Introduction
The purpose of the Security Assessment Report (SAR) is to identify and mitigate information system vulnerabilities that could have allowed hackers access to the Office of Personnel Management (OPM) database. This would potentially allow them to exploit the system and steal sensitive data. By implementing a SAR, it will be possible to protect the data and assets from malicious actors.
The components assessed in a SAR are the system’s architecture, software, and hardware. The controls to protect the information systems from unauthorized access will also be evaluated. Finally, any potential threats targeting the information systems will be identified and addressed. The scope of this assessment includes assessing the vulnerabilities of OPM’s information systems and recommending corrective measures.
Components and Security Benefits of an Enterprise Network
An enterprise network is a collection of interconnected computers and telecommunications devices that support an organization’s operations. It encompasses all systems and applications used by employees to perform their duties. One of the components of an enterprise network is the workstation. Workstations are individual machines used by employees to perform their job duties (Emerson et al., 2021). They typically have a moderate level of technical sophistication and are connected to the corporate network through a router or switch.
The second involves the servers and machines that store company data and are used to run applications and provide user services. They are typically more technically sophisticated than workstations and are connected to the corporate network through a router or switch. The third element comprises network devices, including switches, routers, firewalls, and other devices that facilitate the exchange of data between computers on the corporate network.
The fourth involves the infrastructure components, which include cables and telephone lines that connect different parts of the enterprise network. It also includes servers, storage systems, and other equipment used by network administrators. Other components include public networks and internal networks.
A well-designed network will provide security benefits, such as reducing the risk of data theft or system intrusion. The system’s environment includes the hardware and software that support an organization’s information systems. It also includes the policies, procedures, and practices governing the use of these systems. Some of the security benefits include:
- Reducing the risk of data theft by encrypting sensitive information.
- Using firewalls and other security measures to protect against unauthorized access.
- Deploying multi-layered security protection to protect systems from malware and other attacks.
- Installing and keeping antivirus software up to date.
- Regularly back up data to prevent loss in the event of a system failure.
The organization should have a single Local Area Network (LAN) that connects all the systems and users in the organization. This LAN will be used to provide secure communication between systems. Besides, the organization should have two Wide Area Networks (WANs); one should connect the organization’s offices and sites, and the other should connect the organization’s data centers. All traffic between systems on the LAN and WAN will be encrypted using encryption protocols such as Secure Sockets Layer (SSL) or Transport Layer Security (TLS).
The network includes firewalls to protect against unauthorized access from outside the network. Systems will be configured to automatically connect when activated. The proposed LAN and WAN will offer distinct benefits in terms of security. The LAN will provide a secure environment for system users. At the same time, the WAN encrypts all traffic between systems, protecting it from unauthorized access. The WAN is also more reliable than the LAN, which can be affected by network congestion or errors.
Threat Identification
Threats can originate from various sources, including hackers, cybercriminals, and nation-states. Identifying potential hacking actors and threat attacks is crucial for protecting networks and information systems. Hackers may seek to gain access to networks or information systems for purposes such as theft or disruption. Cybercriminals may use threats to steal data or commit other crimes.
Nation-states may use threats to gather intelligence or interfere with operations. It is essential to have a plan in place to protect networks and information systems from potential threats. This plan might include strong authentication mechanisms and vulnerability scanning tools. In some cases, taking action to remediate or mitigate the effects of previous attacks may also be necessary.
There could be several potential hacking actors that could potentially target the proposed OPM’s network and information systems. These actors could include cybercriminals, nation-state actors, or hackers. The mitigation techniques available in the organization include:
- Hackers’ techniques should be analyzed to identify any possible vulnerabilities.
- Regularly scan systems for vulnerabilities and implement appropriate security measures to mitigate risks.
- Implementing authentication and authorization schemes that are hardened against attacks.
- Ensuring that all changes and updates are appropriately documented, tracked, and authorized.
- Maintaining an inventory of all devices connected to the network and proper records of system decommissioning.
The types of remediation and mitigation techniques available in the organization may include:
- Vulnerability scanning tools that identify potential security issues on networks and information systems.
- Updating software and firmware on information systems.
- Configuring firewalls, intrusion detection, and prevention systems.
- Implementing strong authentication measures for users accessing sensitive information or networks.
Firewalls and Encryption
A firewall is a security device that helps protect an organization’s network systems from unauthorized access, attack, and data theft. The firewall will help protect the database from threats from a hacker on the LAN, and it can also help protect the server from threats from a malicious employee on the WAN (Cherry, 2022). They also help protect against insider threats, such as employees who have access to sensitive information or systems.
Databases
Auditing is used to track and monitor network activity. Besides, it can help identify unauthorized access, system changes, and other suspicious activities. Auditing can be performed using standard security tools, such as intrusion detection systems (IDS) or log monitoring software (Chang et al., 2022). When audit data is collected from various parts of the network, it can help investigators reconstruct events in the system. This information can then be used to identify potential attackers and protect the system’s confidentiality, integrity, and availability. A Relational Database Management System (RDBMS) can be used to store sensitive and confidential data.
Auditing is a critical security measure that helps safeguard the confidentiality, integrity, and availability of data, especially within an RDBMS, by meticulously tracking all system events. This recorded information is essential for identifying potential external attackers and protecting the data. Moreover, auditing extends its monitoring to systems outside the RDBMS, which is key to defending against insider threats. By closely observing all system activity, auditing actively prevents unauthorized access and maintains the overall security of the data.
Several types of security auditing can be used to monitor activity on a network. For example, a system integrity audit checks the system’s integrity by monitoring for changes that may have occurred in the system (Kitahara et al., 2020). Additionally, it helps prevent unauthorized access to files and systems. The operational audit is the other type of security auditing used in monitoring. This type of audit monitors how well users and administrators use the system. Lastly, it tracks performance trends and identifies any problems that may be causing these trends.
Access control logs can identify who has accessed a system or file. They can also be used to track the progress of unauthorized access. Database transaction logs can help identify problems with database transactions and prevent them from occurring again. Firewall logs can track the traffic passing through a firewall and see which ports are being opened and closed. These logs should be regularly captured and monitored to ensure the system operates as intended and that potential security breaches are detected and resolved promptly.
If any of these logs indicate a potential security breach, further investigation may be required to determine the source of the problem. Overall, access control logs, database transaction logs, and firewall logs are all valuable tools for security administrators. They can help identify problems with system performance and unauthorized access. By regularly capturing and monitoring these logs, administrators can ensure that the system is operated safely and effectively.
Passwords
Password strength is essential for security administrators, as passwords can be easily cracked if they are not properly protected. In the OPM scenario, the company’s employees’ passwords were incredibly flimsy and simple to guess. This could pose a serious security risk to the organization if these passwords were compromised. Administrators must ensure that all users and employees use strong passwords that are difficult to guess or crack. By doing so, they can help protect the organization from potential security breaches.
Weak passwords are a significant security risk for the organization. By default, most web browsers allow users to create passwords that are easy to guess or crack (Almasi et al., 2020). This makes it easy for attackers to access user accounts and sensitive information. Additionally, weak passwords can be easily stolen by hackers attempting to break into the system through password theft attacks. Weak passwords can lead to serious consequences for the organization if they are compromised. Administrators should encourage all users and employees to use strong passwords to prevent cracking, which will help protect the system from potential attacks and keep the data safe.
When creating a password, choosing a strong word combination that is not easily guessable is necessary. For example, it is not recommended to use the same word or phrase as someone else in the organization. Additionally, employees should avoid using easily guessed words, such as “password,” or easy-to-remember numbers, like 1234. Instead, a unique password should be chosen for each account created. One can also consider using a password manager to help manage and protect passwords. The software automatically generates strong passwords, which makes it even harder for attackers to access the account information.
OPM Case Study
The external threats to the system can include threats from a malicious hacker on the LAN. The insider threat can involve employees accessing sensitive data and information. These threats can occur in the previous diagrams where the hacker is on the LAN or an employee has access to sensitive data and information. A historical OPM breach involved hacked databases, and the personal information of 5.1 million people was compromised (Iasiello, 2021).
This poses a serious security threat, as it could enable criminals to steal identities or sell stolen data. The hack also raises questions about the security of OPM’s systems, which could impact the privacy of millions of Americans. The OPM breach case demonstrates that a similar attack can occur within an organization, making it crucial to protect data and information. A security assessment will help identify and prevent these types of threats from happening.
Findings and Recommendations
- Strong password policy with multifactor authentication. The organization should strongly consider implementing a strong password policy with multifactor authentication, which can help to protect against password theft and other attacks that could result in the exposure of sensitive data. Additionally, multifactor authentication can help ensure that only authorized employees can access sensitive information.
- Software and firmware update. It is crucial for the organization to regularly update software and firmware to ensure that they are protected against potential attacks. This will help to protect against vulnerabilities that attackers could exploit, and it will also help to ensure the stability of an organization’s operations.
- Monitoring for signs of cyber attacks. The organization needs to regularly monitor for signs of cyberattacks. This can help identify potential threats before they become a reality, and it can also help protect against attacks that have already occurred.
- Stronger cybersecurity measures. The organization must implement stronger cybersecurity measures, including strong passwords, authentication protocols, and protection against DoS and DDoS attacks. Additionally, it is crucial to monitor for signs of SQL injection attempts, as these attacks can often lead to the exposure of sensitive data.
- Data security policy. The organization needs to adopt a data security policy to protect the privacy of personal information. This policy should include password protection and data encryption to prevent unauthorized access to sensitive information. Additionally, it is essential to implement security measures, such as firewalls and intrusion detection systems, to protect against potential infiltration.
- Secure communications protocol. The organization must implement a secure communications protocol, such as SSL/TLS, to protect the privacy of data transmission. This protocol encrypts data using strong cryptography, ensuring it is protected from unauthorized access.
References
Almasi, S., & Knottenbelt, W. J. (2020). Protecting users from compromised browsers and form Grabbers. Proceedings 2020 Workshop on Measurements, Attacks, and Defenses for the Web. Web.
Chang, V., Golightly, L., Modesti, P., Xu, Q. A., Doan, L. M., Hall, K., Boddu, S., & Kobusińska, A. (2022). A survey on intrusion detection systems for fog and cloud computing. Future Internet, 14(3), 89. Web.
Cherry, D. (2022). Network design. Enterprise-Grade IT Security for Small and Medium Businesses, 23–33. Web.
Emerson, S., Emerson, K., & Fedorczyk, J. (2021). Computer Workstation Ergonomics: Current evidence for evaluation, corrections, and recommendations for remote evaluation. Journal of Hand Therapy, 34(2), 166–178. Web.
Iasiello, E. (2021). What is the role of Cyber Operations in information warfare? Journal of Strategic Security, 14(4), 72–86. Web.
Kitahara, H., Gajananan, K., & Watanabe, Y. (2020). Highly-scalable container integrity monitoring for large-scale Kubernetes Cluster. 2020 IEEE International Conference on Big Data (Big Data). Web.