Preview

IS3110 U1L1

Powerful Essays
Open Document
Open Document
1084 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3110 U1L1
IS3110 Lab Student Name:
Submission Requirements
Your last name must be in the filename of your submitted document according the assignment naming standard. IS3110_UL1_Firstname_Lastname
Email to: SMichnick@itt-tech.edu
Due By: 6:00 PM CDT, Wednesday June 25, 2014
Note: Emails received after Due Date Due Date will be marked LATE and subject to a grade of 0 for the assignment.
Pages 3-10 of the IS3220 Student Lab Manual
Lab #1 – Part A – List of Risks, Threats, and Vulnerabilities Commonly Found in an IT Infrastructure

Overview
The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing patients with life-threatening situations. Given the list, select which of the seven domains of a typical IT infrastructure is primarily impacted by the risk, threat, or vulnerability.

Risk – Threat – Vulnerability
Primary Domain Impacted
Unauthorized access from public Internet
Remote Access Domain
User destroys data in application and deletes all files
System App Domain
Hacker penetrates your IT infrastructure and gains access to your internal network
Lan to Wan Domain
Intra-office employee romance “gone bad”
User Domain
Fire destroys the primary data center
System App Domain
Communication circuit outages
Wan Domain
Workstation OS has a known software vulnerability
Workstation Domain
Unauthorized access to organization owned Workstations
Workstation or End point Domain
Loss of production data
System App Domain
Denial of service attack on organization e-mail server
System App Domain
Remote communications from home office
Remote access Domain
LAN server OS has a known software vulnerability
Lan Domain
User downloads an unknown e –mail attachment User Domain
Workstation browser has software vulnerability
Workstation Domain
Service provider has a major network outage
Wan Domain
Weak ingress/egress traffic filtering degrades performance
Lan to Wan
User inserts CDs and USB hard drives with personal photos, music, and videos on

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Type the answers to the assignment questions below. Use complete sentences unless the question says otherwise. You will have more than one day to complete an assignment. At the end of each day, be sure to save your progress.…

    • 528 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lol lots of loling

    • 2208 Words
    • 10 Pages

    DO NOT WAIT until the last minute for this assignment. It will be impossible to complete in a short amount of time.…

    • 2208 Words
    • 10 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3110 U7L1

    • 1068 Words
    • 7 Pages

    Note: Emails received after Due Date Due Date will be marked LATE and subject to a grade of 0 for the assignment.…

    • 1068 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Part A - Risks, Threats, & Vulnerabilities in the Seven Domains of a Typical IT Infrastructure…

    • 900 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    2015 S1 Assignment

    • 633 Words
    • 3 Pages

    Due Date: The week beginning the 11th of May, 2015. The completed assignment must be submitted to your lecturer during your scheduled seminar.…

    • 633 Words
    • 3 Pages
    Good Essays
  • Good Essays

    LAN-TO-WAN DOMAIN: A malicious web sites may be allowed access, malicious software may be downloaded, or firewalls are not configured properly; all of these can compromise a…

    • 614 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Application of Security

    • 1506 Words
    • 7 Pages

    You are reviewing the security status for a small Microsoft workgroup LAN. The workgroup contains many distinct separations in the network determined by group memberships. An example of the network divisions is as follows:…

    • 1506 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    Denise Clark, Joseph Huiet, Anthony Brown, Orlando Rodriguez, Niko Budworth, Cory Mooney, Armando Rocha, Denny Hoang…

    • 454 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Information System Risks

    • 1562 Words
    • 7 Pages

    The realization of potential risks to an organizations information system has been increased in the past few years. The principles of risk management, vulnerabilities, internal threats, and external threats is the first step in determining which levels of security are necessary to protect and limit the risks to an organizations information system. This essay will describe the principles of risk management as they pertain to the information system and its associated technology of Professional Security Training School. Moreover, this essay will include an exploration of the vulnerabilities of their system, and specifically address the nature of potential internal and external threats, including natural or unintended events that can jeopardize the system. Finally, it will determine what levels of security are appropriate to secure the information system while allowing a maximum amount of uninterrupted workflow.…

    • 1562 Words
    • 7 Pages
    Better Essays
  • Powerful Essays

    safety. The paper looks at ICT security and safety within a company, the risks and…

    • 2313 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    IT320 Unit 1

    • 256 Words
    • 1 Page

    Layer 5 is the Session Layer. This layer establishes and monitors communication between two end devices. IT ensures both devices are talking to the application layer.…

    • 256 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    The vulnerability of information systems is increasing as we move to a world of networked and especially wireless computing. Theoretically, there are hundreds of points in a corporate information system that can be subject to some threats. These threats can be classified as:…

    • 2074 Words
    • 8 Pages
    Good Essays
  • Satisfactory Essays

    Bachloor

    • 302 Words
    • 2 Pages

    Reminder: Late assignment/project will be reduced at least one letter grade per class day at the discretion of the instructor.…

    • 302 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    fresher

    • 432 Words
    • 2 Pages

    Troubleshooting issues based on user account with their respective resources & computer accounts related to Domain, IP assignment & their N/W connectivity.…

    • 432 Words
    • 2 Pages
    Satisfactory Essays