Preview

Unit 7 Technical Assessment Questions

Good Essays
Open Document
Open Document
960 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Unit 7 Technical Assessment Questions
1. Why is risk mitigation and filling in critical security gaps an important next step after the security assessment is performed?

During your security assessment you probably found some gaps, some of them may be critical gaps, so naturally the next step should be to fix those gaps. Once you know you are exposed you want to fix those gaps ASAP before they get exploited.

2. How do you align the results of the qualitative risk assessment to risk mitigation?

You align the results by how likely each risk is to be exploited. The critical security gaps should be taken care of before the low level risks.

3. What were the major elements of your risk mitigation project plan?

Risks, Priority, Impact (short/long term), Mitigation Costs, and the Timeline

4. What tasks and deliverables are needed to implement your risk mitigation recommendations? Pick one of the seven domains of a typical IT infrastructure and answer uniquely.

For the Sys/App domain: System Planning and Acceptance
Function Test to exercise the processing logic of the system to expose errors in data base updates, calculations and edits and to ensure that the system delivers all functionality described in the Preliminary Design
Schedule a non-production test to verify system is work correctly before going live and monitor system log and errors for problems
Security Test to ensure that the system meets the specifications
Schedule a non-production test to verify system meet the minim specifications
Human Interface Test to ensure that human interface is function. Like keyboards, mouse’s and CAC Card readers are working.
Schedule a test to verify the peripheral are tested to ensure the correct peripheral devices is being plug in and ensure usb drive/cd rom are disable.
System Acceptance
Function Test to exercise the processing logic of the system to expose errors in data base updates, calculations and edits and to ensure that the system delivers all functionality described in the Preliminary

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 2 Answers Nessus

    • 628 Words
    • 3 Pages

    * Make recommendations for mitigating the identified risks, threats, and vulnerabilities as described on the CVE database listing…

    • 628 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    automated test. Another issue would be debugging the test scripts. It can cause deadly consequences if…

    • 442 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    lasb 8 IS3220

    • 390 Words
    • 2 Pages

    1. Explain why a layered security strategy helps mitigate risk and threats both external and internal.…

    • 390 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    4. When you assemble all of the “1” and “2” and “3” risk impact/risk factor values to the identified risk, threats, and vulnerabilities, how did you prioritize the “1”, “2”, and “3” risk elements? What would you say to the executive management in regards to your final recommended prioritization?…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    CJS 250 Appendix G

    • 603 Words
    • 3 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 603 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    IS3110 Risk Management

    • 663 Words
    • 3 Pages

    3.What questions would you bring to executive management prior to finalizing your IT risk mitigation plan?…

    • 663 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Given the scenario of a healthcare organization, answer the following assessment questions from a risk management perspective:…

    • 404 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    3. How does risk management and risk assessment relate to a business impact analysis for an IT infrastructure?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    I have identified the methods to mitigate risk and to minimize exposure to threats or vulnerabilities.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    student

    • 287 Words
    • 1 Page

    1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities? Because it helps to demand what areas need your attention first…

    • 287 Words
    • 1 Page
    Good Essays
  • Better Essays

    Test Data: the auditor creates a dummy data file in the system, runs all the reports needed and compares them…

    • 1253 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Managing Safely

    • 336 Words
    • 2 Pages

    3.4 Summarise the types of risks that may be involved in assessment in own area of responsibility…

    • 336 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    The number one responsibility of the Information Assurance/Network Security Officer(s) is to maintain the best security posture for the network that is possible. This task also means that the confidentiality, availability and integrity of the system are maintained. One of the first steps towards this is to perform an assessment of the potential issues with all areas of the network. A preliminary security assessment will begin the task of identifying a list of vulnerabilities (weaknesses and flaws) that could possibly be exploited by a threat (Develop, n.d.).…

    • 1453 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Cjs/250 Appendix G Week 6

    • 353 Words
    • 2 Pages

    Choose two settings from Ch. 9 of the text and list each setting. Then, complete the following tables. List five threats appropriate to the environment from the setting you chose. Rate the risk for each threat from 0 (low) to 10 (high). Then, list five appropriate countermeasures, including at least two countermeasures specific to physical security and one countermeasure specific to personnel and security management. Once you have completed the tables, write a brief explanation of each countermeasure, stating how the countermeasure reduces the risk associated with that threat.…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Testing consumes and produces large amounts of data. Data describes the initial conditions for a test, forms the input, is the medium through which the tester influences the software. Data is manipulated, extrapolated, summarised and referenced by the functionality under test, which finally spews forth yet more data to be checked against expectations. Data is a crucial part of most functional testing. This paper sets out to illustrate some of the ways that data can influence the test process, and will show that testing can be improved by a careful choice of input data. In doing this, the paper will concentrate most on data-heavy applications; those which use databases or are heavily influenced by the…

    • 5562 Words
    • 159 Pages
    Powerful Essays

Related Topics