Preview

IS3110 Lab 2 Align Risk, Threats, & Vulnerabilities to COBIT P09 Risk Management Controls

Satisfactory Essays
Open Document
Open Document
868 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3110 Lab 2 Align Risk, Threats, & Vulnerabilities to COBIT P09 Risk Management Controls
1.
a. Unauthorized access from public internet - HIGH
b. User destroys data in application and deletes all files - LOW
c. Workstation OS has a known software vulnerability – HIGH
d. Communication circuit outages - MEDIUM
e. User inserts CD’s and USB hard drives with personal photos, music and videos on organization owned computers - MEDIUM
2.
a. PO9.3 Event Identification – Identify threats with potential negative impact on the enterprise, including business, regulatory, legal, technology, trading partner, human resources and operational aspects.
b. PO9.4 Risk Assessment – Assess the likelihood and impact of risks, using qualitative and quantitative methods.
c. PO9.5 Risk Response – Develop a response designed to mitigate exposure to each risk – Identify risk strategies such as avoidance, reduction, acceptance – determine associated responsibilities; and consider risk tolerance levels.
3.
a. Unauthorized access from public internet - AVAILABILITY
b. User destroys data in application and deletes all files - INTEGRITY
c. Workstation OS has a known software vulnerability – CONFIDENTIALITY
d. Communication circuit outages - AVAILABILITY
e. User inserts CD’s and USB hard drives with personal photos, music and videos on organization owned computers - INTEGRITY
4.
a. Unauthorized access from public internet – Operating system, software patches, updates, change passwords often, and hardware or software firewall.
b. User destroys data in application and deletes all files – Restrict access for users to only those systems, applications, and data needed to perform their jobs. Minimize write/delete permissions to the data owner only.
c. Workstation OS has a known software vulnerability – Define a workstation application software vulnerability window policy. Update application software and security patches according to defined policies, standards, procedures, and guidelines.
d. Communication circuit outages - the role of countermeasures

You May Also Find These Documents Helpful

  • Satisfactory Essays

    440iLabWeek7Complete

    • 152 Words
    • 2 Pages

    In this Lab I built a network that consists of various departments within an organization that utilize the internet to access the company servers. Upper management suspects that various departments within the organization are abusing the network resources by downloading music movie trailers in strict violation of company policy. I have monitored the network and the abuse of the network resources. I have taken corrective measures to track the abuse back to the appropriate department involved.…

    • 152 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab #4

    • 451 Words
    • 2 Pages

    5. During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft vulnerabilities identified. What is vulnerability “MS08-067”?…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    In the workstation domain, we need to make sure that all workstations have antivirus and malware protection installed on them. Laptops and portable devices are very vulnerable to theft…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the workstation domain, we need to make sure that each of the workstations, whether desktop or laptop, has to have antivirus and malware protection installed on them. Express strict access control polices and standards. And mandate annual security awareness training for all employees…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This can be through a desktop, company laptops, tablets, or any device that connects to the network. Employees should always remember to log off their workstations to avoid unauthorized use as well as not giving out their passwords to co-workers. A good idea is to enable the screen lockout when the desktop is idle. Also block or limit user rights to download, install software, and their access to certain files on the web. This can decrease the threat of viruses, malware, and any harmful files being seen, downloaded, and installed into the system through the workstation. It is very easy for threats to spread throughout the network so it is very important to have a top shelf Anti-virus in place and enable it to scan any CD, DVD, or USB drives inserted into the…

    • 501 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Week 2 Appendixb

    • 565 Words
    • 3 Pages

    1. You are the network administrator for a new company that has 10 users and that plans to add 5 more users within a year. The files need to be accessed by all 10 users, and each user must have different security rights.…

    • 565 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    User domain is essentially the people who access the information system. User domains tend to receive risk due to the user’s carelessness due to lack of awareness, not caring for policies, and security violations. These can easily be rectified with training. Conduct security awareness training, display security posters around the office, and send email reminders to keep the policies fresh in the employee’s mind. Another common threat is caused by employee misuse of the system. Employees might insert USB drives, or download photos music and videos. These items might contain virus’s which in turn damages the system. The USB ports should be disabled and content filtering and antivirus scanning should be enabled.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    IS3110 - lab 6

    • 511 Words
    • 3 Pages

    4. What risk mitigation solutions do you recommend for handling the following risk element? User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers.…

    • 511 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Fcs 006

    • 856 Words
    • 4 Pages

    9. ____ software, such as that shown in the accompanying figure, can control which devices can be connected to an employee computer. a. Data-leakage prevention c. Professional firewall b. Device authentication d. Network quarantine…

    • 856 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    Unauthorized access to data centers, computer rooms and wiring closets, servers must be shut down occasionally for maintenance causing network downtime, data can be easily lost or corrupt and recovering critical business functions may take too long to be useful.…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    You are a networking intern at Richman Investments. An employee of the company used employer-owned equipment to access the Internet and check his personal Web-based e-mail account. He followed a link in a spam e-mail, downloaded games to his hard disk, and inadvertently infected the computer with malware, which spread to the network server. The security officer at Richman has asked you to research and to define “the acceptable use of Richman assets regarding Internet and e-mail access,” including the actions that are prohibited. The employees must be restricted from using the Internet at work for personal use, other than to occasionally check Web-based personal e-mail accounts. Personal downloads must be strictly prohibited. Your definition will become part of the overall Richman security policy.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    1.3. Explain what risk assessment is and how this is managed in the work setting…

    • 3026 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    Managing Safely

    • 336 Words
    • 2 Pages

    3.4 Summarise the types of risks that may be involved in assessment in own area of responsibility…

    • 336 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Retention and deletion procedures can be enforced, as a systems administrator will be charged of the file server.…

    • 141 Words
    • 1 Page
    Satisfactory Essays