Jonathan Abreu IS3110 Risk Management in Information Security Unit 6 Lab 1 Develop a Risk Mitigation Plan Outline for an IT Infrastructure Lab Assessment Questions & Answers 1. Why is it important to prioritize your IT infrastructure risks‚ threats‚ and vulnerabilities? It is important to because you must be aware of what the risks‚ threats‚ and vulnerabilities are to your infrastructure. You need this so that you know where to focus your attention. 2. Based on your executive summary produced in
Premium Risk management Risk Management
1. a. Unauthorized access from public internet - HIGH b. User destroys data in application and deletes all files - LOW c. Workstation OS has a known software vulnerability – HIGH d. Communication circuit outages - MEDIUM e. User inserts CD’s and USB hard drives with personal photos‚ music and videos on organization owned computers - MEDIUM 2. a. PO9.3 Event Identification – Identify threats with potential negative impact on the enterprise‚ including business‚ regulatory‚ legal‚ technology
Premium Risk Risk management Security
Week 2 Assignment Ronald Horne IS3110 5/10/2015 Before agreeing to the contract I would like to outline some risks that goes with this current project. I will address the concerns by showing you the qualitative and the quantitative risks Quantitative Risk Assessment Overview. The penalty of $100‚000.00 per month after the 9 month deadline is my first risk. If the project is two months behind schedule it will cost us over $200‚000.00 if we are to include the cost of labor. After month 3
Premium Risk assessment Risk Computer security
IS3110 Risk Management in Information Technology Security STUDENT COPY: Graded Assignments © ITT Educational Services‚ Inc. All Rights Reserved. -73- Change Date: 05/25/2011 Unit 1 Assignment 1: Application of Risk Management Techniques Learning Objectives and Outcomes You will be able to identify different risk management techniques for the seven domains of a typical IT infrastructure and apply them under different situations. Assignment Requirements Introduction: As discussed in this
Premium Management PCI DSS Microsoft Word
Is3110 Quiz 4 Quiz 4 Questions 1. How often should RA be completed? a. Frequently/as needed b. Once a year/as needed c. Every three years d. Whenever you hire a new employee 2. Which of the following is not a step in the RA process? a. Selecting a risk assessment methodology b. Identifying and evaluating relevant vulnerabilities c. Presenting risk assessment results d. Maintaining FERPA compliance 3. Which of the following is not a step in the RA process? a. Identifying the hazards
Premium Risk Risk management Management
IS3110: Unit 1 Role Scenario 1) Identify threats to the seven domains of IT within the organization: A. User: Destroy data B. Workstation: Loss of data‚ not updated C. LAN: Unauthorized user‚ weak password D. LAN –WAN: Hackers‚ weak traffic filtering E. WAN- FTP anon uploads‚ DoS/DDoS F. System Application: Fire‚ DoS/DDoS‚ SQL injection corrupting data G. Remote: user virus‚ remote from office unsecure‚ VPN tunnel hack 2) Identify vulnerabilities in the seven domains of IT within the organization
Premium Computer security Security Risk
Robert Jones Unit 5 Discussion: Risk Mitigation Control 7/15/2014 IS3110 Mr. Jackson When it comes to risk management‚ risk mitigating controls are the key to reducing threats to the network infrastructure. These mitigating controls can be found within standards‚ such as ISO/IEC 27001‚ and suggest measures to take in order to reduce risk to an organization’s assets. It is important to understand what each of these controls are in regards to risk management as well as the types of assessments
Premium Risk management Protection Risk assessment
Keith Miller IS3110 Week 3 Risk Mitigation Plans 1. Why is it important to prioritize your IT infrastructure risks‚ threats‚ and vulnerabilities? It is important to prioritize because you must be aware of what the risks‚ threats‚ and vulnerabilities are to your infrastructure so that you know where the most attention is needed to make the 2. A quality IT Risk Mitigation Plan will include details on costs‚ risk prioritization‚ and accompanying schedule. For risk prioritization‚ what
Premium Term Risk management Finance
IS3110 Week 2 Home Work To be in compliance with the PCI DSS Compliance Yield more must do the following Build and maintain a secure network‚ Protect cardholder data‚ Maintain a vulnerability management program‚ Implement strong access control measures‚ Regularly monitor and test networks‚ Maintain an information security policy. To remained in compliance of the PCI DSS Compliance I am recommends the following for the control objective of Build and maintain a secure network- I am recommends
Premium Computer security Security PCI DSS
IS3110 Unit 3 Discussion 1: Risk Management Process During our discussion we all agreed that the first step taken in the risk management process is the most important. Risk identification allows an organization to identify risks and vulnerabilities so that the operations staff becomes aware of potential problems. Not identifying risks can have drastic‚ costly‚ and even deadly consequences Not only should risk identification be undertaken as early as possible‚ but it also should be repeated frequently
Premium Risk Risk management Management