Vulnerabilities and Threats
As it has been mentioned earlier, Ford is an automobile company which will be shifting their car mechanism into automatic, that it, without driver. For that, it is necessary to prepare a security strategy which would be effective for the data storage and perfect functioning of the intended shift. It has been found that there are some vulnerabilities within the data storage in data in transit. Some of the vulnerabilities which has been identified in the data storing in data in transit are malicious probes and network mapping (Bakhshi, Balador & Mustafa, 2018). These vulnerabilities could be used for the collection of data unethically, which could lead to the loss of integrity, confidentiality and available. Along with that, there are certain threats as well, there could be a possibility of execution of cyber-attacks such as, SQL injections, DoS attack, and could also lead to the database abuse privileges. Within the database of the company, there could be entry of malicious viruses and ransomware which could cause deep trouble to the organization, this might lead to data loss.�
�
Cryptography Tools and Strategies
In order to tackle the data threats and vulnerabilities which are present in the organization�s database stored. The best way to protect the data is by encrypting it, it would not only protect the data from being stolen but also protect the user identity and passwords. There should be other supports such as data backup and use of anti-malware systems. One such tool is the HashiCorp Vault, which is key management centralized solution from which the company will be able to get encrypted solutions. This would allow the organization to protect their data in cloud and be able to manage the keys in a better way (Balasubramanian & Rajakani, 2017). This would encrypt the data and includes CLI, UI, and HTTP. It would also allow use of encryption keys, tokens, certificates and passwords. Another tool which could also be used is FortiGate Next-Gen Firewall. With the help of this tool, the organization will be able to secure the first line of defense of the security parameter. This tool allows the inspection of SSL, and other intrusion means, it alsoe allows advanced visibility and deep inspection of the data packets.
�
Noncryptography Strategies
There are some techniques with the help of which Ford will be able to preserve their privacy with secure database. Such techniques are pseudonyms, it is such a technique which has been used by other companies of creating a trick as per which employees or workers, or any stakeholder�s name would be replaced with a fictitious name for masking the identity of the person (Pagnin & Mitrokotsa, 2017). This could also be used for transmitting messages, and exchanging files. Another such technique which Ford could implement is the use of code words. With the help of this technique, data could be stored in form of code words or the files could be stored with code words which would leave no clue to the attacker that there could be sensitive data stored in it. The organization could also prepare regular schedules for the data sanitization. Which could be used for the preventing external threats from entering into the system. �
�
AAA framework Strategies and Tools
The AAA or authentication, authorization, and accounting framework could be used by the organization for controlling computer resources remotely. It could also be used for the enforcement of policies base in security, and could provide information services regarding the management of security. With the help of this strategy, Ford will be able to market revenue by some components of it. As it could be observed that there are three layers of security which will be utilized by the organization if they will adapt this framework (Molina Zarca et al., 2019). The first layer comes with the unction of authentication in which the user will be identified and validated such that they must be having a valid username as well as password. The second layer is authorization which the user need to gain access for getting access to the database which they will be trying to operate, for the authentication, RADIUS and 801.1x coud be used for determination of the access control list and respective roles. Next comes the accounting in which, resources which are consumed by the user will be monitored and behavior will be noticed, for this the network access server of the organization should be configured with ClearPass Policy manager which is used as the accounting server. These three layers of protection could be very beneficial for the security of Ford Motor company.�
�
Access Control and Identify Management
The access control could be termed as the fundamental component for the security and data structure which would also allow only the listed amount of users to get access to the system with the help of resources which will be provided by Ford Motor company. This could be termed as such a policy with the help of which Ford Motor company will be able to limit users. It works in such a manner that it identifies users from the login credentials which they apply, it also uses the biometric scans and allows security tokens. For the protection of data which is stored in the database of the company, it is important to follow some of the management procedures, these are backup procedure (Namasudra, 2021). It is important to proceed data backup for the situations which might occur uncertainly. Data protection management could help with the execution of data backup and also makes sure that the procedure is done properly. �
�
Data Security Policies or Guidelines
The most important part to be included in gaining a secure database for the Ford Motor company has to be application of some security policies on the overall system administration which would also act as the guidelines to the staff members as well as for the employees an d other workers and stakeholders. There should be restrictions made on the employees and other stakeholder administrative who will be connected with the organization such that they will only be able to use limited amount of applications and functions this would also limit the entry of unwanted threats (Namasudra, 2021). There should be a disaster recovery plan made for backing up the data and information which might get lost in certain circumstances. There should be the access control policy for standard user access, network control access, and the system control.