Denise Clark, Joseph Huiet, Anthony Brown, Orlando Rodriguez, Niko Budworth, Cory Mooney, Armando Rocha, Denny Hoang
Risk – Threat – Vulnerability
Primary Domain Impacted
Unauthorized access from public internet
WAN
User destroys data in application and deletes all files
System/Application
Hacker penetrates your IT infrastructure and gains access to your internal network
LAN
Intra-office employee romance gone bad
User
Fire destroys primary data center
LAN
Communication circuit outages
WAN
Workstation OS has a known software vulnerability
Workstation
Unauthorized access to organization owned
Remote Access
Workstations
Workstation
Loss of production data
WAN
Denial of service attack on organization e-mail Server
WAN
Remote communications from home office
Remote Access
LAN server OS has a known software vulnerability
LAN
User downloads an unknown e-mail attachment
User
Workstation browser has software vulnerability
Workstation
Service provider has a major network outage
WAN
Weak ingress/egress traffic filtering degrades Performance
LAN-to-WAN
User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers
User
VPN tunneling between remote computer and ingress/egress router
Remote Access
WLAN access points are needed for LAN connectivity
LAN
Need to prevent rogue users from unauthorized WLAN access
LAN
Lab 1 Part A List of Risks, Threats, and Vulnerabilities
Lab 1 Part B Assessment Questions
1. We chose the ‘User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers’ because, the USB device may contain malware allowing unauthorized access to the infected system.
2. User Domain: 2
Workstation Domain: 3
LAN Domain: 5
LAN-to-WAN Domain: 1
WAN Domain: 5
Remote Access Domain: 3
System/Application Domain: 1
3. The LAN and the WAN Domain had the greatest number of risks, threats, and vulnerabilities.
4.