Preview

IS3110

Satisfactory Essays
Open Document
Open Document
382 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3110
IS3110
Unit 1 Assignment 1: Application of Risk management Techniques
Threats, Vulnerabilities and like hood of occurrence. Does not include fire suppresion or tornado fail over site on case of a nature disaster like a tornado. Offices are on a state that has a high risk of tornados. Occurrence High.
Does not have any backup solution. We need at least a in house backup and outside backup solution in case of a disaster Occurrence high.
Not redundancy. If primary site is down all the business is down. Occurrence low.
Lack of security access using VPN to HQ from home offices, Occurrence Low.
Workstations are outdated and not support on windows vista. Occurrence high.
Not antivirus defined on the servers and workstations. Occurrence high
Risk Management Techniques and justification.
Avoidance
Prevent user to do not connect via VPN connections from Home Offices.
Move important servers and Data to a datacenter outside of the tornado alley.
Transfer
Fire insurance will be the best option to protect the assets.
Mitigation
Install a backup service that will provide onsite and off-site backup solution for all data on the servers.
Install a backup site in case if the primary site is down.
Install newer workstations with windows 7 for support on windows updates.
Install antivirus software on workstations and workstations.
Acceptance
Cost Benefit Analysis will be perform on new workstations vs taking the risk of keeping outdated equipment.
Residual Risk
Installing antivirus on workstations will lessen the chance of infections from virus but it will not completely eliminate.
Report
After reviewing the threats and vulnerabilities for your business, our team recommends the following steps. Firstly, serious consideration needs to be given to moving your primary data center out of “Tornado Alley”. The weather in this area has been shown to be unpredictable and dangerous in the extreme. Secondly, the buildings need basic fire suppression systems. There

You May Also Find These Documents Helpful

  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    To assess risks and vulnerabilities with the operating IT facilities we must create a mitigation plan. The mitigation plan will ensure what actions or steps to take when a risk were to occur. If the company were to experience risk such as fire, users outages, remote access, opening unknown e-mail attachment or have equipment failure, the mitigation plan will let you know…

    • 622 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Is3110 Unit 4

    • 406 Words
    • 2 Pages

    If the project is completed on time then there is no risk for completion. All of the regular risks that apply to a project built on time apply to this one regardless of whether you are building a new infrastructure or modifying an older one. If the project is finished one month early, the quantitative risk really does not exist. It is basically comparable to completing the project on time. Since the project is quoted at 3 million dollars it will stay the same regardless of how fast the project is finished. However, you may see differences. When you rush a project this large you could possibly cut corners or receive poor quality results. If the project is finished two months late there are additional risks. If the company expects to make $20 million dollars annually, and assuming that the 4% penalty is levied against this yearly figure and not within smaller period of time, one month late means that US Industries Incorporated loses $800,000 annually. There doesn't appear to be any additional risk, however, further penalties and the possible eventual loss of the contract to a competitor could result in a poor product. There again appears to be no real quantitative risk involved if the project is finished a month early with the security requirements. If the originally quoted $3 million dollars remains the same regardless of how fast the project is finished and not coupled with hourly or daily wages, then there is nothing to lose financially. However the companies go beyond the required 1.5% completion benchmarks that the contract demands. Rushing a project of this scale also comes with rushed results possibly cut corners or poor quality. The credibility of the company is at stake with such a high profile, high income project such as this, and it is important to use all of the time available to ensure the best product is on display for any customer. The finished project should meet both the time and security requirements but not the service agreement. There does not…

    • 406 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Equipment failure-no backup’s setup. This is another vulnerability that can be avoided by performing regular backups and keeping them at an offsite location.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3120 Ass 1

    • 330 Words
    • 2 Pages

    The Johnson Company will be able to reach out to its customers by basically creating a good “Web Page” where customers will be able to find all of their products and also pay online and order online. In addition orders will not be taken by hand anymore but online orders will be the main method used to order networking products.…

    • 330 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    IS3350

    • 588 Words
    • 3 Pages

    The potential user groups and users of WLAN in a school environment would be District office and administration can streamline procedures. Classroom applications can track each student’s progress to facilitate reporting, provide up-to-date student information on hand held computers, respond to emergency situations, and handle disciplinary incidents, security enforcement, and parent communications. IT department can optimize performance and cost savings. WLANs can accommodate rapid expansion, which is particularly important for schools using mobile classrooms, which can make wiring very challenging. WLANs are also more economical than traditional wired connections, especially where wired connections would be prohibitively difficult like, schools that have no space for computer labs or that anticipate future renovations that would require rewiring in classrooms. Teachers can be more proactive and accessible. WLAN access increase interaction between teacher and students; complement classroom instructions with online applications including digital whiteboards and online testing; real time access to administrative resources and design curricula that better meets individual learning styles Students can learn more efficiently. WLAN provides the opportunity for more free flowing collaboration among peers, with teachers and digital resources and the Internet. While higher education deployments focus broadly on delivering high-performance, pervasive wireless coverage across large campus environments, K-12 schools with tighter budgets and limited IT resources tend to deploy wireless to support specific mobility applications, such as mobile carts, wireless IP telephony, video surveillance, mobile classrooms, and so on. In order to support these and other emerging wireless applications for example, educational videos, location tracking, and cafeteria point-of-sales systems, schools need a wireless infrastructure that can deliver reliable performance in dynamic, high-density…

    • 588 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    This disaster plan was put together to try and protect valuable information should it be attacked by hackers or threatened by a natural disaster. As this company grows, so will the value of the network and the information it retains. We want to ensure to the customer and the employee that this information is safe and not vulnerable to an attack. This plan was devised to help protect against failures such as the complexity of the system, accidental failure or a breech by hostile intent.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    Week3 Hacking

    • 391 Words
    • 2 Pages

    Workstation and Desktop devices are prone to viruses, malware, and malicious software, especially if the user surfs the Internet and World Wide Web. Given that users connect to the Internet and World Wide Web, what security countermeasures can organization implement to help mitigate the risk caused from viruses, malware, and malicious software?…

    • 391 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    FXT2 Task 1

    • 1206 Words
    • 7 Pages

    -- Document all hardware associated with ECP/DRP and its readiness as well keep ECP/DRP up to date.…

    • 1206 Words
    • 7 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3440

    • 534 Words
    • 3 Pages

    In this lab, you practiced properly securing a Linux server system. You performed the steps to secure the bootloader, enable iptables, and run SELinux to help lock down the Linux OS. You also applied ACLs to directories and files to secure file and data access and then checked those ACLs and permissions on the system.…

    • 534 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Unit 8 Assignment 1

    • 509 Words
    • 3 Pages

    For safety backups should be stored off site because you could lose everything this will allow you to have the information off-site to be retrieved at a later date.…

    • 509 Words
    • 3 Pages
    Good Essays
  • Good Essays

    is3110 lab 1

    • 626 Words
    • 3 Pages

    User inserts CD’s and USB hard drives with personal photos, music, and videos on organization owned computers…

    • 626 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Create daily incremental backups of data, and have back up equipment ready to be installed…

    • 341 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    CMGT/430 Week 4

    • 622 Words
    • 3 Pages

    As a consultant for the company, I would recommend they invest in Universal File Access (UFA). UFA, developed by NTP Software, is technology that integrates with common storage hosts, cloud, and object stores to make an organization’s file data available to end users on any device consistent with its active directory security and other policies. What separates it from consumer-oriented “sync and share” products is that UFA is an end-to-end enterprise solution that provides corporate end users the ability to create and interact safely and securely with an organization’s file data using any…

    • 622 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    of facility protection models in that protection is not necessarily assumed to prevent facility failure altogether, but more precisely to speed up recovery time following a potential disruption. Three different…

    • 9584 Words
    • 39 Pages
    Powerful Essays
  • Good Essays

    IS3110 U5D1

    • 712 Words
    • 3 Pages

    This is a lot like hardening the OS in respect that you are making sure that software stays up to date to ensure that known exploits are being addresses. Any unnecessary applications, services, or scripts that are installed should be removed immediately once the installation process is complete. Below are some things that you can do to harden software.…

    • 712 Words
    • 3 Pages
    Good Essays