Preview

Week 3

Satisfactory Essays
Open Document
Open Document
412 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 3
Keith Miller
IS3110
Week 3
Risk Mitigation Plans

1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities? It is important to prioritize because you must be aware of what the risks, threats, and vulnerabilities are to your infrastructure so that you know where the most attention is needed to make the 2. A quality IT Risk Mitigation Plan will include details on costs, risk prioritization, and accompanying schedule. For risk prioritization, what influence would the industry your organization operates in have on prioritizing your identified risks, threats, and vulnerabilities? Different companies have different priorities, what might be important to one organization might be minimal to other organizations. For example, a medical facility would have different prioritizations than a lawyer’s office. 3. What questions would you bring to executive management prior to finalizing your IT risk mitigation plan? 4. What is the difference between short-term and long-term risk mitigation tasks and on-going duties? Short-term are risks that can be fixed rapidly and will (more than likely) not have long term effects on the company, long term risks are risks that can end in fines if they involve compliance issues. On-going duties are the daily duties that must be done in order for the company to perform with minimal risks. 5. Which of the seven domains of a typical IT infrastructure is easy to implement risk mitigation solutions but difficult to monitor and track effectiveness? Of the seven domains, in my opinion, the remote access domain is the easiest to implement solutions for but more difficult to monitor and track effectiveness. 6. When considering the implementation of software updates, software patches, and software fixes, why must you test this upgrade or software patch before you implement this as a risk mitigation tactic? Because you must first see if the software update, software patches, and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    The step, that I believe is the most important in the risk management process, is vulnerability identification. A vulnerability is a weakness in the infrastructure or environment of the network. Any weakness can be exposed (exploited) and threatened. If vulnerabilities are not identified, then how can the Security Administrator properly set security policies and guidelines in place to protect the network? If he/she doesn’t know of the vulnerabilities, then they will never put things in place until some threat occurs to the network. Network vulnerabilities come in many forms and fashions, and must be identified to be properly mitigated.…

    • 167 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    To develop network security strategies that will ensure that the organization's network is protected from both internal and external security risks. A summary of the steps I can take to mitigate the risk in the following areas: Denial-of-Service attacks (DoS), Distributed Denial-of-Service attacks (DDoS), Masquerading and IP Spoofing, Smurf attacks, Land.c attacks, Man-in-the-Middle attacks.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    After the risks have been evaluated in terms of likelihood of occurrence and consequences, and when options for risk management have been reviewed, that’s when I will rank the risks and inform the program manager of the assign priorities.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The focus of the risk management plan is to provide an ongoing, comprehensive, and systematic approach to reducing risk exposures. Risk management activities include identifying, investigating, analyzing, and evaluating risks, followed by selecting and implementing the most appropriate methods for correcting, reducing, managing, transferring and/or eliminating them.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    ACCT 301 Week2 Homework

    • 527 Words
    • 3 Pages

    b. Risk assessment: this just means they check there controls for weaknesses regularly and fix any discrepancies with stronger controls.…

    • 527 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    4. What tasks and deliverables are needed to implement your risk mitigation recommendations? Pick one of the seven domains of a typical IT infrastructure and answer uniquely.…

    • 960 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IS3110 Risk Management

    • 663 Words
    • 3 Pages

    2. A quality IT Risk Mitigation Plan will include details on costs, risk prioritization, and accompanying schedule. For risk prioritization, what influence would the industry your organization operates in have on prioritizing your identified risks, threats, and vulnerabilities?…

    • 663 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Discuss how the values for threat and vulnerability combine to indicate the overall risk the organization faces.…

    • 627 Words
    • 4 Pages
    Satisfactory Essays
  • Better Essays

    NT2580 Graded Assignments

    • 5288 Words
    • 22 Pages

    I have correctly matched all the risks or threats within the seven domains of a typical IT infrastructure with the solutions and preventative actions.…

    • 5288 Words
    • 22 Pages
    Better Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    10. In order to craft back-up and recovery procedures, you need to review the IT systems, hardware, software and communications infrastructure needed to support business operations, functions and define how to maximize availability. This alignment of IT systems and components must be based on business operations , functions, and prioritizations. This prioritization is usually the result of a risk assessment and how those risks, threats, and vulnerabilities impact business operations and functions. What is the proper sequence of development and implementation for these following plans?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing patients with life-threatening situations. Given the list, select which of the seven domains of a typical IT infrastructure is primarily impacted by the risk, threat, or vulnerability.…

    • 404 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    student

    • 287 Words
    • 1 Page

    6. When considering the implementation of software updates, software patches, and software fixes, why must you test this upgrade or software patch before you implement this as a risk mitigation tactic? To make sure they work as promised and don’t leave open vulnerabilities…

    • 287 Words
    • 1 Page
    Good Essays
  • Good Essays

    management Issues

    • 14004 Words
    • 56 Pages

    If you’re a working IT manager, paid to build a secure system, you will by now be…

    • 14004 Words
    • 56 Pages
    Good Essays

Related Topics