Preview

student

Good Essays
Open Document
Open Document
287 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
student
1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities? Because it helps to demand what areas need your attention first
2. A quality IT Risk Mitigation Plan will include details on costs, risk prioritization, and accompanying schedule. For risk prioritization, what influence would the industry your organization operates in have on prioritizing your identified risks, threats, and vulnerabilities? By the nature of the data u are trying to safe guard
3. What questions would you bring to executive management prior to finalizing your IT risk mitigation plan? What is the budget and time frame for the migration
4. What is the difference between short-term and long-term risk mitigation tasks and on-going duties? Short term will be the most important and the long term would be items that aren’t as sensitive
5. Which of the seven domains of a typical IT infrastructure is easy to implement risk mitigation solutions but difficult to monitor and track effectiveness? WAN
6. When considering the implementation of software updates, software patches, and software fixes, why must you test this upgrade or software patch before you implement this as a risk mitigation tactic? To make sure they work as promised and don’t leave open vulnerabilities
7. Are risk mitigation policies, standards, procedures, and guidelines needed as part of your long-term risk mitigation plan? Why or why not? Yes to make sure that risk is limited and that plan is on track and monitored
8. If an organization under a compliance law is not in compliance, how critical is it for your organization to mitigate this non-compliance risk element? It is very important so that the organization isn’t held liable for breaking the law

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    To develop network security strategies that will ensure that the organization's network is protected from both internal and external security risks. A summary of the steps I can take to mitigate the risk in the following areas: Denial-of-Service attacks (DoS), Distributed Denial-of-Service attacks (DDoS), Masquerading and IP Spoofing, Smurf attacks, Land.c attacks, Man-in-the-Middle attacks.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This document MGT 401 Week 1 Discussion Question 2 Risk Control includes right solutions of the following questions: "What are the primary elements of each of the three types of risk control? Assume you are in a hazard hunt; list a few factors in your job that may contribute to a hazard and how likely is it that a hazardous situation will occur? Respond to at least two of your classmates…

    • 695 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ACCT 301 Week2 Homework

    • 527 Words
    • 3 Pages

    b. Risk assessment: this just means they check there controls for weaknesses regularly and fix any discrepancies with stronger controls.…

    • 527 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    For this task you are required to demonstrate an understanding of standards and legislation relevant to risk management, and the management of risk across an organisation in a range of contexts.…

    • 1624 Words
    • 7 Pages
    Good Essays
  • Satisfactory Essays

    ISSC363 Assignment 3

    • 586 Words
    • 2 Pages

    Conducting a thorough risk assessment is certainly one of the top priorities in the overall risk management program. It is a process of identifying and evaluating the risks that can have a negative impact on an organization. Once the risks have been successfully captured, they can be assessed and prioritized according to the severity of their potential impact. While every organization should have a continuous risk management program, a risk assessment is conducted at a given moment in time, and as such should be repeated on some predetermined schedule to reevaluate the risks and adjust as appropriate. To conduct an effective risk assessment, it’s important to be able to fundamentally describe of the purpose of a risk assessment, risk scope and identify critical areas for an assessment. Additionally, a methodology that is appropriate for the risk assessment should be selected.…

    • 586 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Is 305 Week 3 Quiz

    • 577 Words
    • 3 Pages

    Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Better Essays

    NT2580 Graded Assignments

    • 5288 Words
    • 22 Pages

    I have correctly matched all the risks or threats within the seven domains of a typical IT infrastructure with the solutions and preventative actions.…

    • 5288 Words
    • 22 Pages
    Better Essays
  • Satisfactory Essays

    Title

    • 309 Words
    • 2 Pages

    3. Which application is used in step #2 in the hacking process to perform a vulnerability assessment scan? / Nessus…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing patients with life-threatening situations. Given the list, select which of the seven domains of a typical IT infrastructure is primarily impacted by the risk, threat, or vulnerability.…

    • 404 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    10. In order to craft back-up and recovery procedures, you need to review the IT systems, hardware, software and communications infrastructure needed to support business operations, functions and define how to maximize availability. This alignment of IT systems and components must be based on business operations , functions, and prioritizations. This prioritization is usually the result of a risk assessment and how those risks, threats, and vulnerabilities impact business operations and functions. What is the proper sequence of development and implementation for these following plans?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The organization will have certain policies and procedures in place and it will be your responsibility to ensure you have read policies and procedures and fully understand to ensure you adhere to these whilst working.…

    • 255 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Week 10 Technical Paper

    • 2283 Words
    • 10 Pages

    Every organization is faced with some risk or potential threat that could cause an interruption to the organization’s operations. These risks and threats can come from within or outside of the organization. To prepare for the worst that could happen, organizations must focus their attention on how to assess different types of risks to protect the organization from the possible negative effects to the daily operations. Performing a risk assessment is one of the most important steps in the risk management process (eHow, 2011).…

    • 2283 Words
    • 10 Pages
    Powerful Essays