CO7602Assignment1 2024-25
CO7602Assignment1 2024-25
Instructions
Task – Organisational Security Compliance Assessment
The case study, Chester Business Ltd (CBL), for this task is on the next page. Study it carefully
before attempting the task.
Relevant definitions:
“The CBL Security Control Catalog (CSC2) is a mapping of ISO 27002, CIS Controls, and
the NIST Cybersecurity Framework (CSF). The catalog is a set of best practices defined by
CBL to help it strengthen its cybersecurity posture. The catalogue is organised into key
domains for better structuring.”
Chester Business Ltd processes sensitive data for its day-to-day business. There is a decision
to pursue a detailed security project to help strengthen the organisation’s cybersecurity
posture and safeguard it against cyber threats. The new chief information officer (CIO) has
decided that the starting point is to conduct a project security baseline assessment based on
the company’s security control catalogue (CSC2). This is to ascertain the level of adherence
to their own security objectives.
You have been approached as a consultant and are required to assess CBL’s organisational
structure and network architecture for compliance with the CSC2 Controls. CBL’s structure,
business processes, office plan, network dossier/documentation, and CSC2 are provided
below. The assessment criteria for this project is the CSC2 Controls – so, your job is to assess
the information (the case study, office plan, and network dossier) that have been provided by
the customer against all the controls (also known as ‘best practices’) and decide, with
justification, whether each control (best practice) has fully, partially, or not been complied with.
If you decide that a control is not applicable for CBL, you must provide detailed justification. It
means that the assessment outcome/status for each of the controls must be one of the
following:
Note:
▪ It is important that you attend classes, especially the assignment support sessions,
as we will be discussing the assignment in great details.
▪ Knowledge of the referenced security frameworks (ISO27002, CIS Controls, and NIST
CSF) will be helpful.
▪ Do NOT make any assumptions for the assessment. Use only the information you have.
Assessment Criteria
Marks will be affected if the above instructions are not adhered to. The following criteria will
apply:
• Knowledge [30%]: Demonstration of knowledge and understanding of subject matter,
tailoring of discussion to case study, and coverage
• Cognitive skills [30%]: Clarity of discussion, coherency, perception, articulation of
views, thoughtful interpretation etc.
• Practical/professional skills [25%]: Technical understanding and use of materials,
breadth and depth of material, academic writing, formatting and strength of argument.
• Communication [10%]: Presentation, vocabulary and style, spelling and punctuation
• Referencing [5%]: Using literature to support argument. Acknowledging and
accurately presenting sources.
The Chester Business Case Study
Introduction
Chester Business Ltd is a Medium IT company that develops software applications for clients.
Their major clients include schools, NHS trusts, and some government departments. They
also collaborate with other IT companies, both locally and internationally, on major IT projects.
The diagram below shows their office plan based in Chester. The company also has other
interests, including bidding for research funds and carrying out research for IT innovations.
They do not have an offsite backup centre. All their assets are located in their facility in
Chester. They also let out their conference room to external organisations for conferences
and meetings. Chester Business Ltd employs 100 staff and all are trained (and retrained) to
recognise social engineering attacks. They are also trained in data classification and the
dangers of transmitting data over insecure networks.
Management Structure
Chester Business is managed by a Board, comprising the Chief Executive and Heads of IT,
Business, Facilities and Research departments. Each department has a number of
employees covering different roles.
IT
The Head of IT manages a team of four IT support staff and 10 software developers. The
support staff provide technical support to all staff of the company. Each staff of the company
is allocated a desktop computer with full Internet and email access. The company also
operates an undocumented BYOD (bring your own device) policy that allows employees to
bring their own personal mobile devices into work and use those devices to connect to the
company network and/or the Internet. The support analysts are free to use any external
storage of choice to share and move data. The company runs a Windows Server 2010 R2, a
Linux server (Apache 2.3.49), and a variety of Windows 7 (for legacy applications), Windows
10, and Linux workstations. The software developers are skilled in Microsoft .Net technologies
as well as C++ and Visual Basic and can reuse code snippets lifted from open sources or
programming forums. They can also use any version control software of choice. IT also
maintains a website that runs WordPress 5.9.3. The department maintains an inventory of all
assets. However, the inventory only contains high-level information about the assets. On the
other hand, there is no central inventory of software installed on the organisation's assets.
Business
The Head of Business department oversees the day-to-day running of the company. She is
in charge of contract negotiations and all project managers report to her. She travels a lot on
business trips and as every other employee, she can access company resources remotely.
The company has a VPN service for secure remote access to the company. However, on odd
occasions, staff used opensource remote desktop applications to connect remotely.
Facilities
This department manages and maintains the company’s facilities including conference room
bookings. They are responsible for managing physical security as well as overseeing security
guards/staff who are sometimes outsourced. This department enforces very strict security
measures. For example, physical security can only be outsourced to government-approved
and professionally certified security companies, all security staff/guards are DBS checked, the
conference room can only be rented by carefully vetted organisations (however, no further
checks are carried out on individuals attending meetings), everyone on the company’s
premises must wear a visible relevant card, and restricted/sensitive areas are clearly marked
using appropriate signs.
Research
This department oversees the company’s research effort. They work closely with other
researchers both locally and internationally. They are involved in several research
collaborations across different research groups and consortiums. They have no dedicated (or
restrictions on) communication medium within themselves and with their research
collaborators.
Network Dossier
Network Overview:
• Network Name: CBL Network
• Network Size: Small Business Network
• Network Purpose: Support daily business operations, file sharing, web hosting,
and data storage.
Infrastructure Components:
1. Windows Server 2012 R2:
• Hostname: WinServer2012R2
• Role: Domain Controller, File Server
• Active Directory Domain: cbl.local
• Services: DHCP, DNS, Active Directory, File Sharing
• Security: Configured with up-to-date antivirus and regular security patch
updates. Access control lists are configured based on user’s need to know.
MFA is required for external/remote access to the server.
2. Linux Apache 2.3.49 Server:
• Hostname: LinuxWebServer
• OS: Linux (Distribution: CentOS)
• Role: Web Server
2. Switch:
• Model: Cisco SG200-24
• Ports: 24 Gigabit Ethernet Ports
• Function: Provides network connectivity for workstations and servers.
Protection (P)
14. P1: Implement Strong Access Controls
Enforce strong access control mechanisms that restrict access to sensitive data and
systems based on the principle of least privilege.
15. P2: Use Multi-factor Authentication (MFA)
Implement multi-factor authentication to verify users' identities before granting access to
critical systems and data.
16. P3: Secure Configuration for Hardware and Software
Establish secure configuration baselines for all systems and applications to reduce
vulnerabilities and maintain security.
17. P4: Patch Management Process
Develop a patch management process to ensure that operating systems, software, and
firmware are updated regularly to mitigate known vulnerabilities.
18. P5: Network Segmentation
Segment networks based on sensitivity, ensuring critical assets are isolated to limit
unauthorized access.
19. P6: Enable Data Encryption at Rest and in Transit
Encrypt sensitive data both at rest and in transit to prevent unauthorized access during
transmission or storage.
20. P7: Implement Secure Software Development Lifecycle (SDLC)
Integrate security throughout the software development lifecycle, ensuring secure coding
practices and regular security testing.
21. P8: Protect Wireless Access Points
Secure wireless networks by using encryption, strong authentication methods, and regular
monitoring to prevent unauthorized access.
22. P9: Use Antivirus and Anti-Malware Solutions
Deploy antivirus and anti-malware tools on all endpoints and regularly update them to
protect against malware infections.
23. P10: Establish a Data Loss Prevention (DLP) Program
Implement DLP tools to monitor and protect sensitive data from unauthorized sharing or
leakage, especially via email and cloud services.
24. P11: Monitor Physical Access Controls
Ensure that physical security measures are in place, such as surveillance cameras and
access controls, to monitor and control entry into sensitive areas.
25. P12: Implement Email and Web Filtering
Use email and web filtering solutions to block phishing attempts, malware, and unwanted
content from entering the network.
26. P13: Control Use of Administrative Privileges
Limit and monitor the use of administrative privileges to reduce the risk of insider threats or
misuse by malicious actors.
27. P14: Implement a Secure Backup Strategy
Ensure that regular backups are performed and that backups are encrypted, securely
stored, and tested for recoverability.
28. P15: Protect Removable Media
Control the use of removable media (e.g., USB drives) through encryption and access
control measures, reducing the risk of data loss or malware.
29. P16: Use Application Whitelisting
Implement application whitelisting to ensure that only authorized software is allowed to run
on critical systems.
30. P17: Deploy Honeypots for Attack Detection
Set up honeypots to lure attackers and detect their activities before they reach sensitive
systems.
31. P18: Establish Change Management Procedures
Implement change management processes to ensure that changes to systems and
applications are reviewed, tested, and approved before being implemented.
Detection (D)
Response (R)
Recovery (RV)
Additional Information
• LO1: Demonstrate knowledge of the role of an Information Security Management System in achieving
information security objectives.
• LO2: Master the key aspects of information risk management and business continuity.
• LO5: Demonstrate a critical awareness of key government cybersecurity initiatives.
Assessment Support
Assessment support sessions will be organised.
Submission Window, Exceptional Circumstances, and Assessment Regulations
You are expected to submit work by the submission date specified at the start of the assignment specification.
Some assignments may support a 7-day window in which students can submit work late without penalty and this
will be specified below the submission date at the start of this brief. Any work submitted outside of the submission
date (or submission window where allowed) will be given a mark of zero.
You can find details about what you need to do if you are unable to submit the assessment on time on the Registry
Services Exceptional Circumstances Portal page. Any deferral request must be submitted online within 7-days of
the final submission date (or submission window where allowed). In all cases, evidence will be required to support
the deferral.
You can find out more about University regulations related to assessment on the Registry Services Assessment
Regulations page.
Academic Conduct
The material you submit must be your own work. You must not collude with your peers on your work unless the brief
explicitly allows this (such as in the case of group work). The penalties for breaching the academic conduct policy are
severe. The minimum penalty is usually zero for that piece of work. Further information is available below:
• Academic Conduct
• Excess Word Count Penalties
• Cite Them Right Online guidance
Generative AI
The use of generative AI tools where not permitted will be treated as a breach of the academic conduct policy.
This assignment does not permit the use of any generative AI tools, including but not limited to ChatGPT, Gemini,
Copilot, Midjourney, and others.
Submission Information
This 2000 words report (with 10% flexibility - 5 marks penalty per 1000 words excess, e.g. if a 1000-word
assignment, 5 marks deducted for 1101-2100 words) should be submitted online via Turn-it-in on CO7602
Moodle page. The work should be submitted as a Word or PDF (.pdf) and should be properly referenced
using the APA referencing system.
Permissible word count excludes the student’s name, title of module and assignment, references to sources,
bibliography, graphs, tables, maps, diagrams, captions and appendices.
The submitted file must be named with your assessment (J number), e.g. J123456.pdf or J123456.docx.
Files submitted in an incorrect format will usually be marked as zero.
Assessment Criteria Postgraduate
Assignment Task Fairly basic knowledge, Content generally relevant Breadth and depth of Extensive subject
limited consistency of and accurate, most central coverage, accurate and knowledge, thorough
• LO1: Demonstrate depth and accuracy of issues identified; basic relevant in detail. Well- coverage of topic, focused
knowledge of the detail; not all aspects knowledge sound but may tailored to case study. use of detail and
role of an addressed, some be patchy. examples. Excellent
Information Security omissions. understanding of case
Management Perceptive, thoughtful
study.
System in achieving Sound explanation; this interpretation.
information security Some interpretation or may be partly descriptive
insight; may be largely and factual; ideas tend to
objectives. Consistent development of Excellent perception,
descriptive, or superficial; be stated rather than critical insight and
critical analysis and
• LO2: Master the key over-reliance on narrative. developed. articulation of views; interpretation.
aspects of coherently presented.
information risk Some evidence of Some attempt at critical Very good depth and
management and rationale; minimal attempt analysis using theory; may breadth of critical analysis;
business continuity. to examine strengths and Accurate technical
be limited and lack sustained, thorough
• LO5: Demonstrate a weaknesses of an understanding and
consistency or conviction. questioning informed by
critical awareness argument. judgement; good level of
theory.
of key government competence in use of
cybersecurity Mostly accurate technical materials and appropriate
initiatives. Adequate though only understanding and application of working Thorough technical
partially accurate technical judgement; satisfactory processes and understanding and
understanding and level of competence in use techniques. judgement; excellent level
judgement; adequate level of materials and of competence in use of
of competence in use of appropriate application of materials and appropriate
High standard of accuracy
materials and application working processes and application of working
in spelling, punctuation,
of working processes and techniques. processes and
punctuation, presentation
techniques. techniques.
and syntax.
Inaccuracies in spelling, Overall competence in Sources acknowledged Near perfect spelling,
punctuation, presentation spelling, punctuation, and accurately presented punctuation, punctuation,
and syntax do not usually punctuation, presentation presentation and syntax.
interfere with meaning. and syntax, although there
may be some errors. All sources acknowledged
Sources acknowledged; and accurately presented
references not always Sources acknowledged
correctly cited/presented and referencing mostly
accurate