Lab Assessment Questions & Answers
The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing patients with life-threatening situations. Given the list, select which of the seven domains of a typical IT infrastructure is primarily impacted by the risk, threat, or vulnerability.
Risk – Threat – Vulnerability
Primary Domain Impacted
Unauthorized access from public Internet
WAN
User destroys data in application and deletes all files
Workstation
Hacker penetrates your IT infrastructure and gains access to your internal network
LAN
Fire destroys primary data center
System Application
Communication circuit outages
LAN to WAN
Workstation OS has a known software vulnerability
Workstation
Unauthorized access to organization owned Workstations
LAN
Denial of service attack on organization e-mail
Server
System Application
Remote communications from home office
Remote Access
LAN server OS has a known software vulnerability
LAN
User downloads an unknown e –mail attachment LAN
Workstation browser has software vulnerability
User
Service provider has a major network outage
WAN
User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers
Workstation
VPN tunneling between remote computer and ingress/egress router
Remote access
WLAN access points are needed for LAN connectivity within a warehouse
LAN to WAN
Given the scenario of a healthcare organization, answer the following assessment questions from a risk management perspective:
1 Of the listed risks, threats, and vulnerabilities identified in the table above, which one requires a disaster recovery plan and business continuity plan to maintain continued operations during a catastrophic outage? The one threat that would require a DRP or a BC would have to be if a fire destroyed the primary data center.
2 Which domain represents the greatest risk and uncertainty to an organization?
The domain with the greatest