Information Technology Request

Agent3 made this Rhyddid Gwybodaeth request to University of East London as part of a batch sent to 84 authorities

Automatic anti-spam measures are in place for this older request. Please let us know if a further response is expected or if you are having trouble responding.

Roedd y cais yn rhannol lwyddiannus.

Dear University of East London,

I am writing to make an open government request for all the information to which I am entitled under the Freedom of Information Act 2000.

Please forward responses to the attached questions below.

I would like the above information to be provided to me as an electronic document.
If this request is too wide or unclear, I would be grateful if you could contact me as I understand that under the Act, you are required to advise and assist requesters. If any of this information is already in the public domain, please can you direct me to it, with page references and URLs if necessary.

If the release of any of this information is prohibited on the grounds of breach of confidence, I ask that you supply me with copies of the confidentiality agreement and remind you that information should not be treated as confidential if such an agreement has not been signed.
I understand that you are required to respond to my request within the 20 working days after you receive this letter. I would be grateful if you could confirm in writing that you have received this request.

I look forward to hearing from you.

Yours faithfully,

Gloria Zimba.

1. Do you have a formal IT security strategy? (Please provide a link to the strategy)

A) Yes
B) No

2. Does this strategy specifically address the monitoring of network attached device configurations to identify any malicious or non-malicious change to the device configuration?

A) Yes
B) No
C) Don’t know

3. If yes to Question 2, how do you manage this identification process – is it:

A) Totally automated – all configuration changes are identified and flagged without manual intervention.
B) Semi-automated – it’s a mixture of manual processes and tools that help track and identify configuration changes.
C) Mainly manual – most elements of the identification of configuration changes are manual.

4. Have you ever encountered a situation where user services have been disrupted due to an accidental/non malicious change that had been made to a device configuration?

A) Yes
B) No
C) Don’t know

5. If a piece of malware was maliciously uploaded to a device on your network, how quickly do you think it would be identified and isolated?

A) Immediately
B) Within days
C) Within weeks
D) Not sure

6. How many devices do you have attached to your network that require monitoring?

A) Physical Servers: record number
B) PC’s & Notebooks: record number

7. Have you ever discovered devices attached to the network that you weren’t previously aware of?

A) Yes
B) No

If yes, how do you manage this identification process – is it:

A) Totally automated – all device configuration changes are identified and flagged without manual intervention.
B) Semi-automated – it’s a mixture of manual processes and tools that help track and identify unplanned device configuration changes.
C) Mainly manual – most elements of the identification of unexpected device configuration changes are manual.

8. How many physical devices (IP’s) do you have attached to your network that require monitoring for configuration vulnerabilities?

Record Number:

9. Have you suffered any external security attacks that have used malware on a network attached device to help breach your security measures?

A) Never
B) Not in the last 1-12 months
C) Not in the last 12-36 months

10. Have you ever experienced service disruption to users due to an accidental, non-malicious change being made to device configurations?

A) Never
B) Not in the last 1-12 months
C) Not in the last 12-36 months

11. When a scheduled audit takes place for the likes of PSN or Cyber Essentials, how likely are you to get significant numbers of audit fails relating to the status of the IT infrastructure?

A) Never
B) Occasionally
C) Frequently
D) Always

Freedom Info, University of East London

Thankyou for your email. If you have submitted a new Freedom of
Information request, this email acts as acknowledgement of receipt. We
will respond to your request as soon as possible and within the statutory
20 day time limit. If this is a follow up query or an internal review
request a member of the Information Assurance Office will be in touch in
due course.

 

If your email relates to data protection, please email [email address]

Freedom Info, University of East London

5 Atodiad

Dear Gloria,

 

We refer to your inquiry dated 16^th December 2021 and set out below our
response to your inquiry.

 

Yours sincerely,

 

[1][University of East London request email]

University of East London

4-6 University Way

London

E16 2RD

 

 

RESPONSE

 

 1. Do you have a formal IT security strategy? (Please provide a link to
the strategy)

The strategy is to align to ISO 27001:2013 controls, and we are
working towards that with completion targeted for mid-2022. There is
no strategy document for this, other than the stated intent. The
specifics will be drawn from the 114 ISO 27001:2013 controls.
A) Yes
B) No

2. Does this strategy specifically address the monitoring of network
attached device configurations to identify any malicious or
non-malicious change to the device configuration?

A) Yes

B) No

C) Don’t know

3. If yes to Question 2, how do you manage this identification process
– is it:

A) Totally automated – all configuration changes are identified and
flagged without manual intervention.

B) Semi-automated – it’s a mixture of manual processes and tools that
help track and identify configuration changes.

C) Mainly manual – most elements of the identification of
configuration changes are manual.

4. Have you ever encountered a situation where user services have been
disrupted due to an accidental/non malicious change that had been made to
a device configuration?

A) Yes
B) No

C) Don’t know

5. If a piece of malware was maliciously uploaded to a device on your
network, how quickly do you think it would be identified and isolated?

A) Immediately

B) Within days

C) Within weeks

D) Not sure

 

                We do not believe this is a valid FOI question as you are
not asking for recorded data but asking for an opinion. 

 

                6. How many devices do you have attached to your network
that require monitoring?

                A) Physical Servers: record number 40, already monitored,
so 0 require additional monitoring.

                B) PC’s & Notebooks: record number      circa 5,200.

                7. Have you ever discovered devices attached to the
network that you weren’t previously aware of?

                A) Yes
                B) No

                If yes, how do you manage this identification process – is
it:

 

                Please note that the answers offered do not match the
question asked, which only asks about unknown devices being detected.

                A) Totally automated – all device configuration changes
are identified and flagged without manual intervention.

                B) Semi-automated – it’s a mixture of manual processes and
tools that help track and identify unplanned device configuration changes.

                C) Mainly manual – most elements of the identification of
unexpected device configuration changes are manual.

 

                8. How many physical devices (IP’s) do you have attached
to your network that require monitoring for configuration vulnerabilities?

                Record Number: More than 1

                9. Have you suffered any external security attacks that
have used malware on a network attached device to help breach your
security measures?

                A) Never
                B) Not in the last 1-12 months

                C) Not in the last 12-36 months

                10. Have you ever experienced service disruption to users
due to an accidental, non-malicious change being made to device
configurations?

                A) Never
                B) Not in the last 1-12 months

                C) Not in the last 12-36 months
                11. When a scheduled audit takes place for the likes of
PSN or Cyber Essentials, how likely are you to get significant numbers of
audit fails relating to the status of the IT infrastructure?

                A) Never

                B) Occasionally

                C) Frequently

                D) Always

 

                We do not believe this is a valid FOI question as you are
not asking for recorded data but asking for an opinion. 

 

 

 

If you are dissatisfied with the way the University of East London has
handled your request for information, you can request an internal  review
of this decision by contacting:

 

University Secretary

University of East London

4-6 University Way

London

E16 2RD

E-mail [2][University of East London request email]

 

If the review does not address your concerns, you can exercise a right of
appeal to the Information Commissioner at:

 

The Information Commissioner's Office

Wycliffe House

Water Lane

Wilmslow

Cheshire, SK9 5AF

Live Chat [3]https://ico.org.uk/global/contact-us/liv...

Tel: 0303 123 1113

[email address]. 

 

 

 

From: Gloria Zimba <[FOI #816933 email]>
Sent: 16 December 2021 15:37
To: Freedom Info <[University of East London request email]>
Subject: Freedom of Information request - Information Technology Request

 

Dear University of East London,

I am writing to make an open government request for all the information to
which I am entitled under the Freedom of Information Act 2000.

Please forward responses to the attached questions below.

I would like the above information to be provided to me as an electronic
document.

If this request is too wide or unclear, I would be grateful if you could
contact me as I understand that under the Act, you are required to advise
and assist requesters. If any of this information is already in the public
domain, please can you direct me to it, with page references and URLs if
necessary.

If the release of any of this information is prohibited on the grounds of
breach of confidence, I ask that you supply me with copies of the
confidentiality agreement and remind you that information should not be
treated as confidential if such an agreement has not been signed.

I understand that you are required to respond to my request within the 20
working days after you receive this letter. I would be grateful if you
could confirm in writing that you have received this request.

I look forward to hearing from you.

Yours faithfully,

Gloria Zimba.

1. Do you have a formal IT security strategy? (Please provide a link to
the strategy)

A) Yes

B) No

2. Does this strategy specifically address the monitoring of network
attached device configurations to identify any malicious or non-malicious
change to the device configuration?

A) Yes

B) No

C) Don’t know

3. If yes to Question 2, how do you manage this identification process –
is it:

A) Totally automated – all configuration changes are identified and
flagged without manual intervention.

B) Semi-automated – it’s a mixture of manual processes and tools that help
track and identify configuration changes.

C) Mainly manual – most elements of the identification of configuration
changes are manual.

4. Have you ever encountered a situation where user services have been
disrupted due to an accidental/non malicious change that had been made to
a device configuration?

A) Yes

B) No

C) Don’t know

5. If a piece of malware was maliciously uploaded to a device on your
network, how quickly do you think it would be identified and isolated?

A) Immediately

B) Within days

C) Within weeks

D) Not sure

6. How many devices do you have attached to your network that require
monitoring?

A) Physical Servers: record number

B) PC’s & Notebooks: record number

7. Have you ever discovered devices attached to the network that you
weren’t previously aware of?

A) Yes

B) No

If yes, how do you manage this identification process – is it:

A) Totally automated – all device configuration changes are identified and
flagged without manual intervention.

B) Semi-automated – it’s a mixture of manual processes and tools that help
track and identify unplanned device configuration changes.

C) Mainly manual – most elements of the identification of unexpected
device configuration changes are manual.

8. How many physical devices (IP’s) do you have attached to your network
that require monitoring for configuration vulnerabilities?

Record Number:

9. Have you suffered any external security attacks that have used malware
on a network attached device to help breach your security measures?

A) Never

B) Not in the last 1-12 months

C) Not in the last 12-36 months

10. Have you ever experienced service disruption to users due to an
accidental, non-malicious change being made to device configurations?

A) Never

B) Not in the last 1-12 months

C) Not in the last 12-36 months

11. When a scheduled audit takes place for the likes of PSN or Cyber
Essentials, how likely are you to get significant numbers of audit fails
relating to the status of the IT infrastructure?

A) Never

B) Occasionally

C) Frequently

D) Always

-------------------------------------------------------------------

Please use this email address for all replies to this request:

[FOI #816933 email]

Is [University of East London request email] the wrong address for Freedom of Information requests to
University of East London? If so, please contact us using this form:

[4]https://www.whatdotheyknow.com/change_re...

Disclaimer: This message and any reply that you make will be published on
the internet. Our privacy and copyright policies:

[5]https://www.whatdotheyknow.com/help/offi...

For more detailed guidance on safely disclosing information, read the
latest advice from the ICO:

[6]https://www.whatdotheyknow.com/help/ico-...

Please note that in some cases publication of requests and responses will
be delayed.

If you find this service useful as an FOI officer, please ask your web
manager to link to us from your organisation's FOI page.

dangos adrannau a ddyfynnir