top of page

UK7742

## Scenario 1: Video Streaming Platform

### Introduction
As the Information Security Manager for a renowned video streaming platform, it is my responsibility to ensure that our platform is secure, scalable, and efficient. Given the flexible working arrangements, the increasing popularity of our platform, and the variety of services we offer, I have devised a strategy to allocate our budget of 25 units effectively. Here are my recommendations for the various intervention areas.

### Flexible Working
#### VPN Settings (Cost: 3)
- **Justification**: To ensure secure remote access for all employees, especially with flexible working arrangements, implementing a mandatory VPN is crucial. A VPN will protect against Man-in-the-Middle (MitM) attacks and prevent access to blacklist websites. This measure is essential to maintain the confidentiality and integrity of company data accessed remotely.

#### Antivirus and Firewall Software (Cost: 2)
- **Justification**: Providing employees with antivirus and firewall software will protect their devices from malware and unauthorized access. This is particularly important for remote work, where devices are outside the company’s direct control. A strong antivirus and firewall will mitigate risks from phishing attacks and malicious software.

#### Data Storage (Cost: 2)
- **Justification**: Storing all company data in a secure cloud facility ensures that data is protected and accessible only through the company network. This measure prevents unauthorized data saving on personal devices, reducing the risk of data breaches.

#### Network Compartmentalization (Cost: 3)
- **Justification**: Dividing the network into subnetworks based on a Role-Based Access Control (RBAC) policy ensures that employees only have access to the data necessary for their roles. This minimizes the risk of insider threats and unauthorized access to sensitive information.

### Platform Popularity
#### Bandwidth Increase (Cost: 4)
- **Justification**: To accommodate the expected increase in audiences, particularly for high-quality video events like e-sports, increasing bandwidth is essential. This ensures a smooth and uninterrupted streaming experience, which is critical for maintaining user satisfaction and attracting larger audiences.

#### Anti DDoS Defenses (Cost: 5)
- **Justification**: Implementing anti DDoS defenses is vital to protect against attacks that could disrupt our streaming services. These defenses will ensure that our platform remains available and functional even during attempted DDoS attacks, safeguarding our reputation and user experience.

#### Quality of Service Systems (Cost: 2)
- **Justification**: Quality of Service (QoS) systems help manage the connections and reduce the load on bandwidth by adapting video quality based on network conditions. This ensures optimal performance and a better viewing experience for users, even during peak times.

### Clients, Content Creators, and Services (CCS)
#### 2FA for Content Creators (Cost: 1)
- **Justification**: Implementing two-factor authentication (2FA) for content creators protects their accounts from hijacking attempts. This is crucial for maintaining the integrity of their channels and the overall reputation of our platform.

#### Secure Payment (Cost: 3)
- **Justification**: Enforcing 2FA for payments and metadata tracking enhances the security of financial transactions on our platform. This measure ensures that payments are traceable and protects against fraudulent activities, thereby building trust with our users.

### Summary of Allocations
- **VPN Settings**: 3
- **Antivirus and Firewall Software**: 2
- **Data Storage**: 2
- **Network Compartmentalization**: 3
- **Bandwidth Increase**: 4
- **Anti DDoS Defenses**: 5
- **Quality of Service Systems**: 2
- **2FA for Content Creators**: 1
- **Secure Payment**: 3

### Conclusion
These measures collectively address the key security and operational challenges faced by our video streaming platform. By prioritizing secure remote access, enhancing our platform’s scalability, and protecting our clients and content creators, we ensure a robust and reliable service. This strategic allocation of our 25-unit budget will help us maintain our competitive edge and safeguard our platform’s integrity.

---

## Scenario 2: Grocery Shop Data Management

### Introduction
As a consultant for a grocery shop with 20 employees, it is crucial to secure their systems for client payments, supplier management, and data protection. With a limited budget of 15 units, here are my recommendations to ensure the shop’s operations are secure and efficient.

### Clients’ Payments
#### Secure Protocol Connection (Cost: 2)
- **Justification**: Upgrading the PoS communication to use more secure encryption protocols is essential. This will protect against potential eavesdropping and unauthorized access during card transactions. Secure communications ensure that customer payment information is protected.

#### Secure Cash Collection (Cost: 3)
- **Justification**: Using a tracked professional transit service for daily cash collection minimizes the risk of theft and ensures secure transfer of funds to the bank. This measure protects the shop’s financial assets and provides peace of mind.

### Suppliers Management
#### Data Access (Cost: 2)
- **Justification**: Implementing an access control policy to limit what employees can see on the company website ensures that sensitive information is only accessible to authorized personnel. This reduces the risk of internal data breaches and protects supplier information.

#### Secure Communications (Cost: 2)
- **Justification**: Setting up certified emails for finance and administration ensures secure communication channels for sensitive transactions and information exchanges. This prevents unauthorized access and maintains the integrity of business communications.

### Data Protection
#### Dedicated Firewall (Cost: 4)
- **Justification**: Protecting the servers containing data with a customized firewall that drops unexpected connections is critical. This measure ensures that the shop’s data is secure from external attacks and unauthorized access.

#### Secure Communications (Cost: 2)
- **Justification**: Setting up a certified email for the owners and a cloud storage area facilitates secure communication with clients, lawyers, and stakeholders. This ensures that sensitive communications and data are protected.

### Summary of Allocations
- **Secure Protocol Connection**: 2
- **Secure Cash Collection**: 3
- **Data Access**: 2
- **Secure Communications for Admin**: 2
- **Dedicated Firewall**: 4
- **Secure Communications for Owners**: 2

### Conclusion
These measures provide a balanced approach to securing the grocery shop’s operations. By enhancing the security of client payments, managing supplier information access, and protecting data, we ensure the shop can operate efficiently and securely. The strategic allocation of our 15-unit budget addresses the critical areas of concern and supports the shop’s continued success.

bottom of page