Preview

homework 1

Satisfactory Essays
Open Document
Open Document
454 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
homework 1
NT2580 Introduction to Information Security

Unit 1 Assignment 1: Match Risks/Threats to Solutions

Assignment Requirements
This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat.

Write the letter of the correct solution or preventative action in the blank to the right of each risk or threat.

Risks or threats:
1. Violation of a security policy by a user ____C____
2. Disgruntled employee sabotage ____I____
3. Download of non-business videos using the
Internet to an employer-owned computer ____A____
4. Malware infection of a user’s laptop ____L____
5. Unauthorized physical access to the LAN ____N____
6. LAN server operating system vulnerabilities ____F____
7. Download of unknown file types from unknown sources by local users ____B____
8. Errors and weaknesses of network router, firewall, and network appliance configuration file ____H____
9. WAN eavesdropping ____M____
10. WAN Denial of Service (DoS) or Distributed Denial of
Service (DDoS) attacks ____D____
11. Confidential data compromised remotely ____G____
12. Mobile worker token stolen ____K____
13. Corrupt or lost data ____E____
14. Downtime of customer database ____J____

Solutions or preventative actions:
A. Enable content filtering and antivirus scanning at the entry and exit points of the Internet. Enable workstation auto-scans and auto-quarantine for unknown file types.
B. Apply file transfer monitoring, scanning, and alarming for unknown file types and sources.
C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.
D. Apply filters on exterior Internet Protocol

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Psy/250 Appendix G

    • 398 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 398 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Cjs 250 Appendix G

    • 288 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Homework 3

    • 830 Words
    • 4 Pages

    Molecule x blocked the ion channel receptor site so acetylcholine could not attach therefor not allowing the muscle to ultimately contract.…

    • 830 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    The workstation domain is where a user can connect to the business network through the local area network. This can be done by laptops, phones, tablets, and desktops. Each workstation requires a user ID and password. To prevent unauthorized access pass word protection should be enabled. A strong password should consist of uppercase, lowercase letters and special characters. If a workstation is idle for a certain amount of time there should be automatic screen lock, which requires the user to reenter their password for access. Certain user should only have the ability to make changes like downloading and installing something to internet access. This along with an anti-virus program will reduce threats like viruses and malware. So if a virus was present on a workstation it will be removed before it spreads throughout the network.…

    • 347 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Apply email server and attachment antivirus/malware and email quadrating for unknown file types. Disable for ping, probing, and port scanning on all exterior IP devices. Denying of outbound traffic using source IP addresses. Apply file transfer monitoring, scanning and alarming for unknown file types. Web Surfing should be monitored by filtering out any unknown IP address with trusted cites. Apply domain-name content filtering at the internet entry/access point as well.…

    • 313 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CJS 250 Appendix G

    • 603 Words
    • 3 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    4. What tasks and deliverables are needed to implement your risk mitigation recommendations? Pick one of the seven domains of a typical IT infrastructure and answer uniquely.…

    • 960 Words
    • 4 Pages
    Good Essays
  • Better Essays

    NT2580 Graded Assignments

    • 5288 Words
    • 22 Pages

    This is a matching activity. You will receive the Match Risks/Threats to Solutions worksheet, which contains a numbered list of common risks and threats found in a typical IT infrastructure. You must enter the letter for the correct solution or preventative action in the blank to the right of each risk or threat.…

    • 5288 Words
    • 22 Pages
    Better Essays
  • Good Essays

    Assignment 2

    • 851 Words
    • 3 Pages

    6. After the cups were placed either on the floor or on the dashboard, Christopher (who was sitting in the middle in the front seat) was then burned from the cups tipping over when Paul made a left turn. Christopher suffered second degree burns.…

    • 851 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Whitman, M. E., & Mattord, H. J. (2010). Management of information security (3rd ed.). Boston, MA: Course Technology.…

    • 1432 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Cjs/250 Appendix G Week 6

    • 353 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    |significant risks are identified appropriate measures and safe working practices are introduced to eliminate such | |…

    • 400 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    "Challenges And Options For Responding To New And Emerging Risks." GAO Reports (2014): 1. MasterFILE Premier. Web. 13 Feb. 2015.…

    • 1474 Words
    • 4 Pages
    Best Essays