Preview

Lab 4 Questions IS3110

Satisfactory Essays
Open Document
Open Document
398 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Lab 4 Questions IS3110
1. The goal or objective of an IT risk assignment is to remove a hazard or reduce the level of its risk by adding precautions or control measures, as necessary.
2. The reason why it’s so hard to conduct a qualitative risk assessment is because no one is going to take the time to take the value of everything in the company, the greatest valued items half to be discussed with someone usually in a higher power, and it is hard to tell what has the most valued risk at that time in the company due to changes in the company.
3. In regards to assigning “1” risk impact/risk factor value of “critical” for an identified risk, threat, and vulnerability is the cost of total loss of hardware for both primary and backup systems for data for the entire company.
4. I prioritized the 1, 2, and 3 risk elements by greatest impact to the company for both a cost value and for the means to get the company back to working order. What I would say to an executive is that the cost of value to your company is greatest when your system is compromised on hardware that has the most valued data within the company and when backup is down long enough to the point of no return.
5. Identify risk mitigation solutions
User downloads and clicks on an unknown e-mail attachment: Effective email attachment filtering and restrictions reduce the likelihood of malicious content entering the network.
Workstation OS has a known software vulnerability: either update the software or find other software that works
Need to prevent eavesdropping on WLAN due to costumer privacy data access: protect against monitoring software, know what devices are present on your network and their software, and use encryption.
Weak ingress/egress traffic filtering degrades performance: VPN tunneling between remote computer and ingress/egress router is needed, and WLAN access points for LAN connectivity.
DoS/DDoS attack from the WAN/Internet: buy more bandwidth, denial of service, and good load balancing.
Remote access from home

You May Also Find These Documents Helpful

  • Better Essays

    Is3350 Final Exam

    • 1039 Words
    • 5 Pages

    Rationale: The client should focus on a distant object in order to promote pupil dilation. The ophthalmoscope should be set on the 0 lens to…

    • 1039 Words
    • 5 Pages
    Better Essays
  • Best Essays

    Falk, M. (2004). “Fast and Secure Roaming in WLAN”, Department of Computer and Information Science.…

    • 1489 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    IS3220 Final Exam

    • 700 Words
    • 4 Pages

    7. Personnel should be authenticated and authorized prior to being granted access to company’s information resources. This statement is an example of ________________?…

    • 700 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    Team B has been commissioned to examine the Kudler Fine Foods’ (KFF), frequent shopper, Customer Loyalty Program that is currently in development. The team has also been asked to direct the system development team to ensure the system is established securely so that it properly protects company data and customer information throughout all stages of the system development process. In week 2, the team will examine the Customer Loyalty Program for vulnerabilities in different areas of the system. The study will define the possible threats that exist to the security of the organization’s and the customers’ data and information, the potential vulnerabilities each threat may exploit, and area of the system affected by the threats. Additionally, a summary of the most critical threats to Kudler’s Customer Loyalty Program will be provided.…

    • 745 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    For the LAN domain, inform employees about email scams. Most users know not to open emails when on our system. Spam filters can help control junk email, so there is less risk of opening emails containing malware.…

    • 337 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    All workstations will be hard wired directly to the network. Any laptop will be connect via a cloaked wifi network. This means it will display no SSID and only allow certain MAC address access to it. WPA 2 encryption will be used with a password system similar to what is covered in the security awareness section. All server rooms will have keycard access to allow only IT access to them.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the WAN domain, enforce encryption, and VPN tunneling for remote connections. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service attacks. Deployment of…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    week 8 WLAN checkpoint

    • 287 Words
    • 2 Pages

    Another way to protect your WLAN is with WPA (WI-FI Protected Access). WPA is an upgrade to the WEP(Wired Equivalent Privacy). WEP regulates access to wireless network through a devices hardware-specific MAC address.…

    • 287 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Everyone wants privacy in their life and they often secure their things from others but what about your WIFI connection?…

    • 367 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    ISSC 363 Week 2 Quiz

    • 320 Words
    • 2 Pages

    What would you most commonly do to reduce the potential risk from a threat/vulnerability pair?…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3120 Week 5 Lab

    • 914 Words
    • 3 Pages

    Prior to implementation we’ll need to see what kind of network the campus would need. The requirements of the campus call for an infrastructure network, as ad-hoc is merely computer to computer, but the requirements call for wireless access to the campuses internal network and provide access to the internet. Next to that we’ll need to identify what speed/capabilities the network will need to provide. Seeing how the campus has thousands of students as well as the admin and faculty, there is probably a need for strong wireless capabilities and so I recommend a 802.11g. You also need to identify security issues and ensure they’re implemented before putting the network online; this is to ensure there is no weakness in the network from the start.…

    • 914 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Week 3

    • 412 Words
    • 2 Pages

    2. A quality IT Risk Mitigation Plan will include details on costs, risk prioritization, and accompanying schedule. For risk prioritization, what influence would the industry your organization operates in have on prioritizing your identified risks, threats, and vulnerabilities? Different companies have different priorities, what might be important to one organization might be minimal to other organizations. For example, a medical facility would have different prioritizations than a lawyer’s office.…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    1.3 Explain what risk assessment is and how this is managed in the work setting…

    • 1959 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Manage Risk

    • 6382 Words
    • 19 Pages

    d) Risk capacity: The amount a business is capable of loosing before it endangers its own sustainability…

    • 6382 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    A risk assessment is an important step in which protects a business, employers and employees, as well as complying with the law. This helps to focus on the risks that have the potential to cause harm in a workplace. When thinking of ways how to control risks it can be a straightforward and simple process, for an example ensuring spillages are cleaned up quickly and effectively, so people do not slip. Risk assessments are simply a careful examination of what, in a work setting could cause harm to people. In order to weigh up whether you have taken enough precautions or should do more to prevent harm.…

    • 3026 Words
    • 13 Pages
    Powerful Essays