Preview

How to Identify Threats and Vulnerabilities in an IT Infrastructure

Satisfactory Essays
Open Document
Open Document
465 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
How to Identify Threats and Vulnerabilities in an IT Infrastructure
1. An example of a HIPPA privacy violation would be a breach of information from the Healthcare organizations servers. This particular breach would impact the System/Application Domain. A hacker can penetrate a vulnerable system and retrieve patient information such as SSN, DOB, and even credit card payment information.

2. Threats and vulnerabilities:
a. User Domain – Unauthorized access to organization owned workstations
b. Workstation Domain - User downloads an unknown e-mail attachments
c. LAN Domain - WLAN access points are needed for LAN connectivity within a warehouse
d. LAN-to-WAN Domain - Unauthorized access from public Internet
e. WAN Domain - Service provider has a major network outage
f. Remote Access Domain - Remote Communication from home office
g. System/Application Domain - Fire destroys primary data center

3. The primary domain identified as having the greatest number of risks, threats, and vulnerabilities was the System/Application Domain.

4. The risk impact or threat to the healthcare HIPPA compliance impacted by the LAN-to-WAN Domain would be the breach of the healthcare browser and ultimately server containing patient private information.

5. Of the treats identified that would impact the System/Application Domain the one that would require disaster recovery plan or business continuity plan would be a fire destroys the primary data center. 6. The domain the represents the greatest risk and uncertainty to an organization would be the System/Application Domain. This is where the servers and monetary data are located.

7. The Remote Access Domain requires stringent access controls and encryption for connectivity to corporate resources from home.

8. The domain that requires annual security awareness training and employee background checks would be the User Domain.

9. The domains that require software vulnerability assessments to mitigate risk from software vulnerabilities would be the following:
a. Workstation Domain
b.

You May Also Find These Documents Helpful

  • Good Essays

    The three broad objectives HIPAA privacy standards were designed to accomplish are; define and limit the circumstances in which individuals use and disclose patient health information, establish individual rights regarding patient health information, and require protected individuals to adopt administrative safeguards to protect the confidentiality and privacy of patient healthcare information (Cleverley, pg.95). The HIPAA Privacy Standards prohibit covered entities from using or disclosing individually identifiable health information that is or has been transmitted or maintained electronically. This requirement isn’t limited to the record in which the information appears but applies to the actual information itself. Any information that has been transmitted by email, fax, telephone, or any other…

    • 995 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    3. Non-DNS: Users without DB Admin role who are not DNS employees. This includes MAD employees.…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    17. Which of the following is not a part of an ordinary IT security policy framework?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    We will educate employees on how to properly secure information by user ID and password management training. Instructing them on how to…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the remote access domain, we need to make sure the VPN in use is secure so that our employees are not exposing sensitive data to anyone outside the network. In order to do so we will ensure everyone is using a VPN to access the network which has to authenticate to the system to get authorization.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When developing a multi-layered security plan, you must look at each of the seven domains of the IT infrastructure and increase security on each of those domains. The seven domains are user domain, workstation domain, LAN domain, LAN to WAN domain, WAN domain, and remote access domain. Increasing the security on each of those seven domains will increase the overall security of the system and create a multi-layered security plan.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I have identified at least three IT infrastructure domains affected by the “Internal Use Only” data classification standard.…

    • 402 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    RAR Template 07112007 3

    • 5647 Words
    • 25 Pages

    The scope of this risk assessment effort was limited to the security controls applicable to the <System Name> system’s environment relative to its conformance with the minimum DHHS Information Technology Security Program: Baseline Security Requirements Guide. These baseline security requirements address security controls in the areas of computer hardware and software, data, operations, administration, management, information, facility, communication, personnel, and contingency.…

    • 5647 Words
    • 25 Pages
    Powerful Essays
  • Powerful Essays

    There are quite a few vulnerabilities that can affect organizations productivity. These vulnerabilities can be environmental, utilities & service, criminal behavior, equipment failure, and information security issues. To protect the organization against loss of productivity and data loss we have created an assessment of the potential danger each category of threat presents. We created a worksheet (located on the last page of this document) listing each type of vulnerability and ranked the probability and severity of each of the threats. Using a probability and severity legend that had one…

    • 2036 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    Is 305 Week 4 Quiz

    • 415 Words
    • 2 Pages

    Describe and list four elements of a BCP. Identify critical equipment necessary for the business mission. Identifying critical personnel necessary for the business to return to normal operations of the business. Conduct a BIA, determine the impact on the business if systems were unavailable. Maintenance and updating of the BCP as changes are made to the network.…

    • 415 Words
    • 2 Pages
    Good Essays
  • Good Essays

    The Health Insurance Portability and Accountability Act (HIPAA), became law in 1996. It requires health care providers, insurance companies and others involved in health care transactions to provide security on any system containing personal health information, store and transmit that information according to standardized rules, and place an automatic audit on files to help keep track of who should have access to them and whether those access rules have been violated. HIPAA complaints and violations that aren't fixed quickly are subject to a fine of between $100 per incident or a maximum of $25,000 per year for violation of a specific rule.…

    • 783 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays