Skip to content

Security Planning

🔰 1. What is Security Planning?

Security Planning is the process of identifying an organization’s information assets and then developing a detailed strategy to protect them against cyber threats such as hacking, malware, data breaches, and insider attacks.

🔎 Think of it like this:

Just as you lock your house and install CCTV to prevent theft, organizations use security planning to protect their digital assets — like databases, servers, websites, emails, and internal systems.


🎯 2. Goals of Security Planning

  • Ensure confidentiality – Data should be seen only by authorized people.
  • Maintain integrity – Data should not be altered by unauthorized users.
  • Guarantee availability – Systems and data must be accessible when needed.
  • Comply with legal and industry regulations.

🧱 3. Components of Security Planning (Elaborated)

Let’s break down each component in detail:

🔹 a. Asset Identification

You must first know what needs to be protected.

Examples:

  • College website and online exam portal
  • Student database
  • Admin login credentials
  • Email system
  • Laptops, desktops, and networking devices

🔹 b. Threat and Vulnerability Assessment

  • Threats: Anything that can damage or steal data (e.g., hackers, viruses, natural disasters).
  • Vulnerabilities: Weaknesses in the system (e.g., outdated software, weak passwords).

Examples:

  • Using default admin passwords (vulnerability)
  • Getting attacked by ransomware (threat)

🔹 c. Risk Assessment

Evaluating the likelihood and impact of threats exploiting vulnerabilities.

Example Risk Analysis Table:

ThreatVulnerabilityImpactLikelihoodRisk Level
Data theftWeak passwordsHighHighHigh
Malware infectionNo antivirusMediumHighHigh
Website defacementUnpatched CMSHighMediumMedium

🔹 d. Security Policies and Procedures

Define rules, roles, and responsibilities for all users.

Examples:

  • Every student must use strong passwords.
  • Admins must change default credentials.
  • Personal USB drives are not allowed on lab PCs.
  • Regular system updates are mandatory.

These policies are written and communicated to all stakeholders.


🔹 e. Access Control Mechanisms

Control who can access what.

Types:

  • Role-Based Access Control (RBAC): Users get access based on their role.
    • E.g., a student can see results, but only a faculty member can edit them.
  • Authentication: Verify who the user is (passwords, OTPs).
  • Authorization: What the user is allowed to do (read-only or read/write).

🔹 f. Security Awareness and Training

Teach users how to stay safe while using the system.

Example Training Topics:

  • How to create strong passwords
  • How to recognize phishing emails
  • Safe browsing habits
  • Using antivirus and keeping software updated

🔹 g. Incident Response Planning

Plan how to react when a security breach happens.

Example Steps:

  1. Detect the incident (e.g., virus alert)
  2. Isolate the affected system (disconnect from network)
  3. Inform IT admin or security team
  4. Investigate and find the source
  5. Recover from backups
  6. Update policies to prevent future attacks

🔹 h. Security Auditing and Monitoring

Regularly check systems and users to detect issues early.

Tools:

  • Log analysis tools (e.g., Splunk)
  • Vulnerability scanners (e.g., Nessus)
  • Audit software for Windows or Linux systems

💡 Real-Life Example: College Computer Lab Security Plan

Let’s apply all the above to a college computer lab:

ComponentPlan
Asset IdentificationLab PCs, admin portal, student data
ThreatsUSB viruses, unauthorized access, cheating
RisksStudents accessing admin system and changing marks
PoliciesNo USBs allowed, system auto-locks after 5 mins
Access ControlBiometric or password-based login
AwarenessPosters on security best practices
Incident ResponseBackup used if virus hits; inform lab in-charge
AuditsWeekly antivirus updates and system scans

🧠 Benefits of Security Planning

  • Prevents loss of sensitive data
  • Builds trust among users
  • Avoids legal issues
  • Ensures business/academic continuity
  • Saves money by preventing expensive attacks

✅ Summary for Exams

TopicKey Points
DefinitionSecurity Planning is designing a system to protect information and IT assets
ImportancePrevents threats, protects data, ensures compliance
Key StepsIdentify assets, assess threats, manage risks, control access, educate users, respond to incidents
Real-Life UseExample of securing college lab systems with policies, monitoring, and training