UNIT 1

Securing an organizations information systems and assets, from threats is a crucial aspect. Sure here is the response; "Regarding" Security and risk management go hand in hand by identifying and dealing with threats, in a proactive manner. There are dangers that pose a threat. could impede the goals of the company. In this field important aspects involve identifying dangers and vulnerabilities while assessing risks. evaluating and putting into action plans to reduce risks is tasks Spotting dangers. . Overseeing them with security protocols and thoughtful strategies. The process of managing risks involves a method that consists of recognizing and evaluating. Masterfully managing and overseeing threats to address them with precision is key to success, in this endeavor. Companies aim to safeguard their activities while working towards their goals. Understanding these ideas allows people to evaluate and reduce risks effectively. Strategies, for selecting the security measures and handling risks. . Customs various situations.

UNIT 2

In this part we explore the Risk Management Process (known as RMP) and its various assessment methods. Qualitative and quantitative methods both influence it greatly with the Risk Management Plan serving as a framework, for assessment and management. . Managing risks that may affect an organizations objectives. Understanding the differences, between qualitative and quantitative is crucial. Each evaluation provides perspectives and impacts the choices that are made. When it comes to assessments they focus primarily around opinions and evaluations drawn from personal experiences. Quantitative evaluations rely heavily o data and statistical analysis, with both approaches playing roles in the assessment process. It is crucial to comprehend the risks involved in choosing between them as the decision heavily relies on this aspect. based on the situation and the information, at hand. Furthermore this segment underscores the significance of including users, in the RMP process fostering participation and collaboration. Through this procedure users can enhance risk assessment. Improve implementation. Risk reduction strategies are enhanced when the RMP involves those affected by the risks. Thorough pragmatic and in line, with the needs of the organization. Essentially this part helps you distinguish between assessment methods. Understanding the importance of user engagement. Realizing the implications of minimizing risks. activities carried out by a company.

UNIT 3

Lets delve into the ideas of threats and vulnerabilities, in this section. Lets establish some differences to build a foundation, for threat analysis techniques that we will delve into further. Thinking about risks and vulnerabilities involves considering methods like STRIDE and DREAD as well, as using attack trees to outline different attack scenarios. . Address possible security threats by learning effective risk management strategies. Learn how to apply these methods and explore various resources and manuals as well. Provide advice on how to actually put them into practice and this part will also cover the steps, for implementation. Choose the approach, for security situations. Determine when it could be advantageous to merge them. Once you have the skills and knowledge, in hand you will have the ability to suggest customized approaches to address potential risks. . Strengthening security protocols, in various environments.

UNIT 4

This part delves into the tools and materials that assist in analyzing threats. Lets begin by examining the tools utilized for analyzing threats, in depth. It is important to comprehend the choices that can be accessed by the public. Exploring security threats and devising strategies to address them. Lets explore tools to understand how they are used in real life situations and what restrictions they may have such as tools similar, to We will review open source software, for threat analysis. Databases containing threat intelligence. Assess their effectiveness, in scenarios. In the exercises we will work on developing threat models using scenarios provided to us. Engaging in an approach enables you to put your knowledge into action and observe the various ways in which different tools can be utilized. tackled real life security concerns. By the conclusion of this segment you should have the capability to; Make sure you pinpoint tools and resources and utilize them for analyzing potential threats. Select the tools based on the specific threat analysis situations, at hand. drawn from their characteristics and skills. Critically analyze the effectiveness of tools considering their advantages and limitations. Effectively dealing with security threats is crucial. This part is here to help you gain the understanding and abilities required to handle dangers. Prepping you to tackle security challenges through analysis and management, in scenarios.

UNIT 5

In the world of technology and business operations online security and managing potential risks play a crucial role for companies in every sector out there.Security protocols and guidelines serve as tools to assist companies in safeguarding their resources maintaining regulatory compliance and reducing potential threats.These protocols are often customized to suit the needs of different industries.For example, in the healthcare industry the regulations outlined by the Health Insurance Portability and Accountability Act(HIPAA)b govern the protection of information.Whereas in the finance sector the Payment Card Industry Data Security Standard(PCI DSS)d is enforced to ensure the security of payment details. The way security standards influence how companies carry out security and risk evaluations is crucially substantial. Operating like a guideline to pinpoint risks accurately and take action to lessen them ensures that security procedures are thorough and in line with regulatory standards. Known benchmarks such as ISO 27001 and NIST SP 800 53, alongside PCI DSS and the General Data Protection Regulation (GDPR) present adaptable recommendations that cater to different sectors requirements. To determine the security standard, for your organizations needs accurately entails grasping the unique risks it faces and complying with relevant regulations and industry norms effectively. By incorporating these standards into threat models and aligning security strategies accordingly with industry demands can strengthen your organizations defense against threats. Uphold regulatory compliance more effectively.

UNIT 6

This unit explores how the General Data Protection Regulation (GDPR) and other security standards play a role, in shaping risk management strategies for protecting data privacy and security measures. Through analyzing real life case studies related to GDPR compliance issues and breaches of data or consent protocols in scenarios students gain insight into the application of these regulations. Additionally discussed are standards such as PCI DSS that focus on safeguard financial data security and guide students on their effective implementation, within diverse environments. Students are taught how to provide guidance to companies regarding adherence to regulations by suggesting measures such as securing data through encryption techniques and conducting assessments along with staff training to minimize hazards. They learn how to incorporate these guidelines into security and risk management schemes to guarantee adherence to laws and robust safeguarding of data. This module offers insights for implementing GDPR and other guidelines to develop security plans safeguarding company data and fulfilling legal obligations.

UNIT 7

In this module students will be learning about quantitative risk modeling (QRM) which's a technique that applies statistical methods to evaluate and measure risks effectively. The module will cover strategies, like Monte Carlo simulations that use probabilities to estimate events through random sampling and methods based on Bayes theorem that adjust risk forecasts with new information. Additionally the module will delve into decision analysis techniques such, as TOPSIS,AHP and ANPin order to support decision making by considering a variety of factors. By the conclusion of this module or section of study students will acquire the skills to utilize these QRM methods in developing risk models and assessing their advantages and limitations. They develop the capacity to select the approach depending on the circumstances enhancing their ability to make decisions and manage risks effectively. This course gives students a grasp of QRM tools and strategies to tackle problems effectively.

UNIT 8

Unit 8 delves into the applications of Quantitative Risk Modeling (known as QRM) such, as utilizing Monte Carlo simulations and Bayes Theorem to address real life challenges effectively in project management and safety assessment. In industries today Monte Carlo simulations and Bayes Theorem are commonly employed to assess risks by using sampling and updating risk estimates with new data over time. These methods have their strengths and weaknesses that practitioners need to consider. By the completion of this unit of study students will acquire the ability to choose modeling methods, construct QR models and assess the application of QRM, in real world situations with an eye These competencies are essential for making well informed decisions, in ever changing and unpredictable settings

UNIT 9

Week 9 of the course emphasizes the significance of Business Continuity (BC) and Disaster Recovery (DR), in managing and reducing risks. Business Continuity ensures that key business operations can persist during disturbances while Disaster Recovery is dedicated to recovering IT systems and data after events, like cyberattacks, natural disasters or system breakdowns. Important elements of business continuity and disaster recovery (BCDR) planning consist of. The Business Impact Assessment (BIA) is a process that pinpoints business operations and evaluates the consequences of any disruptions to them. Definition of Recovery Time Objective (RTO), as the time to recover systems following a breakdown. The Recovery Point Objective (abbreviated as RPO) indicates the level of loss of information. It is determined by the interval between backup operations. The course also covers developments in Information Risk Management like cloud-based backup solutions and enhancements in cybersecurity through automation technology. This shows how dealing with risks is becoming more complex, in today’s world and businesses need to plan ahead for recovery and business continuity measures. By the conclusion of the module or course section or area of study learners will possess the ability to craft business continuity and disaster recovery blueprints (BCDR plans) choose methods, for bouncing back from setbacks (recovery strategies) and assess forthcoming patterns in risk oversight. These proficiencies play a role in safeguarding businesses’ capability to bounce back and manage adversities amidst changing and emergent hazards.

UNIT 10 TASK

DR Solution 1 with a Recovery Point Objective (RPO) of 1 hour and a Recovery Time Objective (RTO) of 8 hours while highlighting the need, for High Availability (HA). Definitions.

•RPO (Recovery Point Objective); The longest duration within which data loss, due to an event is deemed acceptable, is one hour, in this scenario.

•RTO (Recovery Time Objective); The acceptable timeframe, for systems to be up and run again following a disaster is, within 8 hours.

•High Availability (HA); Aims to keep the system running to maximize uptime and reduce downtime occurrences effectively through failover solutions that cause minimal disruptions.

Elements of Design.

Cloud storage, for purposes, with data duplication.

The instant or almost instant copying of information, from systems to backup systems (in the cloud or far away locations).

Make sure that the data stays current, and that any potential incident doesn't result in, then an hour’s worth of data loss.

• Balancing the load.

It spreads network traffic among servers or systems to maintain the applications responsiveness in case one server fails.

In systems (HA systems) load balancers play a crucial role, in avoiding service disruptions by automatically rerouting traffic to functioning systems.

• Backup Plan.

Automated switching to the system, in case of a problem being identified in the system.

During an emergency the system seamlessly transitions to an infrastructure such as the cloud to ensure operations with minimal downtime.

If there is a breakdown, in the systems operation occurs; it will switch over from the location to a secondary backup site within an 8 hour RTO automatically.

• We ensure that data loss is limited to an hour by replicating and storing snapshots in the cloud.

Effective Strategies.

Make sure to set up storage in locations to safeguard against disasters, in specific regions.

Make sure to implement automated disaster recovery testing to verify that a failure occurs as intended.

DR Solution 2 with a Recovery Point Objective (RPO) of 24 hours and a Recovery Time Objective (RTO) of 72 hours, without the need, for High Availability (HA).

Here are some explanations.

In the event of a disaster, it is possible to lose, up to 24 hours’ worth of data.

Reaching a recovery within 72 hours is essential; this indicates that immediate system restoration is not necessary.

Continuous up time is not essential as occasional downtime is acceptable long as the system's back up and running according to the Recovery Time Objective (RTO).

Elements of Design.

•Backup data to the cloud daily.

Data is stored in the cloud every day using services such as Amazon Storage, Microsoft Azure Blob Storage or Google Cloud Storage.

In the event of a disaster scenario arises at any moment, in the future; you can rest assured that the backup available will not be than 24 hours old, ensuring that important data is still preserved up, to date.

Backup Options Comparison.

No need for backup systems necessary.

Cold Backup refers to the process of keeping data and applications in a state until they are manually recovered following an incident.

A warm backup is a type of backup that requires some intervention and additional configuration to fully restore services.

•Procedure for recovery

Recovery can occur manually without the need for HA by performing tasks such, as system boot up and data restoration.

How It Operates.

Data is kept in cloud storage away, from the location and in case of any issue it is recovered manually using the recent backup from that day.

Noncritical business applications may not require attention allowing for a recovery period of, up to 72 hours.

Key Recommendations.

For conserving speeding up recovery options for both differential backups.

Make sure to conduct tests to verify that the backups function properly and that recovery protocols are established as a measure.

DR solution 2 with a Recovery Point Objective of 5 minutes and a Recovery Time Objective of 1 hour. High Availability is necessary for this solution.

Definitions.

• With a Recovery Point Objective (RPO) of 5 minutes there is a limit on the amount of data that can be lost requiring continuous data replication to ensure minimal loss.

• If there is an issue it needs to be fixed and up and running again within an hour.

Ensuring accessibility is crucial, for High Availability (HA) where the system must remain operational without prolonged downtime.

Components of Design.

• Instant Data Duplication.

Continuous replication of data to a location guarantees that the loss of data is minimally capped at 5 minutes.

To maintain data integrity, between backup systems synchronous replication is a utilized method. Backup mechanisms.

A complete duplicate setup (comprising servers, networks and storage) spread across areas.

Involve active passive groups where both sites can manage traffic (active active) or the secondary site is ready, as a backup (active passive).

• Automated system backup, in case of failure.

An automated system identifies any issues. Promptly switches the service to the backup infrastructure ensuring minimal to no interruption.

Failover occurs within a timeframe of seconds, to minute. Ensure that all services are fully operational before the 1-hour Recovery Time Objective (RTO) expires.

• Disaster Recovery, as a Service often abbreviated as DRaaS;

Cloud services provide managed services such as real time replication and failover options (, for instance AWS Elastic Disaster Recovery and Azure Site Recovery).

In case the main system encounters issues or malfunctions, the cloud is ready to assume control without delay.

How the process functions.

In case of a crisis situation arises, live duplication guarantees that 5 minutes of data is forfeited, and the failover process occurs spontaneously in just a matter of seconds to reduce any downtime issues effectively.

• The entire system is restored within a time frame of than an hour, which makes it ideal, for applications, to missions.

Guidelines for Success.

Use data centers located in parts of the world to reduce the chances of outages happening in one region.

• Conduct routine failover exercises to guarantee the automated systems function smoothly.

UNIT 11

In the changing world of technology and cybersecurity efforts, like Security and Risk Management are constantly adjusting to face obstacles brought on by trends, like artificial intelligence (AI) DevSecOps practices, Enterprise Risk Management (ERM) and automation. These trends come with their sets of benefits and hurdles that shape the direction of Security and Risk Management. AI is changing security risk management by automating the identification of threats and responses, to them to enhance efficiency and precision levels in the process.However it is important to address challenges such as biases in AI and false alarms.To sum up the influence of AI on security risk management will primarily be centered around strengthening confidence and resilience, in security operations. DevSecOps incorporates security into the development process by promoting teamwork, between developers and security specialists in order to enhance the delivery of software efficiently; however it necessitates changes and resources for training purposes. As an increasing number of companies embrace DevSecOps practices; it is anticipated to evolve into a methodology, in the realm of cybersecurity. ERM adopts a strategy, for handling risks by integrating security measures with business goals in mind.Even though it may be challenging to put into practice EPM enhances decision making processes by taking into account risks such, as cybersecurity and financial vulnerabilities. Utilizing automation, in SRMs enhances effectiveness by managing tasks and facilitating incident resolution; nevertheless depending too heavily on automation could pose risks necessitating a careful equilibrium, between human supervision and automated operations. In the coming years and beyond, in the realm of supply chain risk management (SRMs) the integration of intelligence (AI) and DevSecOps is anticipated to significantly shape practices moving forward as continuous research endeavors aim to tune these methodologies to bolster security measures and mitigate risks effectively.

Works and Notes

My works and notes during the module:

Link to Essex OneDrive