Lab 6
Lab 6
Lab 6
Overview
After completing your IT risk mitigation plan outline, answer the following Lab #6 –
Assessment Worksheet questions. These questions are specific to the IT risk
mitigation plan outline you crafted as part of Lab #6 – Develop a Risk Mitigation Plan
Outline for an IT Infrastructure.
Organizations may violate compliance laws. This increases the potential responsibility
of the organization. These critical risk factors have been identified and prioritized for
management evaluation.
3. Given the scenario for your IT risk mitigation plan, what influence did your
scenario have on prioritizing your identified risks, threats, and vulnerabilities?
Common things, such as user behavior, can be very risky, so consider all options as
potential risks.
A baseline is a starting point or a standard. In IT, the basics provide standards that
focus on the specific technologies used in an organization. When applied to a security
policy, the baseline is the minimum security setting that is applied.
First, I will have a question about the value, how much is the budget that the risk
management agency spends to implement the plan?
Next, ask them if they accept that budget or not?
7. What is the most important risk mitigation requirement you uncovered and
want to communicate to executive management? In your opinion, why is this the
most important risk mitigation requirement?
Remote access is the most risky and is therefore a key risk reduction requirement that
should be reported to management. The organization's IT system will be extended
beyond the internal network. This creates the basis for hacker attacks from outside the
system if appropriate protection measures are not taken.
8. Based on your IT risk mitigation plan, what is the difference between short-
term and long-term risk mitigation tasks and on-going duties?
Short-term risks are risks that can be rectified quickly and have no (long-term) impact
on the business, while long-term risks are risks that are punishable in terms of
compliance issues.
User domains include all users (regardless of rank) with access to the other six
domains.
Risk:
Users can delete application data (intentionally or unintentionally) and delete
everything.
Users can insert a virus-infected CD or USB flash drive into their work computer.
Systems/Application Domain
11. Which of the seven domains of a typical IT infrastructure can access privacy
data and also store it on local hard drives and disks?
LAN-WAN Domain
12. Why is the Remote Access Domain the most risk prone of all within a typical
IT infrastructure?
Companies that allow their employees to work from home can leave their networks
vulnerable to unwanted and malicious attacks. Employees who use their devices to
connect to the company network can use the company's personal security system. The
problem with this type of experience is that employees have many security flaws and
issues with their terminal devices. Some can be infected with malware and other
viruses that can compromise network security. If these devices can connect to your
remote network, your corporate network may be exposed to the same threats. That's
why it's so important for companies to ask employees to check their devices regularly.
If possible, make sure you have antivirus software installed to protect your device
from such malware. This allows employees to securely connect to the network
anytime, anywhere.
13. When considering the implementation of software updates, software patches,
and software fixes, why must you test this upgrade or software patch before you
implement this as a risk mitigation tactic?
14. Are risk mitigation policies, standards, procedures, and guidelines needed as
part of your long-term risk mitigation plan? Why or why not?
It is very necessary because in any operational process, there must be standards and
procedures, there must always be a common direction for those working in risk
management to follow.
Compliance helps organizations meet their obligations before taking legal action
against them for non-compliance.