Preview

Is 305 Week 3 Quiz

Good Essays
Open Document
Open Document
577 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is 305 Week 3 Quiz
Week 3 Quiz

General Instructions:

1. This is a closed-book, closed-notes quiz. No reference material (including assignments and labs) will be permitted for use during the quiz session. 2. The quiz contains the following types of questions: * Short essay type 3. Place your answers in the space immediately following each question.

Quiz Questions 1. Define an SLA and state why it is required in a risk adverse organization. A SLA is a service level agreement, which is a contract between the ISP and the company. A SLA gives the company an idea of how much time they will be without services, should something happen with the ISP. A SLA is important to a company in making recovery plans, knowing what critical systems need to be available for a continuance of business and formulation of disaster recovery.

2. Using the user domain, define risks associated with users and explain what can be done to mitigate them. The user domain has several risk’s involved, as people are involved and there is no way employees can be monitored without the use of CCTV. Social engineering a person trying to obtain information through malicious means. The greatest tool in mitigating risk in the user domain is training and reminders for users to be aware of their surroundings. No acceptable user’s policy, AUP, or lack of training employees on the correct usage of the network. User accounts left active, if the employee is terminated, and another employee has the log on credentials. Mitigation would to be disabling all user accounts upon termination. .

3. Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain. The use of USB’s or disk, the files could contain viruses and infect other files or applications on the network. No acceptable user’s policy, AUP, or lack of training employees on the correct usage of the network. The users staying signed into their

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    This can be through a desktop, company laptops, tablets, or any device that connects to the network. Employees should always remember to log off their workstations to avoid unauthorized use as well as not giving out their passwords to co-workers. A good idea is to enable the screen lockout when the desktop is idle. Also block or limit user rights to download, install software, and their access to certain files on the web. This can decrease the threat of viruses, malware, and any harmful files being seen, downloaded, and installed into the system through the workstation. It is very easy for threats to spread throughout the network so it is very important to have a top shelf Anti-virus in place and enable it to scan any CD, DVD, or USB drives inserted into the…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    7. List at least 3 risks your company will face, and explain how you will manage those risks.…

    • 309 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Unit 1

    • 578 Words
    • 3 Pages

    The first domain that would be affected is the User Domain. The User Domain defines the people who access an organization’s information system. One of the roles and tasks is that the user can access systems, applications, and data depending upon their defined access rights. Inside the User domain is where the user would find the acceptable user policy or AUP. The AUP defines what users are allowed to do within the organization-owned IT assets. The User Domain is considered the weakest and most affected domain. One reason why is that it has a lack of user awareness. Another reason is that when users are downloading various content and different files, they generally do not conform to the established security guidelines. To protect from these issues, there should be enabled content filtering as well as automatic antivirus scans. A way to protect from an user doing Employee blackmail or extortion is to enable intrusion detection system/intrusion prevention system (IDS/IPS) monitoring. The monitoring will examine the IP data streams for inbound and outbound traffic.…

    • 578 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Bat1 Task 1

    • 1280 Words
    • 6 Pages

    IT staff can diminish security breaches by developing effective ways to teach clinical staff about securing their workstations when not in use. Mandatory in-service and power point presentations would be an effective way to do this. The importance of workstation security, not accessing another employee's computer while in use and not using another employee's password should be discussed. Along with how doing so would be in violation of company policy and the HIPAA Privacy Act. Disciplinary action should also be discussed.…

    • 1280 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Opm/305 Week 4

    • 1351 Words
    • 6 Pages

    Koç University OPSM 305 Supply Chain Management Class 10: Incentive issues Zeynep Aksin zaksin@ku.edu.tr 1 Hamptonshire Express § Anna has a degree from journalism & operations research § She has started a daily newspaper in her hometown § She used a leased PC: lease cost $10 per day § A local printer prints newspapers at 0.20 per copy § Sales the next day between 6 am and 10 am § Newsstand rental $30 per day § Express sold to customers at $1 per copy § Copies not sold by 10 am are discarded…

    • 1351 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    c. Workstation OS has a known software vulnerability – Define a workstation application software vulnerability window policy. Update application software and security patches according to defined policies, standards, procedures, and guidelines.…

    • 868 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I am addressing the impact of how the “Internal Use Only” should be used in our organization and how by using this term would add to the security of this organization. Of the seven layers IT infrastructure there are three that this policy would differently have an impact on the User Domain, Workstation Domain and the LAN Domain. The User Domain is made up of people who access the system on a daily basis because these are the users or people we have to educate them on how to protect their passwords and critical data for those who will have access to such data. We have an AUP (Acceptable Use Policy) set in place. We have post around the office reminders of how each employee can assist to protect critical information as well we have enable content filtering to prevent users from downloading files that could be malicious to the infrastructure. Workstation Domain are made up of the devices that employee used to connect to the IT Infrastructure with this we must make sure all the tools that are needed to do their jobs must be accessible and secure. The Workstation Domain must be kept as tight as possible without hindering the employee this where they first access the domain at this level also this where the most damage can be done by an employee. We have again educate our employees that a strong password that they can easily remember and no else can easily figure out also set certain policy on the workstations auto lockout after three attempts and workstation lock after idle for a period of time. We can install antivirus and malware software to ensure that our workstations are protected and monitored at all times. The LAN Domain is the one the requires the strongest security because at this level all the hardware and software were are joined together and also this is where the outside world meet the inside world meaning our LAN by connecting…

    • 416 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    1.3. Explain what risk assessment is and how this is managed in the work setting…

    • 3026 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    As everyone knows the Internet is not the most trusting place to put personal information of us; measures are needed to protect from harmful threats and vulnerabilities. The CIO should know that if the company doesn’t protect their Windows or Unix/Linux servers from unknown shortcomings and vulnerabilities, the company might get attacked by hackers, who want to steal confidential information to commit crimes, it could destroy the data or worst it could steal the data of which the company had save for many years (Records). Hackers typically use codes or malware in the form of viruses, worms, time bombs, logic bombs, Trojan, and many more. To corrupt a company’s network infrastructure and it is network operating system. Normally when they do this kind of things, they are looking to steal data, such as credit cards, property information, social security numbers, addresses, phone numbers, and anything else that could be used to identify a person or help duplicate a business. The CIO should have a way to protect the company’s network infrastructure from such catastrophes.…

    • 732 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Internet abuse

    • 1449 Words
    • 5 Pages

    Young, K. S. (2001). Managing employee internet abuse: a comprehensive plan to increase your productivity and reduce liability. Employee Internet Management, 1-37.…

    • 1449 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    * Create User types in the system and define user rights to them, to allow employees to access the system at any time, while preserving the confidentiality of other employee information.…

    • 970 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Misuse of Internet

    • 1778 Words
    • 8 Pages

    * 2. It is important to learn how to prevent misuse of your company’s technology resources and how to protect your business from legal liability for employee misuse of e-mail, blogs and the Internet. Managing Internet Misuse Introduction…

    • 1778 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Library System

    • 714 Words
    • 3 Pages

    Poor Data Storage - All the data is stored in filing cabinets. Data could be misplaced due to human error. Data could be stolen very easily.…

    • 714 Words
    • 3 Pages
    Good Essays