes.indiatimes.com/definition/risk
[Accessed 10 May 2024].
Zaichenko, M., 2022. Internal and External Stakeholders Roles &
Responsibilities. [Online]
Available at: https://maddevs.io/blog/internal-and-external-stakeholders-
in-it/
[Accessed 14 May 2024].
34