Assesment Lab #3: Assessment Worksheet Lab 3 1. What is the goal or objective of an IT risk management plan? - The purpose of the Risk Management Plan is to define how risks will be managed‚ monitored and controlled throughout the project. 2. What are the five fundamental components of an IT risk management plan? -The components of a Risk Management Plan are: Risk Identification‚ Risk Analysis‚ Risk Evaluation‚ Risk Monitoring and Review. 3. Define what risk planning is. - Risk planning
Premium Risk management Risk
IS3110 LAB 5 Identify Threats and Vulnerabilities in an IT Infrastructure 1. What are the differences between ZeNmap GUI (Nmap) and Nessus? NMAP is primarily a host detection and port discovery tool. Instead of using Nessus to look for specific vulnerabilities against a known quantity of hosts‚ NMAP discovers active IP hosts using a combination of probes. On the other hand Nessus takes the open ports into account and notifies you if these ports have potential security vulnerabilities attached
Premium IP address Computer security Security
Week 5 Laboratory Disaster Recovery Back-up Procedures and Recovery Instructions Learning Objectives and Outcomes Upon completing this lab‚ students will be able to: Relate how to lower RTO with properly documented back-up and recovery steps Understand the inversely proportional relationship between RTO and redundancy. Understand the process of defining IT system and application recovery procedures Understand the risks of using external e-mail as a backup and storage solution for production data
Free Backup Data loss Computer data storage
Chris Simmons August 21‚ 2014 IS3340 Egon Week 3 Lab 1. Enforce Password. This makes it so you cannot use the same password more than once or more than 10 times‚ etc. When you change your password‚ it cannot be the password you were just using. 2. No. This stores plaintext password. This can be a risk. It’s default “disabled”. 3. Store passwords using reversible encryption is required for certain remote access protocols. It is also required to VPN in most cases. 4. To be more secure‚ of
Premium Microsoft Windows Windows 7 Windows Vista
Lab #6: Assessment Worksheet 1. Why is it important to prioritize your IT infrastructure risks‚ threats‚ and vulnerabilities? Because you need to know which is most important and which is negligible. In some cases‚ protecting your infrastructure from a high priority threat is more important and so you may want to protect against that even if it leaves you vulnerable to low priority threats. This mainly just shows you which areas need your attention the most. 2. Based on your executive summary
Premium Risk management Risk Management
Lab 6 1. Why is it important to prioritize your IT infrastructure risks‚ threats‚ and vulnerabilities? It is important to prioritize because you must be aware of what the risks‚ threats‚ and vulnerabilities there are to your infrastructure. You need this so that you know where the most attention needs to be focused on. 2. Based on your executive summary produced in Lab #4 Perform a Qualitative Risk Assessment for an IT infrastructure‚ what was the primary focus of your message to executive
Premium Risk management Risk Security
installed on servers and takes it to the next level. It analyzes the ports and looks for potential security issues 2. Which scanning application is better for performing a network discovery Reconnaissance probing of an IP Network infrastructure? NMap 3. Which scanning application is better for performing a software vulnerability assessment with suggested remediation steps? Nessus 4. How many total scripts does the Intense Scan using ZenMap GUI perform? Runs 36 Scripts 5. From the Zen Map GUI
Premium IP address Internet Protocol Web server
information (PHI) privacy data. This includes security controls for the IT infrastructure handling PHI privacy data. Which one of the listed risks‚ threats‚ or vulnerabilities can violate HIPPA privacy requirements? List one and justify and justify your answer in one or two sentences. a. Hacker penetrates your IT infrastructure and gains access to your internal network. If a hacker gains access to your network‚ they will potentially have access to patient files or other sensitive information that is
Premium Computer security Risk Security
Lab #3: Worksheet Configure Windows File System Permissions Student Name: _____________________________________________________________ Lab Due Date: April 10‚ 2015 If you may work in groups to complete this lab. Folder Structure Drawing You are asked to draw a folder structure that meets the scenario’s requirements. You may draw the structure on paper‚ use Visio or another drawing program. If you draw the structure on a separate sheet of paper‚ turn this in to your instructor. If you use Visio
Free File system File system permissions
------------------------------------------------- Week 3 Laboratory How to Identify Threats & Vulnerabilities in an IT Infrastructure Using ZeNmap GUI (Nmap) & Nessus Reports Learning Objectives and Outcomes Upon completing this lab‚ students will be able to: 1. Understand how risk from threats and software vulnerabilities impacts the seven domains of a typical IT infrastructure 2 Review a ZeNmap GUI (Nmap) network discovery
Premium Risk Vulnerability Graphical user interface