Lab2 IAA202
Lab2 IAA202
Lab2 IAA202
1. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No
More than 5, High/Medium/Low Nessus Risk Factor Definitions for Vulnerabilities)
c, user inserts cds and usb hard drives with personal photos, music ... on organization
owned computers – medium.
2. For the above identified threats and vulnerabilities, which of the following COBIT P09
Risk Management control objectives are affected?
PO9.1 IT Risk Management Framework - b.
3. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No
More than 5), specify whether the threat or vulnerability impacts confidentiality –
integrity – availability:
4. For each of the threats and vulnerabilities from Lab #1 (List at Least 3 and No More
than 5) that you have remediated, what must you assess as part of your overall COBIT
P09 risk management approach for your IT infrastructure?
5. For each of the threats and vulnerabilities from Lab #1 – (List at Least 3 and No More
than 5) assess the risk impact or risk factor that it has on your organization in the
following areas and explain how this risk can be mitigated and managed:
Information – Vulnerability
Applications – Vulnerability
Infrastructure – Vulnerability
People – None
Information – Vulnerability
Applications – Vulnerability
Infrastructure – Vulnerability
People – Threat
Information – Threat
Applications – Vulnerability
Infrastructure – Threat
People – Vulnerability
d. Threat or Vulnerability #4:
Information – Vulnerability
Applications – Vulnerability
Infrastructure – Vulnerability
People – Threat
Information – Threat
Applications – Vulnerability
Infrastructure – Threat
People – Vulnerability
6. True or False – COBIT P09 Risk Management controls objectives focus on assessment
and management of IT risk
- True
8. When the risk impact impact a threat or vulnerability has on your “information” assets,
why must you align this assessment with your Data Classification Standard? How can a
Data Classification Standard help you assess the risk impact on your “information”
assets?
- We had to align this review because it helped me categorize the importance of the
information, aligning the review would help determine the level of risk factor when it
was compromised.
9. When assessing the risk impact a threat or vulnerability has on your “application” and
“infrastructure”, why must you align this assessment with both a server and application
software vulnerability assessment and remediation plan?
10. When assessing the risk impact a threat or has on your “people”, we are concerned
with users and employees within the User Domain as well as the IT security practitioners
who must implement the risk mitigation steps identified. How can you communicate to
your end-user community that a security threat or vulnerability has been identified for a
production system or application? How can you prioritize risk remediation tasks?
- Send email to inform, create a training course for employees in the company. The
biggest risk or threat must be prioritized first.
11. What is the purpose of using the COBIT risk management framework and approach?
12. What is the difference between effectiveness versus efficiency when risk and risk
management?
- Effectiveness is following the instructions of a specific job while efficiency is doing the
instructions in lesser time and cost. Effectiveness is doing what's right and efficiency is
doing things rightly done.
13. Which three of the seven focus areas pertaining to IT risk management are primary
focus areas of risk assessment and risk management and directly related to information
systems security?
- Assessing the risk, mitigating possible risk and monitoring the result.
14. Why is it important to assess risk impact from four different perspectives as part of
the COBIT P.09 Frameworks?
- Because the more different points of view, the better we can see all the possible risk
factors.
15. What is the name of the organization who defined the COBIT P.09 Risk Management
Framework Definition?