Preview

IS3110 - lab 6

Satisfactory Essays
Open Document
Open Document
511 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3110 - lab 6
Lab #6: Assessment Worksheet
1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities?
Because you need to know which is most important and which is negligible. In some cases, protecting your infrastructure from a high priority threat is more important and so you may want to protect against that even if it leaves you vulnerable to low priority threats. This mainly just shows you which areas need your attention the most.
2. Based on your executive summary produced in Lab #4 – Perform a Qualitative Risk Assessment for an IT infrastructure, what was the primary focus of your message to executive management?
Setting up security measures through various means.
Forcing users to update password every X number of days.
Educating users.
Firewalls
Anti-malware
3. Given the scenario for your IT risk mitigation plan, what influence did your scenario have on prioritizing your identified risks, threats, and vulnerabilities?
4. What risk mitigation solutions do you recommend for handling the following risk element? User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers.
A good antivirus program and have all devices scanned as soon as they are plugged in.
Educate employees
Disable optical drives/USB ports (if they are not needed)
5. What is security baseline definition?
A baseline is a starting point or a standard. Within IT, a baseline provides a standard focused on a specific technology used within an organization. When applied to security policies, the baseline represents the minimum security settings that must be applied.
6. What questions do you have for executive management in order to finalize your IT risk mitigation plan?
What is the budget?
What are their priorities?
Disclose all your thoughts on the matter. Show them other options and how you came to your conclusion and make sure the executive management agrees.
7. What is the most important risk mitigation

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    In the workstation domain, we need to make sure that all workstations have antivirus and malware protection installed on them. Laptops and portable devices are very vulnerable to theft…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    221 - Use office equipment

    • 2807 Words
    • 12 Pages

    The computers have lots of important features. A lot of confidential information and documents are kept safe in protected electronic files on the computer such as PAS (patient attendance system). We also have intranet, which I mostly use to access…

    • 2807 Words
    • 12 Pages
    Powerful Essays
  • Satisfactory Essays

    IS4560 Lab 1 Assessment

    • 292 Words
    • 1 Page

    13. To truly test the IT security team, if they know the attack is coming they can prepare for the attack.…

    • 292 Words
    • 1 Page
    Satisfactory Essays
  • Good Essays

    Lab 3 nt2580

    • 321 Words
    • 2 Pages

    . What are the three fundamental elements of an effective access control solution for information…

    • 321 Words
    • 2 Pages
    Good Essays
  • Good Essays

    | Describe ways to protect hardware, software and data and minimise security riskThere are steps to prevent threats to system and information: access to information sources should be allowed with Username and password/PIN selection. The system set up on password strength; how and when to change passwords (monthly); online identity/profile; Real name, pseudonym; what personal information to include, who can see the information; Respect confidentiality, avoid inappropriate disclosure of…

    • 793 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Is3110 Week4 Lab1

    • 569 Words
    • 2 Pages

    It is mitigating the risk of disaster that either destroys the server or building the server is in.…

    • 569 Words
    • 2 Pages
    Powerful Essays
  • Good Essays

    Question 3. What approach to risk management will identify threats, vulnerabilities, and the critical assets that we must protect?…

    • 734 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    3. How does risk management and risk assessment relate to a business impact analysis for an IT infrastructure?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3110 U1L1

    • 1084 Words
    • 5 Pages

    The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing patients with life-threatening situations. Given the list, select which of the seven domains of a typical IT infrastructure is primarily impacted by the risk, threat, or vulnerability.…

    • 1084 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    When we ask what “Critical Infrastructure is?” Critical infrastructure is the backbone of our nation’s economy, security, and health. It is clear that we have the power in our homes, the water we drink, the transportation that moves us, and the communication systems we rely on to stay in touch with friends and family. The vitalization of critical infrastructure according to research and the” Department of Homeland Security, 2013” is the assets, systems, and networks, whether physical or virtual. It is so…

    • 1767 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    ideal job

    • 346 Words
    • 3 Pages

    4. If you were the manager in this event, what service barriers did you observe, and what would be your action plan to remove them?…

    • 346 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    code galore caselet

    • 761 Words
    • 4 Pages

    1. What are some of the emerging IT security technologies that should be considered in solving the Problem related to the case?…

    • 761 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    TJMax Case analisys

    • 1658 Words
    • 7 Pages

    1. Identify & describe the failure points in TJX's security that require attention (including People, Work Process, and Technology…

    • 1658 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    1. Ensure that the machine is in good condition before being used for security purposes…

    • 926 Words
    • 4 Pages
    Good Essays