Preview

Student Lab ManualLab 9 Assessment WorksheetPart

Powerful Essays
Open Document
Open Document
900 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Student Lab ManualLab 9 Assessment WorksheetPart
Student Lab Manual

Lab #9 -Assessment Worksheet

Part A - Risks, Threats, & Vulnerabilities in the Seven Domains of a Typical IT Infrastructure

Overview

For each of the identified risks, threats, and vulnerabilities -review the following chart to determine which domain from the seven domains of a typical IT infrastructure is impacted.

Risk - Threat - Vulnerability
Primary Domain Impacted
Unauthorized access from public Internet

User destroys data inapplication and deletes all files

Hacker penetrates your IT infrastructure and gains access to your internal network

Intra-office employee romance gone bad Fire destroys primary data center Communication circuit outages

Workstation OS has a known software vulnerability

Unauthorized access to organization owned Workstations

Loss of production data

Denial of service attack on organization e-mail Server

Remote communications from home office

LAN server OS bas a known software vulnerability

User downloads an unknown e -mail attachment

Workstation browser bas software vulnerability Service provider has a major network outage

Weak ingress/egress traffic filtering degrades Performance

User inserts CDs and USB bard drives

with personal photos, music, and videos on organization owned computers

VPN tunneling between remote computer and ingress/egress router

WLAN access points are needed for LAN connectivity

within a warehouse

Need to prevent rogue users from unauthorized WLAN access

Lab #9 -Assessment Worksheet

Part B – Sample IT Security Policy Framework Definition

Overview

Given the following IT security policy framework definition, specify which policy probably can cover the identified risk. threat, or vulnerability. If there is none, then identify that as a gap. Insert your recommendation for an IT security policy that can eliminate the gap. See handout provided by instructor.

...A..s..se..t,,... l'<liley Staacbrck Standards

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Pt1420 Unit 6 Lab Answers

    • 508 Words
    • 3 Pages

    Note: the analysis #1 a) and b) will only be demonstrated on the graphs of trial 1 for this report, trial 2-5 have approximately the same results.…

    • 508 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    I would like to start off by saying that there are various threats when discussing about computer security the word threat would mean something that can indicate a danger when in relation to computer security. In this task I will be showing the Malicious damage, counterfeit goods, (software/hardware) human errors, phishing and hacking, theft of equipment, threats related to e – commerce and technical failure.…

    • 1232 Words
    • 5 Pages
    Good Essays
  • Satisfactory Essays

    Unit 7 Lab And Assignment

    • 311 Words
    • 2 Pages

    Complementary Metal Oxide Semiconductor, or CMOS, is a widely used type of semiconductor. CMOS semiconductors use both NMOS(negative polarity) and PMOS(positive polarity) circuits. Since only one of the circuit types is on at any given time, CMOS chips require less power than chips using just one type of transistor. This feature makes them convenient for use in battery-powered devices such as laptops. Personal computers also contain a small amount of battery-powered CMOS memory to hold the date, time, and the system setup parameters. To access the CMOS on most computers, press the delete key as the computer is booting.…

    • 311 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab10 worksheet

    • 1151 Words
    • 5 Pages

    Will the Group Policy settings you configure in your new GPO have an immediate effect on your network? Why?…

    • 1151 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Lab Module 1

    • 808 Words
    • 4 Pages

    K. Stage knobs or clips – secures and adjusts the slides position on the stage…

    • 808 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    17. Which of the following is not a part of an ordinary IT security policy framework?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Lab Question Answers 02

    • 415 Words
    • 1 Page

    They find many clues that the body wasn’t actually that of Cora and also signs that Crippen may not have committed the crime.…

    • 415 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    lab 1.7 rubric

    • 349 Words
    • 2 Pages

    b) Should be in the past tense and passive voice. Remember, you did this investigation earlier in the week. Example: “The instantaneous velocity was calculated by dividing .04 m by the time of the main gate.”, and NOT “I calculate the velocity”.…

    • 349 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Module 01 Lab Worksheet

    • 2406 Words
    • 11 Pages

    This week’s lab will focus on reviewing the concepts of anatomical terminology, metric conversion and genetics, specifically the concept of dominant and recessive alleles in a human pedigree.…

    • 2406 Words
    • 11 Pages
    Good Essays
  • Powerful Essays

    There are quite a few vulnerabilities that can affect organizations productivity. These vulnerabilities can be environmental, utilities & service, criminal behavior, equipment failure, and information security issues. To protect the organization against loss of productivity and data loss we have created an assessment of the potential danger each category of threat presents. We created a worksheet (located on the last page of this document) listing each type of vulnerability and ranked the probability and severity of each of the threats. Using a probability and severity legend that had one…

    • 2036 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 526 Words
    • 5 Pages

    Common security countermeasures typically found in an IT infrastructure  Risk assessment approach to securing an IT infrastructure  Risk mitigation strategies to shrink the information security gap NT2580 Introduction to Information Security © ITT Educational Services, Inc. All rights reserved. Page 3 EXPLORE: CONCEPTS NT2580…

    • 526 Words
    • 5 Pages
    Satisfactory Essays
  • Good Essays

    Is 305 Week 3 Quiz

    • 577 Words
    • 3 Pages

    Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    5. OpenSSH is the de facto method to remotely access Linux systems. Explain why the use of telnet is discouraged.…

    • 316 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    Describe any four (4) threats to information security and explain any two (2) methods of defense mechanism used to protect information systems.…

    • 1958 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Uml Lab Manual

    • 2876 Words
    • 12 Pages

    Lab Description: The Unified Modeling Language (UML) is a visual modeling language that enables system builders to create blueprints that capture their visions in a standard, easy-to-understand way, and provides a mechanism to effectively share and Communicate these visions with others. The purpose of the diagrams is to present multiple views of a system; this set of multiple views is called a model. UML model describes what a system is supposed to do. It doesn’t tell how to implement the system.…

    • 2876 Words
    • 12 Pages
    Good Essays