Instructions:- Utilizing the background information, draw a concept map or annotated attack tree which represents the context of John Kleen Communication & Media Ltd’s work environment and also demonstrates:
the links the data John uses and keeps, and the aims of security (CIA) –i.e. what
information needs protecting, why and what aspect of CIA does this related to?;
the associated attacks which could breach each of these aims in this scenario;
the likelihood (risk) that any attack in this scenario poses;
the impact each attack may have;
the resultant countermeasures which could be applied in this scenario;
the relative cost of each countermeasure; and
the mitigation effect of the countermeasure.
John Smith is an employee of Kleen Communication and Media Ltd, situated in Perth, Australia. He uses Laptop, Smartphone, and Surface Pro to work for his company. He connects his Laptop with Company network and also uses the café for 1 hour daily to work for the company. His role with the company to facilitate the production and marketing of design and production of media and social media items.
With this context, following aspects are not related with CIA,
• Use of company network, laptop, smartphone and surface pro including windows ten operating system, Ms. Office suite including Ms. Excel and MS Access.
• All the resources that John Smith uses from the company side and personal for the Kleen Communication and Media Ltd.
The attacks that disclose the confidentiality of sensitive and vital information related to Kleen Communication and Media Ltd are as follows.
• Replay attack: the attacker intercepts the information flowing into the public network such as the Internet and resend to the recipient by changing.
• Impersonation: John Smith secret credentials used for Login can be leaked through key logger and other malicious programs.
• Unauthorized Access: The network in which John Smith connects may be used remotely to access the data by the same or different network.
• Virus Attack: Data and information stored in Laptop may be deleted or corrupted.
The impact of each attack is very high, and confidentiality of information will be challenged (Vacca, 2012). As such, it will cause the damage of trust and revenue to the Kleen Communication and Media Ltd.
The countermeasures those are likelihood to be employed to protect from the mentioned attacks are as follows.
• Implementation of Windows 10 Firewall or any third party firewall: this prevents the external to access the information from the laptop.
• Implementation of IPSec protocol in TCP/IP network configuration of the laptop to encrypt all the information packet going to the communication network.
• Installation of antivirus and anti-malware software into the laptop to protect from the internet based malicious program.
• Activation of Windows and network-based authentication mechanism to open windows and connect to the network.
The cost of the implementation of countermeasures is mentioned as follows.
• Windows Firewall – Freely available with a Windows license, Third Party Firewall at the price of $ 100.
• IPSec is configured at TCP/IP Protocol level for Virtual Private Network, so it’s free of cost.
• Antivirus and Antimalware Software Entity for Annual subscription – $ 40.
• Windows and network authentication are also free of cost.
mitigation effects of countermeasure produce little bit processing delay as
these countermeasures have an additional layer for all application to be
filtered out to proceed further. It means that countermeasure delays a little
bit as John Smith’s Computer CPU is Intel core-i5 running on Windows 10. Thus
the effect of the delay is minute for functional system associated with John
Smith with Kleen Communication and Media Ltd.
Peltier, T. R. (2016). Information Security Policies, Procedures, and Standards: Guidelines for Effective Information Security Management. CRC Press.
Vacca, J. R. (2012). Computer and information security handboo. Newnes.