This document outlines an assessment worksheet for a student to develop an IT risk mitigation plan. It includes 15 questions about prioritizing risks and threats, communicating priorities to executive management, and distinguishing between short-term and long-term risk mitigation tasks. Key risks identified include users inserting external devices, remote access vulnerabilities, and non-compliance with laws. The student is asked to recommend policies and procedures to incorporate into a long-term risk mitigation plan.
This document outlines an assessment worksheet for a student to develop an IT risk mitigation plan. It includes 15 questions about prioritizing risks and threats, communicating priorities to executive management, and distinguishing between short-term and long-term risk mitigation tasks. Key risks identified include users inserting external devices, remote access vulnerabilities, and non-compliance with laws. The student is asked to recommend policies and procedures to incorporate into a long-term risk mitigation plan.
This document outlines an assessment worksheet for a student to develop an IT risk mitigation plan. It includes 15 questions about prioritizing risks and threats, communicating priorities to executive management, and distinguishing between short-term and long-term risk mitigation tasks. Key risks identified include users inserting external devices, remote access vulnerabilities, and non-compliance with laws. The student is asked to recommend policies and procedures to incorporate into a long-term risk mitigation plan.
This document outlines an assessment worksheet for a student to develop an IT risk mitigation plan. It includes 15 questions about prioritizing risks and threats, communicating priorities to executive management, and distinguishing between short-term and long-term risk mitigation tasks. Key risks identified include users inserting external devices, remote access vulnerabilities, and non-compliance with laws. The student is asked to recommend policies and procedures to incorporate into a long-term risk mitigation plan.
Download as DOCX, PDF, TXT or read online from Scribd
Download as docx, pdf, or txt
You are on page 1of 3
Lab #6: Assessment Workshee
Develop a Risk Mitigation Plan Outline for an IT Infrastructure
Course Name: IA1708 Student Name: Phạm Công Đức Anh Instructor Name: He170196 Lab Due Date:23/3/2024
1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities?
It is important to prioritize because you must be aware of what the risks, threats, and vulnerabilities there are to your infrastructure. You need this so that you know where the most attention needs to be focused on. 2. Based on your executive summary produced in Lab #4 Perform a Qualitative Risk Assessment for an IT infrastructure, what was the primary focus of your message to executive management? Setting up security measures through various means includes the following: * Forcing users to update password every X number of days. * Educating the users. * Firewalls - Anti-malware 3. Given the scenario for your IT risk mitigation plan, what influence did your scenario have on prioritizing your identified risks, threats, and vulnerabilities? Common things such as user activity can be a very big risk, so your best bet is to consider all options as potential threats. You will have to rank some risk higher than the others. 4. What risk mitigation solutions do you recommend for handling the following risk element? A user inserts a CD or USB hard drive with personal photos, music, and videos on organization owned computers. A good antivirus program and have all devices scanned as soon as they are plugged in. Educate employees Disable optical drives/USB ports. 5. What is a security baseline definition? A "Security Baseline" defines a set of basic security objectives which must be met by any given service or system. The objectives are chosen to be pragmatic and complete, and do not impose technical means. 6. What questions do you have for executive management in order to finalize your IT risk mitigation plan? How did the executive team become acquainted with cutting-edge risk management techniques?
Are you utilizing a recognized risk standard or framework to manage risk and uncertainty in general?
How have you delegated risk management inside your organizations?
7. What is the most important risk mitigation requirement you uncovered and want to communicate to executive management? In your opinion, why is this the most important risk mitigation requirement? Evaluating risk relationships and common causes is important since you can't reduce a risk if you don't know what it is. 8. Based on your IT risk mitigation plan, what is the difference between short-term and long-term risk mitigation tasks and on-going duties? Short-term risks are those that can be rectified quickly and will (most likely) have no long-term consequences for the firm; long-term risks, on the other hand, are those that can result in fines if they entail compliance concerns. Ongoing chores are the everyday tasks that must be completed in order for the firm to operate safely. 9. Which of the seven domains of a typical IT infrastructure is easy to implement risk mitigation solutions but difficult to monitor and track effectiveness? LAN-to-WAN 10. Which of the seven domains of a typical IT infrastructure usually contains privacy data within systems, servers, and databases? Application 11. Which of the seven domains of a typical IT infrastructure can access privacy data and also store it on local hard drives and disks? Workstation 12. Why is the Remote Access Domain the most risk prone of all within a typical IT infrastructure? Because it enables people to access to the intranet from afar. Users can connect to network resources with ease. If the remote access server is a dial-in server, users can connect by dialing in. You can also utilize a virtual private network (VPN) (VPN). A VPN enables users to connect to a private network over a public network such as the internet. You must, however, reduce the danger of an attacker gaining unauthorized access to the same resources. Users who work from home computers or mobile devices such as laptops while on the job may drastically enhance their productivity and flexibility using remote access solutions. 13. When considering the implementation of software updates, software patches, and software fixes, why must you test this upgrade or software patch before you implement this as a risk mitigation tactic? To ensure that there are no harmful elements, such as viruses, that might propagate to other systems 14. Are risk mitigation policies, standards, procedures, and guidelines needed as part of your longterm risk mitigation plan? Why or why not? Yes, so no, everything is done in a certain order to ensure completion and accuracy. 15. If an organization under a compliance law is not in compliance, how critical is it for your organization to mitigate this non-compliance risk element? It is critical for a company to understand which laws apply to them. Once these have been discovered, it is critical to guarantee that the company is compliant. Noncompliance might have serious ramifications. Some laws impose significant fines on organizations. Other laws may result in incarceration. Some can have a detrimental impact on an organization's capacity to do business. For example, HIPAA violations can result in fines of up to $25,000 per year. An internal compliance program can help to prevent these costly blunders.