Preview

Student Lab ManualLab 9 Assessment WorksheetPart

Powerful Essays
Open Document
Open Document
900 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Student Lab ManualLab 9 Assessment WorksheetPart
Student Lab Manual

Lab #9 -Assessment Worksheet

Part A - Risks, Threats, & Vulnerabilities in the Seven Domains of a Typical IT Infrastructure

Overview

For each of the identified risks, threats, and vulnerabilities -review the following chart to determine which domain from the seven domains of a typical IT infrastructure is impacted.

Risk - Threat - Vulnerability
Primary Domain Impacted
Unauthorized access from public Internet

User destroys data inapplication and deletes all files

Hacker penetrates your IT infrastructure and gains access to your internal network

Intra-office employee romance gone bad Fire destroys primary data center Communication circuit outages

Workstation OS has a known software vulnerability

Unauthorized access to organization owned Workstations

Loss of production data

Denial of service attack on organization e-mail Server

Remote communications from home office

LAN server OS bas a known software vulnerability

User downloads an unknown e -mail attachment

Workstation browser bas software vulnerability Service provider has a major network outage

Weak ingress/egress traffic filtering degrades Performance

User inserts CDs and USB bard drives

with personal photos, music, and videos on organization owned computers

VPN tunneling between remote computer and ingress/egress router

WLAN access points are needed for LAN connectivity

within a warehouse

Need to prevent rogue users from unauthorized WLAN access

Lab #9 -Assessment Worksheet

Part B – Sample IT Security Policy Framework Definition

Overview

Given the following IT security policy framework definition, specify which policy probably can cover the identified risk. threat, or vulnerability. If there is none, then identify that as a gap. Insert your recommendation for an IT security policy that can eliminate the gap. See handout provided by instructor.

...A..s..se..t,,... l'<liley Staacbrck Standards

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Pt1420 Unit 6 Lab Answers

    • 508 Words
    • 3 Pages

    Note: the analysis #1 a) and b) will only be demonstrated on the graphs of trial 1 for this report, trial 2-5 have approximately the same results.…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Lab And Assignment

    • 311 Words
    • 2 Pages

    Complementary Metal Oxide Semiconductor, or CMOS, is a widely used type of semiconductor. CMOS semiconductors use both NMOS(negative polarity) and PMOS(positive polarity) circuits. Since only one of the circuit types is on at any given time, CMOS chips require less power than chips using just one type of transistor. This feature makes them convenient for use in battery-powered devices such as laptops. Personal computers also contain a small amount of battery-powered CMOS memory to hold the date, time, and the system setup parameters. To access the CMOS on most computers, press the delete key as the computer is booting.…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab10 worksheet

    • 1151 Words
    • 5 Pages

    Will the Group Policy settings you configure in your new GPO have an immediate effect on your network? Why?…

    • 1151 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Lab Module 1

    • 808 Words
    • 4 Pages

    K. Stage knobs or clips – secures and adjusts the slides position on the stage…

    • 808 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    17. Which of the following is not a part of an ordinary IT security policy framework?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab Question Answers 02

    • 415 Words
    • 1 Page

    They find many clues that the body wasn’t actually that of Cora and also signs that Crippen may not have committed the crime.…

    • 415 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    NT2580 Final Study Guide

    • 1423 Words
    • 6 Pages

    -Closing Security Gaps - A laps in a security control in a policy creates a gap.…

    • 1423 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Module 01 Lab Worksheet

    • 2406 Words
    • 11 Pages

    This week’s lab will focus on reviewing the concepts of anatomical terminology, metric conversion and genetics, specifically the concept of dominant and recessive alleles in a human pedigree.…

    • 2406 Words
    • 11 Pages
    Good Essays
  • Good Essays

    Is 305 Week 3 Quiz

    • 577 Words
    • 3 Pages

    Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    5. OpenSSH is the de facto method to remotely access Linux systems. Explain why the use of telnet is discouraged.…

    • 316 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Title

    • 309 Words
    • 2 Pages

    2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure? / They all affect security and integrity of a network domain local.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    I would like to start off by saying that there are various threats when discussing about computer security the word threat would mean something that can indicate a danger when in relation to computer security. In this task I will be showing the Malicious damage, counterfeit goods, (software/hardware) human errors, phishing and hacking, theft of equipment, threats related to e – commerce and technical failure.…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Uml Lab Manual

    • 2876 Words
    • 12 Pages

    Lab Description: The Unified Modeling Language (UML) is a visual modeling language that enables system builders to create blueprints that capture their visions in a standard, easy-to-understand way, and provides a mechanism to effectively share and Communicate these visions with others. The purpose of the diagrams is to present multiple views of a system; this set of multiple views is called a model. UML model describes what a system is supposed to do. It doesn’t tell how to implement the system.…

    • 2876 Words
    • 12 Pages
    Good Essays
  • Better Essays

    Describe any four (4) threats to information security and explain any two (2) methods of defense mechanism used to protect information systems.…

    • 1958 Words
    • 8 Pages
    Better Essays