Preview

Threats and Vulnerabilities in IT Infrastructure

Satisfactory Essays
Open Document
Open Document
454 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Threats and Vulnerabilities in IT Infrastructure
Lab 1 Identify Threats and Vulnerabilities in IT Infrastructure

Denise Clark, Joseph Huiet, Anthony Brown, Orlando Rodriguez, Niko Budworth, Cory Mooney, Armando Rocha, Denny Hoang

Risk – Threat – Vulnerability
Primary Domain Impacted
Unauthorized access from public internet
WAN
User destroys data in application and deletes all files
System/Application
Hacker penetrates your IT infrastructure and gains access to your internal network
LAN
Intra-office employee romance gone bad
User
Fire destroys primary data center
LAN
Communication circuit outages
WAN
Workstation OS has a known software vulnerability
Workstation
Unauthorized access to organization owned
Remote Access
Workstations
Workstation
Loss of production data
WAN
Denial of service attack on organization e-mail Server
WAN
Remote communications from home office
Remote Access
LAN server OS has a known software vulnerability
LAN
User downloads an unknown e-mail attachment
User
Workstation browser has software vulnerability
Workstation
Service provider has a major network outage
WAN
Weak ingress/egress traffic filtering degrades Performance
LAN-to-WAN
User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers
User
VPN tunneling between remote computer and ingress/egress router
Remote Access
WLAN access points are needed for LAN connectivity
LAN
Need to prevent rogue users from unauthorized WLAN access
LAN
Lab 1 Part A List of Risks, Threats, and Vulnerabilities

Lab 1 Part B Assessment Questions
1. We chose the ‘User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers’ because, the USB device may contain malware allowing unauthorized access to the infected system.
2. User Domain: 2
Workstation Domain: 3
LAN Domain: 5
LAN-to-WAN Domain: 1
WAN Domain: 5
Remote Access Domain: 3
System/Application Domain: 1
3. The LAN and the WAN Domain had the greatest number of risks, threats, and vulnerabilities.
4.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 290 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    In the WAN domain, we need to make sure that we have firewalls set up on our network to filter all incoming traffic. A firewall will stop all traffic coming on to our system that is not meant or not wanted on the Richman Investments network.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The reason why the User Domain infrastructure is one of the most affected infrastructures is because the User Domain infrastructure is the infrastructure that allows users to access the network. This is a problem because many users do not fully understand everything, all the time and thus is bound to make a mistake sooner or later. With so many users on our network, this is probably the most vulnerable domain infrastructures in our network.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3110 Week3 Quiz

    • 347 Words
    • 2 Pages

    3. Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…

    • 347 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Dark Jerseys Group

    • 489 Words
    • 2 Pages

    Jessiman, Zachary Mongillo, Nicolas Fleck, Julien Christodoulou, Ethan Burton, Bradley Janardhanan, Haresh Johnston, Cade Sadat, Moumen Garlock, Zachary Yazdani, Cyrus Singh, Daniel…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab 2 Instructions

    • 389 Words
    • 2 Pages

    1. What vulnerabilities exist for the workgroup LAN listed above based on the advisories? List five of them. Explain what could happen to the LAN for each.…

    • 389 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Computers, and computer related storage media including hard drives, CD disks, DVD disks, flash drives, memory sticks, iPods, personal digital assistants (PDA), flash media, diskettes, and other magnetic, electronic, or optical media.…

    • 808 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Weln

    • 629 Words
    • 3 Pages

    Nikki Culver, Joel Dezelah, John Mulvaney, Dawn Walny, George Herrington, Jenifer Speckhard, Carmen Rowe, Dustin Sensabaugh…

    • 629 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Using removable devices on more than one computer creates the possibility of infecting computers and diskettes with a computer virus. This exposes the computers of the college, your personal computer, and any others you may be using to potentially damaging viruses. The college has aggressive anti-virus procedures in place to protect its computers, but cannot guarantee that a virus might not temporarily infect one of its machines. It is your responsibility to protect all computers under your control and use and ensure that each diskette you use, whenever or wherever you use it, has been scanned with anti-virus software. Since new viruses arise continually, your anti-virus software must be kept current. Moreover, since no anti-virus software will find every virus, keeping backup copies is extremely…

    • 3673 Words
    • 15 Pages
    Good Essays
  • Satisfactory Essays

    Title

    • 309 Words
    • 2 Pages

    2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure? / They all affect security and integrity of a network domain local.…

    • 309 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    * Scan all files and information contained on portable media and storage devices (such as DVDs, USB drives, floppy disks, etc.) for malware and malicious code prior to being used on any department information systems (such as laptops, PDAs, desktop computers, etc.).…

    • 932 Words
    • 4 Pages
    Better Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Best Essays

    Cultural Experience

    • 3266 Words
    • 14 Pages

    Arrendondo, P., Toporek, M. S., Brown, S., Jones, J., Locke, D. C., Sanchez, J., &…

    • 3266 Words
    • 14 Pages
    Best Essays
  • Good Essays

    Phl458

    • 818 Words
    • 3 Pages

    Adam Cavkic, Dan Lopez, Heba Hummusani, Lisa Lin, Sophia Salazar, Ursula Adams, Vivian Moran and Wes Spivey,…

    • 818 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Books Hunting

    • 5166 Words
    • 21 Pages

    Patricia M. Sias, Jolanta A. Drzewiecka, Mary Meares, Rhiannon Bent, Yoko Konomi, Maria Ortega, & Colene White…

    • 5166 Words
    • 21 Pages
    Powerful Essays