Preview

Risk Assessment Lab 1

Good Essays
Open Document
Open Document
741 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Risk Assessment Lab 1
7

Lab #1 - Assessment Worksheet
Identifying Threats and Vulnerabilities in an IT Infrastructure
CSS 250 Security Risk Management
Course Name and Number: _____________________________________________________

Kristopher Brown
Student Name: ________________________________________________________________
Cheryl Frederick
Instructor Name: ______________________________________________________________
10/13/2014
Lab Due Date: ________________________________________________________________

Overview
In this lab, you identified known risks, threats, and vulnerabilities, and you organized them.
Finally, you mapped these risks to the domain that was impacted from a risk management perspective. Lab Assessment Questions & Answers
1. Health care organizations must strictly comply with the Health Insurance Portability and
Accountability Act (HIPAA) Privacy and Security rules that require organizations to have proper security controls for handling personal information referred to as “protected health information,” or PHI. This includes security controls for the IT infrastructure handling PHI. Which of the listed risks, threats, or vulnerabilities can violate HIPAA privacy and security requirements? List one and justify your answer in one or two sentences.
Unauthorized access to organization-owned workstations. If someone has access to a workstation who is not authorized, this person can see medical record, SSN, and names of people that are protected.

2. How many threats and vulnerabilities did you find that impacted risk in each of the seven domains of a typical IT infrastructure? there may have been 1, the fire and the ISP outage.

3. Which domain(s) had the greatest number of risks, threats, and vulnerabilities?
LAN and USER

4. What is the risk impact or risk factor (critical, major, and minor) that you would qualitatively assign to the risks, threats, and vulnerabilities you identified for the LAN-to-WAN Domain for the health care and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Mat 540 Quiz 4

    • 644 Words
    • 3 Pages

    2. What are at least three risk factors that Heru should be considering in evaluating the project? What types of risk do they represent? 5 points…

    • 644 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This report will outline the risk. The different risk methods will be analyzed, and then the risk assessment team will make those conclusions on the risk. In this day of ages, risk is one of the biggest threats to any hospital. The reason for this is that the hospital needs quantify their action. With technology moving so fast, it is important to make sure that you have a risk assessment in place. According to (Lozier, 2011) risk is defined as that “systematic application of polices, procedures, and practice to the task of analyzing and controlling risk”. At Spring Valley Hospital we need to make sure that our visitors, employees, and patients ae safe.…

    • 215 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Nt1310 Unit 3 Assignment 1

    • 1244 Words
    • 5 Pages

    Analysis and explanation of the threat and vulnerability pairs and their likelihood of occurrence. The chart explains the aspects of the vulnerabilities and threats. b\Because we have no data on these threats on the amount of occurrences we cannot assign an impact rating or a probability rating in which is high medium an low (reference page 121 of book)…

    • 1244 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    As one of the Health & Safety Manager for the CSS UK team I have responsibilities for Express Reinforcement Ltd (ERL) site at Neath (South Wales). I have responsibility for the maintenance of the (ERL) Safety Management Systems. (SMS)…

    • 1828 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    FunSec2 SLM Lab04 Final

    • 295 Words
    • 2 Pages

    There are many tools and suites designed to aid the security practitioner and the organization in…

    • 295 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Lab #2

    • 402 Words
    • 2 Pages

    3. Which application is used for Step 2 in the hacking process to perform a vulnerability assessment scan?…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The amount the company uses in this exercise overruns the budget that the company expects for this process.…

    • 574 Words
    • 4 Pages
    Good Essays
  • Better Essays

    Risk Assessment P3 M2 D1

    • 2163 Words
    • 6 Pages

    Children should be told to wash their hands after playing with the animals in the mould area to prevent mould being spread around the room.…

    • 2163 Words
    • 6 Pages
    Better Essays
  • Good Essays

    In this lab, you used Nmap commands within the Zenmap application to scan the virtual network…

    • 652 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Criminogenic needs can be described as changeable risk factors, that when reduced, result in reduced criminal behaviour. These needs are termed “criminogenic” because they are empirically related to criminal conduct and when reduced, lead to reductions in future reoffending. Therefore, changes in criminogenic needs have a desired effect on changes in criminal behaviour. In the Risk Assessment case study, a number of these criminogenic needs as well as the “central eight” risk factors are evident contributors to the criminal nature and history of the accused. The first and most important criminogenic need in respect to the case is the Family/Marital factor. The accused believed that his wife had been having an affair and he constantly accused her of infidelity and being seductive with other men. These feelings of insecurity led to many years of constant arguments and assault cases with his wife up until he killed her. This is evident in the fact that the first assault case filed against him was when he was aged 37 and the cases lingered up until the accused was 42. This criminogenic need also directly relates with the family and/or marital “central eight” risk factor. The second most important criminogenic need in respect to the case is the Substance Abuse factor. The substance being abused in this case is alcohol. The accused is of the opinion that his antisocial and violent behaviour is motivated by alcohol abuse. Alcohol substance abuse can also be traced in the impaired driving charges accrued by the accused, which served as one of his previous convictions. Alcohol abuse can also be held responsible for his current state of unemployment as it got him fired from previous jobs. Ultimately, it could be the reason why he does not remember the incidents leading to the murder of his wife because he could have been under the influence.…

    • 420 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    NT2580 Graded Assignments

    • 5288 Words
    • 22 Pages

    I have correctly matched all the risks or threats within the seven domains of a typical IT infrastructure with the solutions and preventative actions.…

    • 5288 Words
    • 22 Pages
    Better Essays
  • Good Essays

    Risk Assessment Paper

    • 907 Words
    • 3 Pages

    Leukemia is the malignant disorder of white blood cells in which the cells become abnormal and divide without control or order. Hematopoietic stem cells, also known as hemacytoblasts, are found in bone marrow and are the precursor to erythrocytes (red blood cells), leukocytes (white blood cells) and thrombocytes (platelets). Leukemia is caused by the mutation of the bone marrow pluripotent or most primitive hematopoietic stem cells (Caldwell, 2007). The mutations during hematopoiesis causes uncontrolled proliferation of stem cells resulting in overcrowding of bone marrow and decreased production and function of normal hematopoietic cells (Huether, 2012). The leukemic stem cells will then enter the blood stream affecting other organs such as the liver, spleen, lymphnodes, and under certain circumstances the central nervous system. The mutant clone may demonstrate unique morphologic, cytogenic, and immunophenotypic features that can be used to classify the particular type of leukemia (Caldwell, 2007). Leukemia can be fatal if left untreated because of the inhibited ability to produce and provide normal red blood cells, white blood cells, and plates to maintain homeostatic mechanisms.…

    • 907 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Week 10 Technical Paper

    • 2283 Words
    • 10 Pages

    Every organization is faced with some risk or potential threat that could cause an interruption to the organization’s operations. These risks and threats can come from within or outside of the organization. To prepare for the worst that could happen, organizations must focus their attention on how to assess different types of risks to protect the organization from the possible negative effects to the daily operations. Performing a risk assessment is one of the most important steps in the risk management process (eHow, 2011).…

    • 2283 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    |Accountability Act (HIPAA) |limitations to prevent personal and health |assist on the safe guarding of patient |…

    • 1126 Words
    • 5 Pages
    Powerful Essays