Write My Paper Button

WhatsApp Widget

Your supervisor has asked that the memo focus on Odenton’s information systems, and specifically, securing the processes for payments of services. Currently, the Odenton Township offices accept cash or credit card

  • The IT department for Anne Arundel County is meticulous about keeping payment terminalsoftware,operatingsystemsandothersoftware(includinganti-virussoftware)updated.
  • Assessmentofprotection fromremoteaccessandbreachestotheAnneArundelnetwork: OdentonTownshipaccessesthedatabasesystemfortheCountywhenupdatingresident’s accounts for services.It is not clear whether a secure remote connection (VPN) is standard policy.
  • AssessmentofphysicalsecurityattheOdentonTownshiphall:theonlycurrentformof physical security are locks on the two outer doors; however, the facility is unlocked Monday-Friday, 8am-5pm (EST), excluding federal holidays.
  • Employeeawarenesstrainingondatasecurityandsecurepracticesforhandlingsensitive data (e.g., credit card information) are not in place.
  • TheoverarchingconclusionoftheriskassessmentwasthatOdentonTownshipisnot fully compliant with thePCI Data Security Standards(v3.2).

Note: The Chief Executive for Anne Arundel County has asked for specific attention be paid to insider threats, citing a recent article about an administrator from San Francisco (see Resources). Anne Arundel County wants to understand insider threats and ways to mitigate so that they protect their resident’s personal data as well as the County’s sensitive information. These are threats to information systems, including malware and insider threats (negligent or inadvertent users, criminal or malicious insiders, and user credential theft).

Expectations and Format

Using the resources listed below, you are to write a 2-page Professional Informational Memo to the Chief Executive for Anne Arundel County that addresses the following:

  • Risk Assessment Summary:Provide an overview of your concerns from the risk assessment report.Include broad ‘goal’ of the memo, as a result of the risk assessment, thebroadrecommendations.SpecificActionStepswillcomelater.Thesummaryshould be no more than one paragraph.
  • Background: Provide a background for your concerns. Briefly highlight why the concerns are critical to the County of Anne Arundel and Odenton Township.Clearly statetheimportanceofdatasecurityandinsiderthreatswhendealingwithpersonalcredit cards.Be sure to establish the magnitude of the problem of insider threats.
  • Concerns, Standards, Best Practices:The body of the memo needs tojustify your concerns and clarify standards, based on the resources listed below, at minimum.The PCI DSS standards are well respected and used globally to protect entities and individual’ssensitivedata.Thebodyofthememoshouldalsohighlightthreecurrent controls that are considered best practice; that is, you should highlight the positive, what is currently in place, based on the risk assessment.
  • Action Steps:Provide a conclusion establishing why it is important for Anne Arundel County to take steps to protect residents and county infrastructure from insider threats based on your concerns.Recommenda minimum of three (3)practical action steps, includingnewsecuritycontrols,bestpracticesand/oruserpoliciesthatwillmitigatethe concerns in this memo.Be sure to include cost considerations so that the County is

getting the biggest bang for the buck. The expectations are not for you to research and quote actual costs, but to generalize potential costs. For instance, under the category of physical security, door locks are typically less expensive than CCTV cameras.

  • BesuretoreviewthePowerPointpresentation(inpdfformat)EffectiveProfessional Memo Writingthat accompanies these instructions.
  • UsetheProfessionalMemotemplatethataccompaniestheseinstructions.
    • Usefoursection subtitles, inbold.
      • RiskAssessmentSummary
      • Background
      • Concerns,Standards,BestPractices
      • ActionSteps
    • Donot changethefont sizeor typeor pagemargins.
    • Donotincludeanygraphics,imagesor‘snips’ofanycontentfromcopyrighted sources.The PCI Standards (PCI DSS) document is copyrighted material.
    • ParagraphtextshouldbesinglespacedwithONE‘hardreturn’(Enter)aftereach paragraphand after each section subtitle.Note:Donotcreate anew ‘paragraph’ after each sentence.A single sentence is not a paragraph.
    • ‘Subject’isthesubject of yourmemo,notthecoursenameornumber.
    • Besuretoremoveanyremaining‘placeholder’textinthetemplatefilebeforesubmitting.
    • ThelengthofthetemplatewhenyoudownloaditisNOTtheintendedlengthof the entire memo.Your completed memo should be between 1.5 pages and 2 pages (total document, including the To:/From:/Re:/Subject header).

*Note: the Professional Memo is to be in a MS Word file and all work is to be in the student’s own words (no direct quotes from external sources or the instructions) *

APAdocumentationrequirements:

  • Asthisisaprofessionalmemo,aslongasyouuseresourcesprovidedwithorlinked from these instructions,APA documentation is NOT required.
  • Citingmaterialorresourcesbeyondwhat isprovidedhereisNOTrequired.
  • However, you should usebasic attributionand mention the source of any data, ideas orpoliciesthatyoumention,whichwillhelpestablishthecredibilityandauthorityof the memo.
    • For example, mentioning that thePayment Card Industry Data Security Standards(PCIDSS)identifyacertaincontrolasbestpracticeholdsmore weight than simply stating the control is a best practice without basicattribution.
    • Mentioning thatWired Magazine reportedthat a City of San Francisco IT technicianeffectivelyhijackedandlocked60%ofthecity’snetworkcapacity, is more effective than saying “I read somewhere that…”

Resources

Examples of Security Breaches Due to Insider Threats

SanFranciscoAdminChargedWithHijackingCity'sNetwork

Microsoftdatabaseleakedbecauseofemployeenegligence

GeneralElectricemployeesstoletradesecretstogainabusinessadvantage Former Cisco employee purposely damaged cloud infrastructure

Twitterusersscammedbecauseofphishedemployees

  1. PCIDSSGoals:


(source:https://www.pcisecuritystandards.org/merchants/process)

References

FBI.(2021).TheInsiderThreat:AnIntroductiontoDetectingandDeterringanInsiderSpy. https://www.fbi.gov/file-repository/insider_threat_brochure.pdf/view

PCIDSS.(2021,Feb.12).PaymentCardIndustrySecurityStandards. https://www.pcisecuritystandards.org/

JingguoWang,Gupta,M.,&Rao,H.R.(2015).Insider threatsinafinancialinstitution:Analysis of attack-proneness of information systems applications.MIS Quarterly,39(1), 91-A7. https://search-ebscohost- com.ezproxy.umgc.edu/login.aspx?direct=true&db=bth&AN=100717560&site=ehost- live&scope=site

ProfessorMesser.(2014).Authorizationandaccesscontrol[Videofile].YouTube. https://www.youtube.com/watch?v=6aXMuJPkuiU

U.S.DHS.(2021).InsiderThreat.https://www.dhs.gov/science-and-technology/cybersecurity- insider-threat

Wizuda.(2017).Dataanonymisationsimplified[Videofile].YouTube. https://www.youtube.com/watch?v=m9UxV4XaXwg

Yuan,S.,&Wu,X.(2021).Deeplearningforinsiderthreatdetection:Review,challengesand opportunities.Computers & Security. https://doi- org.ezproxy.umgc.edu/10.1016/j.cose.2021.102221

Keywords: risk assessment, insider threats, data security

SubmittingYourAssignment

SubmityourdocumentviayourAssignmentFolderasMicrosoftWorddocument,oradocumentthatcan bereadyusingMSWord,withyourlastnameincludedinthefilename.UsetheGradingRubricbelowto be sure you have covered all aspects of the assignment.

GRADINGRUBRIC:



Criteria


Far Above Standards


Above Standards


Meets Standards


Below Standards


Well Below Standards


Possible Points

Summary of Risk Assessment

15 Points


Summary is highly effective, thorough and professional.

12.75 Points


Summary is effective, thorough and professional.

10.5 Points


Summary is somewhat effective, thorough and professional.

9 Points


Summary is lacking.

0-8 Points

Stated requirements for this section are severely lacking or absent.

15

Background and Importance (to the Client) of Data Security and Insider Threats

10 Points


Discussion of ba5ckground, data security and insider threats is highly effective, thorough, and professional.

8.5 Points


Discussion of background, data security and insider threats is effective, thorough, and professional.

7 Points


Discussion of background, data security and insider threats is somewhat effective, thorough, and

professional.

6 Points


Discussion of background, data security and insider threats is lacking.

0-5 Points


Stated requirements for this section are severely lacking or absent.

10

Concerns, Standards, Best Practices: Justify Concerns and Clarify Standards

15 Points


Discussion of concerns and standards is highly effective, thorough, and professional.

12.75 Points


Discussion of concerns and standards is effective, thorough, and professional.

10.5 Points


Discussion of concerns and standards is somewhat effective, thorough, and

professional.

9 Points


Discussion of concerns or standards is lacking.

0-8 Points


Stated requirements for this section are severely lacking or absent.

15

Concerns, Standards, Best Practices: Three current practices identified and justified as best practice

15 Points


Three highly relevant current practices are offered and justified as best practices. Overall presentation is clear, concise, and

professional.

12.75 Points


Section may be lacking in number of recommendations or relevancy or justification or overall presentation.

10.5 Points


Section is lacking in number of recommendations or relevancy or justification or overall presentation.

9 Points


Section is lacking in two or more of the following: number of recommendations or relevancy or justification or overall

presentation.

0-8 Points


Stated requirements for this section are severely lacking or absent.

15

Action Steps: Three recommendati ons minimum identified and justified including some discussion of cost considerations

20 Points


Three highly relevant recommendations are offered and justified, with effective discussion of cost considerations.

Overall presentation is clear, concise, and

professional.

17 Points


Section may be lacking in number of recommendations or relevancy or justification or a discussion of cost considerations or overall presentation.

14 Points


Section is lacking in number of recommendations or relevancy or justification or a discussion of cost considerations or overall presentation.

12 Points


Section is lacking in two or more of the following: number of recommendations or relevancy or justification or a discussion of cost considerations or overall presentation.

0-11 Points


Stated requirements for this section are severely lacking or absent.

20

Basic Attribution (overall)

10 Points


Overall use of basic attribution is highly effective in establishing credibility and authority.

8.5 Points


Overall use of basic attribution is effective in establishing credibility and authority.

7 Points


Overall use of basic attribution is partially effective in establishing credibility and authority.

6 Points


Overall use of basic attribution is partially effective in establishing credibility and authority.

Additional basic attribution may

have been needed.

0-5 Points


Overall use of basic attribution was minimally effective or not used.

10

Overall Format: APA

documentatio n needed only if sources external to the assignment are introduced

15 Points


Submission reflects effective organization and sophisticated writing; follows instructions provided; uses correct structure, grammar, and spelling; presented in a professional format; any references used are appropriately incorporated and

cited using APA style.

12.75 Points


Submission reflects effective organization and clear writing; follows instructions provided; uses correct structure, grammar, and spelling; presented in a professional format; any references used are appropriately incorporated and cited using APA style.

10.5 Points


Submission is adequate, is somewhat organized, follows instructions provided; contains minimal grammar and/or spelling errors; and follows APA style for any references and citations.

9 Points


Submission is not well organized, and/or does not follow instructions provided; and/or contains grammar and/or spelling errors; and/or does not follow APA style for any references and citations. May demonstrate

inadequate level of writing.

0-8 Points


Document is poorly written and does not convey the necessary information.

15






TOTAL

Points Possible

100

100