Preview

IS3110 Risk Management

Good Essays
Open Document
Open Document
663 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3110 Risk Management
1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities?
Answer : The importance of to prioritizing risks in an IT infrastructure, is because you must be aware of what are the risks, the threats, and vulnerabilities to your infrastructure. By prioritizing immediately you know where the weakest point in your network is, and it can be addressed more quickly, to lessen the chance of a break in.
2. A quality IT Risk Mitigation Plan will include details on costs, risk prioritization, and accompanying schedule. For risk prioritization, what influence would the industry your organization operates in have on prioritizing your identified risks, threats, and vulnerabilities?
Answer :Many different companies have different way they approach things and prioritize. What is important to my company, might not be necessarily important to other companies. For example, a medical facility that deals with patient information has to comply to HIPPA while on the other hand would different priorities would exist for a Financial institutions would have to comply to SOX
3.What questions would you bring to executive management prior to finalizing your IT risk mitigation plan?
Answer : How long is implementation going to take? What is the predicted down time or chances of a failed change? Do we need other teams to be on standby in case of a worst case scenario?
4.What is the difference between short-term and long-term risk mitigation tasks and on-going duties?
Answers :
Short-term mitigation tasks are risks that can be solved or repaired very rapidly and will not have long term effects on the company,
Long term mitigation tasks are risks that cannot be solved quickly and have other harsh repercussions on the network team, not to mention fines if they involve compliance issues.
On-going duties are the daily duties that must be done in order for the company to perform with minimal risks.

5. Which of the seven domains of a

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The step, that I believe is the most important in the risk management process, is vulnerability identification. A vulnerability is a weakness in the infrastructure or environment of the network. Any weakness can be exposed (exploited) and threatened. If vulnerabilities are not identified, then how can the Security Administrator properly set security policies and guidelines in place to protect the network? If he/she doesn’t know of the vulnerabilities, then they will never put things in place until some threat occurs to the network. Network vulnerabilities come in many forms and fashions, and must be identified to be properly mitigated.…

    • 167 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Mitigations may include:] * [Add project schedule tasks, along with financial reserves.] * [Add time to tasks for which assigned resources have known skill deficiencies.] * [Add a percent multiplier to the project schedule for individual resources as appropriate.] * [Add time and resources for training when no appropriately skilled resource is available.]…

    • 885 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    2. Why is it difficult to conduct a qualitative risk assessment for an IT infrastructure?…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    MU1 CWTI Memo

    • 424 Words
    • 2 Pages

    As per our discussion last week I’ve prepared this memo that outlines the risks that CWTI faces and methods of mitigation for those risks. The goal of this exercise is to have a starting point for establishing a risk management process within CWTI. Below I’ve identified risks and provided suggested methods of mitigation for each. I’d like to point out that while most of these risks have more than one potential mitigation method, I chose to present the method I believe would be most successful for CWTI.…

    • 424 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IS3110 - lab 6

    • 511 Words
    • 3 Pages

    Because you need to know which is most important and which is negligible. In some cases, protecting your infrastructure from a high priority threat is more important and so you may want to protect against that even if it leaves you vulnerable to low priority threats. This mainly just shows you which areas need your attention the most.…

    • 511 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Update all anti-virus software Security Policy needs to be documented and implemented Weak user passwords need to be strengthened Proper security personnel Wrong building fire protection needs corrected Remote access needs to be hardened with VPN restrictions II. No Plan…

    • 186 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Lab 4 Questions IS3110

    • 398 Words
    • 1 Page

    4. I prioritized the 1, 2, and 3 risk elements by greatest impact to the company for both a cost value and for the means to get the company back to working order. What I would say to an executive is that the cost of value to your company is greatest when your system is compromised on hardware that has the most valued data within the company and when backup is down long enough to the point of no return.…

    • 398 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    IS3110 PP1T

    • 777 Words
    • 5 Pages

    The responsibility for managing risk is shared amongst all the stakeholders of the project. However, decision authority for selecting whether to proceed with mitigation strategies and implement contingency actions, especially those…

    • 777 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is 305 Lab 1

    • 538 Words
    • 3 Pages

    * Given a scenario, prioritize risks, threats, and vulnerabilities based on their risk impact to the organization…

    • 538 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    In which of the IT domains is a database considered a major component of risk?…

    • 778 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    appropriate to manage these risks. IT managers then present this information to the senior management.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    To assess risks and vulnerabilities with the operating IT facilities we must create a mitigation plan. The mitigation plan will ensure what actions or steps to take when a risk were to occur. If the company were to experience risk such as fire, users outages, remote access, opening unknown e-mail attachment or have equipment failure, the mitigation plan will let you know…

    • 622 Words
    • 3 Pages
    Good Essays
  • Good Essays

    problems need to be addressed and any associated risks as well as the protective factors. Yuen…

    • 436 Words
    • 2 Pages
    Good Essays
  • Good Essays

    student

    • 287 Words
    • 1 Page

    3. What questions would you bring to executive management prior to finalizing your IT risk mitigation plan? What is the budget and time frame for the migration…

    • 287 Words
    • 1 Page
    Good Essays
  • Satisfactory Essays

    1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities? It is important to because you must be aware of what the risks, threats, and vulnerabilities are to your infrastructure. You need this so that you know where to focus your attention.…

    • 585 Words
    • 2 Pages
    Satisfactory Essays