Preview

IS3110 U1L1

Powerful Essays
Open Document
Open Document
1084 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3110 U1L1
IS3110 Lab Student Name:
Submission Requirements
Your last name must be in the filename of your submitted document according the assignment naming standard. IS3110_UL1_Firstname_Lastname
Email to: SMichnick@itt-tech.edu
Due By: 6:00 PM CDT, Wednesday June 25, 2014
Note: Emails received after Due Date Due Date will be marked LATE and subject to a grade of 0 for the assignment.
Pages 3-10 of the IS3220 Student Lab Manual
Lab #1 – Part A – List of Risks, Threats, and Vulnerabilities Commonly Found in an IT Infrastructure

Overview
The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing patients with life-threatening situations. Given the list, select which of the seven domains of a typical IT infrastructure is primarily impacted by the risk, threat, or vulnerability.

Risk – Threat – Vulnerability
Primary Domain Impacted
Unauthorized access from public Internet
Remote Access Domain
User destroys data in application and deletes all files
System App Domain
Hacker penetrates your IT infrastructure and gains access to your internal network
Lan to Wan Domain
Intra-office employee romance “gone bad”
User Domain
Fire destroys the primary data center
System App Domain
Communication circuit outages
Wan Domain
Workstation OS has a known software vulnerability
Workstation Domain
Unauthorized access to organization owned Workstations
Workstation or End point Domain
Loss of production data
System App Domain
Denial of service attack on organization e-mail server
System App Domain
Remote communications from home office
Remote access Domain
LAN server OS has a known software vulnerability
Lan Domain
User downloads an unknown e –mail attachment User Domain
Workstation browser has software vulnerability
Workstation Domain
Service provider has a major network outage
Wan Domain
Weak ingress/egress traffic filtering degrades performance
Lan to Wan
User inserts CDs and USB hard drives with personal photos, music, and videos on

You May Also Find These Documents Helpful

  • Good Essays

    Anyone with a laptop or tablet could access the network and with only few basic network utilities could access all the servers and all the patient information. Most of these facilities are not implementing any Network Security because of the cost associated with it. “Most healthcare organizations nationwide, some 61 percent to be exact, reported a security related incident in the form of security breach, data loss or unplanned downtime at least once this past year, according to a new health IT report by MeriTalk, a public-private organization working to improve government information technology. These security events cost U.S. hospitals an estimated $1.6 billion each year. Breaking it down by incident, hospitals should expect to hand over on average $810,000 per security breach, which occurs at nearly one in five healthcare organizations nationwide” (healthcareitnews.com). I hope that with this project I can make clear the benefits of securing the network and the steps we need to take to set up and secure the…

    • 698 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Risk Threat Vulnerability

    • 719 Words
    • 3 Pages

    LAN – WAN High User destroys data in application and deletes LAN High all files…

    • 719 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Student Lab Manual Lab #9 -Assessment Worksheet Part A - Risks, Threats, & Vulnerabilities in the Seven Domains of a Typical IT Infrastructure…

    • 900 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580 Homework Week 2 Microsoft Environment Analysis 1. What vulnerabilities exist for this workgroup LAN based on the advisories? List five of them.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3110 U7L1

    • 1068 Words
    • 7 Pages

    Email to: SMichnick@itt-tech.edu Due By: 6:00 PM CDT, Wednesday August 6, 2014 Note: Emails received after Due Date Due Date will be marked LATE and subject to a grade of 0 for the assignment.…

    • 1068 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    What is Risk Assessment? : Risk assessments, whether they pertain to information security or other types of risk, are a means of providing decision makers with information needed to understand factors that can negatively influence operations and outcomes and make informed judgments concerning the extent of actions needed to reduce risk.1 Key fingerprint = AF19 FA27 2F94 998D FDB5 DE3D F8B5 06E4 A169 4E46 Why do we need to conduct a risk assessment? To identify the potential hazardous situations, which may negatively affect our business processes, and to estimate the likelihood of such an event occurring. A risk assessment would help to provide alternative solutions to reduce the risk, estimate the effectiveness of those solutions and provide information to base a risk management decision. The paper discusses in brief technical and business risk analysis and touches upon ISO 17799 based Gap Analysis, Disaster Recovery Planning options (DRP), Business Continuity Planning (BCP) and the deliverables therein. We sum up with highlights on leading technologies in antivirus, firewall, intrusion detection, authentication and threat management. These technologies are a part of the defense in depth2 approach to secure our…

    • 4239 Words
    • 17 Pages
    Powerful Essays
  • Good Essays

    An advancement of adopting a system that allows information security to be protected in all aspects is encouraged. I think that the implementation of this new system will ensure all information and data while it’s in storage to be protected and kept confidential. This will help also improve the accessibility of the structure on which the information security management system will be built on. They should develop and encourage people to strategize different processing methods for technology to smoothly adapt to its new setting, which will be beneficial. I believe that we should only implement a security program that’s simple and easy for users to practice, yet an effective system. Some components of this system could include easy access to the cloud, the implementation of an effective management structure, provide clear direction and access rights, password maintenance and management, and inspecting appropriate software configuration. I think this will significantly ensure the ability to monitor and detect threats in real time. Within these components of this new system, healthcare organizations should address the reduction of complex security problems by simplifying the usage of the right tools, laws, policies, and the enforcement of healthcare management issues being at risk via hackers and the overwhelming costs of…

    • 1357 Words
    • 6 Pages
    Good Essays
  • Good Essays

    2015 S1 Assignment

    • 633 Words
    • 3 Pages

    BEO2264: Microeconomic Analysis Semester 1, 2015 ASSIGNMENT _________________________________________________________ Due Date: The week beginning the 11th of May, 2015. The completed assignment must be submitted to your lecturer during your scheduled seminar.…

    • 633 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Bachloor

    • 302 Words
    • 2 Pages

    Submission Date: 7th Jan 2011 (Friday) before 12pm to your respective tutor. Reminder: Late assignment/project will be reduced at least one letter grade per class day at the discretion of the instructor.…

    • 302 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Security risk management

    • 45681 Words
    • 183 Pages

    Most organizations recognize the critical role that information technology (IT) plays in supporting their business objectives. But today's highly connected IT infrastructures exist in an environment that is increasingly hostile—attacks are being mounted with increasing frequency and are demanding ever shorter reaction times. Often, organizations are unable to react to new security threats before their business is impacted. Managing the security of their infrastructures—and the business value that those infrastructures deliver—has become a primary concern for IT departments.…

    • 45681 Words
    • 183 Pages
    Good Essays
  • Powerful Essays

    safety. The paper looks at ICT security and safety within a company, the risks and…

    • 2313 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    romanticisism Era

    • 795 Words
    • 4 Pages

    You have a bit of extra time for this assignment so please check due date and time carefully. This assignment is worth 20 points.…

    • 795 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT320 Unit 1

    • 256 Words
    • 1 Page

    • Layer 5 is the Session Layer. This layer establishes and monitors communication between two end devices. IT ensures both devices are talking to the application layer.…

    • 256 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    lol lots of loling

    • 2208 Words
    • 10 Pages

    DO NOT WAIT until the last minute for this assignment. It will be impossible to complete in a short amount of time.…

    • 2208 Words
    • 10 Pages
    Satisfactory Essays
  • Powerful Essays

    RAR Template 07112007 3

    • 5647 Words
    • 25 Pages

    Submitted: , 2007 Version Control Date Author Version EXECUTIVE SUMMARY The Centers for Disease Control and Prevention (CDC) recognizes the best, most up-to-date health information is without value unless it is pertinent and accessible to the people it is meant to serve. Lockheed Martin Information Technology has been tasked to conduct a risk assessment of the <System Name and Acronym> for the purpose of certification and accreditation (C&A) of <System Name> under DHHS Information Security Program Policy. This Risk Assessment Report, in conjunction with the System Security Plan, assesses the use of resources and controls to eliminate and/or manage vulnerabilities that are exploitable by threats internal and external to CDC. The successful completion of the C&A process results in a formal Authorization to Operate of <System Name>.…

    • 5647 Words
    • 25 Pages
    Powerful Essays