Preview

IS3110 U1L1

Powerful Essays
Open Document
Open Document
1084 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3110 U1L1
IS3110 Lab Student Name:
Submission Requirements
Your last name must be in the filename of your submitted document according the assignment naming standard. IS3110_UL1_Firstname_Lastname
Email to: SMichnick@itt-tech.edu
Due By: 6:00 PM CDT, Wednesday June 25, 2014
Note: Emails received after Due Date Due Date will be marked LATE and subject to a grade of 0 for the assignment.
Pages 3-10 of the IS3220 Student Lab Manual
Lab #1 – Part A – List of Risks, Threats, and Vulnerabilities Commonly Found in an IT Infrastructure

Overview
The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing patients with life-threatening situations. Given the list, select which of the seven domains of a typical IT infrastructure is primarily impacted by the risk, threat, or vulnerability.

Risk – Threat – Vulnerability
Primary Domain Impacted
Unauthorized access from public Internet
Remote Access Domain
User destroys data in application and deletes all files
System App Domain
Hacker penetrates your IT infrastructure and gains access to your internal network
Lan to Wan Domain
Intra-office employee romance “gone bad”
User Domain
Fire destroys the primary data center
System App Domain
Communication circuit outages
Wan Domain
Workstation OS has a known software vulnerability
Workstation Domain
Unauthorized access to organization owned Workstations
Workstation or End point Domain
Loss of production data
System App Domain
Denial of service attack on organization e-mail server
System App Domain
Remote communications from home office
Remote access Domain
LAN server OS has a known software vulnerability
Lan Domain
User downloads an unknown e –mail attachment User Domain
Workstation browser has software vulnerability
Workstation Domain
Service provider has a major network outage
Wan Domain
Weak ingress/egress traffic filtering degrades performance
Lan to Wan
User inserts CDs and USB hard drives with personal photos, music, and videos on

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Type the answers to the assignment questions below. Use complete sentences unless the question says otherwise. You will have more than one day to complete an assignment. At the end of each day, be sure to save your progress.…

    • 528 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Is3110 Unit 4

    • 406 Words
    • 2 Pages

    If the project is completed on time then there is no risk for completion. All of the regular risks that apply to a project built on time apply to this one regardless of whether you are building a new infrastructure or modifying an older one. If the project is finished one month early, the quantitative risk really does not exist. It is basically comparable to completing the project on time. Since the project is quoted at 3 million dollars it will stay the same regardless of how fast the project is finished. However, you may see differences. When you rush a project this large you could possibly cut corners or receive poor quality results. If the project is finished two months late there are additional risks. If the company expects to make $20 million dollars annually, and assuming that the 4% penalty is levied against this yearly figure and not within smaller period of time, one month late means that US Industries Incorporated loses $800,000 annually. There doesn't appear to be any additional risk, however, further penalties and the possible eventual loss of the contract to a competitor could result in a poor product. There again appears to be no real quantitative risk involved if the project is finished a month early with the security requirements. If the originally quoted $3 million dollars remains the same regardless of how fast the project is finished and not coupled with hourly or daily wages, then there is nothing to lose financially. However the companies go beyond the required 1.5% completion benchmarks that the contract demands. Rushing a project of this scale also comes with rushed results possibly cut corners or poor quality. The credibility of the company is at stake with such a high profile, high income project such as this, and it is important to use all of the time available to ensure the best product is on display for any customer. The finished project should meet both the time and security requirements but not the service agreement. There does not…

    • 406 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Is3350 Unit 5

    • 880 Words
    • 4 Pages

    Electricity at work Regulations 1989. This legislation places the4 responsibility of electrical item on to the employer.…

    • 880 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Anyone with a laptop or tablet could access the network and with only few basic network utilities could access all the servers and all the patient information. Most of these facilities are not implementing any Network Security because of the cost associated with it. “Most healthcare organizations nationwide, some 61 percent to be exact, reported a security related incident in the form of security breach, data loss or unplanned downtime at least once this past year, according to a new health IT report by MeriTalk, a public-private organization working to improve government information technology. These security events cost U.S. hospitals an estimated $1.6 billion each year. Breaking it down by incident, hospitals should expect to hand over on average $810,000 per security breach, which occurs at nearly one in five healthcare organizations nationwide” (healthcareitnews.com). I hope that with this project I can make clear the benefits of securing the network and the steps we need to take to set up and secure the…

    • 698 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Part A - Risks, Threats, & Vulnerabilities in the Seven Domains of a Typical IT Infrastructure…

    • 900 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lol lots of loling

    • 2208 Words
    • 10 Pages

    DO NOT WAIT until the last minute for this assignment. It will be impossible to complete in a short amount of time.…

    • 2208 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    2015 S1 Assignment

    • 633 Words
    • 3 Pages

    Due Date: The week beginning the 11th of May, 2015. The completed assignment must be submitted to your lecturer during your scheduled seminar.…

    • 633 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Denise Clark, Joseph Huiet, Anthony Brown, Orlando Rodriguez, Niko Budworth, Cory Mooney, Armando Rocha, Denny Hoang…

    • 454 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    LAN-TO-WAN DOMAIN: A malicious web sites may be allowed access, malicious software may be downloaded, or firewalls are not configured properly; all of these can compromise a…

    • 614 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Information System Risks

    • 1562 Words
    • 7 Pages

    The realization of potential risks to an organizations information system has been increased in the past few years. The principles of risk management, vulnerabilities, internal threats, and external threats is the first step in determining which levels of security are necessary to protect and limit the risks to an organizations information system. This essay will describe the principles of risk management as they pertain to the information system and its associated technology of Professional Security Training School. Moreover, this essay will include an exploration of the vulnerabilities of their system, and specifically address the nature of potential internal and external threats, including natural or unintended events that can jeopardize the system. Finally, it will determine what levels of security are appropriate to secure the information system while allowing a maximum amount of uninterrupted workflow.…

    • 1562 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    safety. The paper looks at ICT security and safety within a company, the risks and…

    • 2313 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    The vulnerability of information systems is increasing as we move to a world of networked and especially wireless computing. Theoretically, there are hundreds of points in a corporate information system that can be subject to some threats. These threats can be classified as:…

    • 2074 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    IT320 Unit 1

    • 256 Words
    • 1 Page

    Layer 5 is the Session Layer. This layer establishes and monitors communication between two end devices. IT ensures both devices are talking to the application layer.…

    • 256 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    fresher

    • 432 Words
    • 2 Pages

    Troubleshooting issues based on user account with their respective resources & computer accounts related to Domain, IP assignment & their N/W connectivity.…

    • 432 Words
    • 2 Pages
    Satisfactory Essays