Preview

IS3110 - lab 6

Satisfactory Essays
Open Document
Open Document
511 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3110 - lab 6
Lab #6: Assessment Worksheet
1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities?
Because you need to know which is most important and which is negligible. In some cases, protecting your infrastructure from a high priority threat is more important and so you may want to protect against that even if it leaves you vulnerable to low priority threats. This mainly just shows you which areas need your attention the most.
2. Based on your executive summary produced in Lab #4 – Perform a Qualitative Risk Assessment for an IT infrastructure, what was the primary focus of your message to executive management?
Setting up security measures through various means.
Forcing users to update password every X number of days.
Educating users.
Firewalls
Anti-malware
3. Given the scenario for your IT risk mitigation plan, what influence did your scenario have on prioritizing your identified risks, threats, and vulnerabilities?
4. What risk mitigation solutions do you recommend for handling the following risk element? User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers.
A good antivirus program and have all devices scanned as soon as they are plugged in.
Educate employees
Disable optical drives/USB ports (if they are not needed)
5. What is security baseline definition?
A baseline is a starting point or a standard. Within IT, a baseline provides a standard focused on a specific technology used within an organization. When applied to security policies, the baseline represents the minimum security settings that must be applied.
6. What questions do you have for executive management in order to finalize your IT risk mitigation plan?
What is the budget?
What are their priorities?
Disclose all your thoughts on the matter. Show them other options and how you came to your conclusion and make sure the executive management agrees.
7. What is the most important risk mitigation

You May Also Find These Documents Helpful

  • Satisfactory Essays

    IT220 Lab 7

    • 303 Words
    • 2 Pages

    The benefits of a partial in the cost and a full meh would be required where large sums of money and data are exchanged and can have almost none down time.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Is3110 Unit 4

    • 406 Words
    • 2 Pages

    If the project is completed on time then there is no risk for completion. All of the regular risks that apply to a project built on time apply to this one regardless of whether you are building a new infrastructure or modifying an older one. If the project is finished one month early, the quantitative risk really does not exist. It is basically comparable to completing the project on time. Since the project is quoted at 3 million dollars it will stay the same regardless of how fast the project is finished. However, you may see differences. When you rush a project this large you could possibly cut corners or receive poor quality results. If the project is finished two months late there are additional risks. If the company expects to make $20 million dollars annually, and assuming that the 4% penalty is levied against this yearly figure and not within smaller period of time, one month late means that US Industries Incorporated loses $800,000 annually. There doesn't appear to be any additional risk, however, further penalties and the possible eventual loss of the contract to a competitor could result in a poor product. There again appears to be no real quantitative risk involved if the project is finished a month early with the security requirements. If the originally quoted $3 million dollars remains the same regardless of how fast the project is finished and not coupled with hourly or daily wages, then there is nothing to lose financially. However the companies go beyond the required 1.5% completion benchmarks that the contract demands. Rushing a project of this scale also comes with rushed results possibly cut corners or poor quality. The credibility of the company is at stake with such a high profile, high income project such as this, and it is important to use all of the time available to ensure the best product is on display for any customer. The finished project should meet both the time and security requirements but not the service agreement. There does not…

    • 406 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    lab8 is3440

    • 129 Words
    • 1 Page

    1 Bascially RPM command is used for installing, uninstalling, upgrading, querying, listing, and checking RPM packages on your Linux system.…

    • 129 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Multiple layers can be used to secure internal threats like keeping employees from accessing inappropriate material, update and patch workstations and run current anti-virus/malware on workstations daily. The layers also help mitigate external threats like hackers by using firewalls and shutting traffic out of the internal network.…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Is3350 Unit 5

    • 880 Words
    • 4 Pages

    Electricity at work Regulations 1989. This legislation places the4 responsibility of electrical item on to the employer.…

    • 880 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Unit 10 Lab

    • 563 Words
    • 2 Pages

    3. Student’s discretion - Typically to discover live hosts and open ports but it can be argued that Nmap is useful both pre- and post- attack to determine courses of action which are taken on any attacked systems.…

    • 563 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Is3350 Project 2

    • 949 Words
    • 4 Pages

    No, because at some point you have to take ownership, even in the face of danger.…

    • 949 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    In the workstation domain, we need to make sure that all workstations have antivirus and malware protection installed on them. Laptops and portable devices are very vulnerable to theft…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 562 Words
    • 3 Pages

    i. With this security plan being implemented, you can monitor inbound IP traffic anomalies and prevent malicious-intent traffic that may try to intrude and harm your system.…

    • 562 Words
    • 3 Pages
    Good Essays
  • Good Essays

    IS3230 Lab 4

    • 528 Words
    • 2 Pages

    1. By opening ports in your firewall it is allowing people access to your network and if anybody tries to get in figures out the port, they can potentially gain access to your system.…

    • 528 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    221 - Use office equipment

    • 2807 Words
    • 12 Pages

    The computers have lots of important features. A lot of confidential information and documents are kept safe in protected electronic files on the computer such as PAS (patient attendance system). We also have intranet, which I mostly use to access…

    • 2807 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    3. How does risk management and risk assessment relate to a business impact analysis for an IT infrastructure?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    When we ask what “Critical Infrastructure is?” Critical infrastructure is the backbone of our nation’s economy, security, and health. It is clear that we have the power in our homes, the water we drink, the transportation that moves us, and the communication systems we rely on to stay in touch with friends and family. The vitalization of critical infrastructure according to research and the” Department of Homeland Security, 2013” is the assets, systems, and networks, whether physical or virtual. It is so…

    • 1767 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    1. Ensure that the machine is in good condition before being used for security purposes…

    • 926 Words
    • 4 Pages
    Good Essays