Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

Lab 6

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 3

Lab #6: Assessment Worksheet

Develop a Risk Mitigation Plan Outline for an IT Infrastructure

Course Name: IAA202


Student Name: Ho Viet An
Instructor Name: Pham Ho Trong Nguyen
Lab Due Date: 14-10-2024

Overview
After completing your IT risk mitigation plan outline, answer the following Lab #6 –
Assessment Worksheet questions. These questions are specific to the IT risk
mitigation plan outline you crafted as part of Lab #6 – Develop a Risk Mitigation Plan
Outline for an IT Infrastructure.

Lab Assessment Questions

1. Why is it important to prioritize your IT infrastructure risks, threats, and


vulnerabilities?

Prioritizing IT infrastructure risks helps organizations effectively manage and


mitigate potential threats, optimize security efforts, and safeguard critical assets.

2. Based on your executive summary produced in Lab #4 – Perform a


Qualitative Risk Assessment for an IT Infrastructure, what was the primary
focus of your message to executive management?

Organizations may violate compliance laws. This increases the potential responsibility
of the organization. These critical risk factors have been identified and prioritized for
management evaluation.

3. Given the scenario for your IT risk mitigation plan, what influence did your
scenario have on prioritizing your identified risks, threats, and vulnerabilities?

Common things, such as user behavior, can be very risky, so consider all options as
potential risks.

5. What is a security baseline definition?

A baseline is a starting point or a standard. In IT, the basics provide standards that
focus on the specific technologies used in an organization. When applied to a security
policy, the baseline is the minimum security setting that is applied.

6. What questions do you have for executive management in order to finalize


your IT risk mitigation plan?

First, I will have a question about the value, how much is the budget that the risk
management agency spends to implement the plan?
Next, ask them if they accept that budget or not?
7. What is the most important risk mitigation requirement you uncovered and
want to communicate to executive management? In your opinion, why is this the
most important risk mitigation requirement?

Remote access is the most risky and is therefore a key risk reduction requirement that
should be reported to management. The organization's IT system will be extended
beyond the internal network. This creates the basis for hacker attacks from outside the
system if appropriate protection measures are not taken.

8. Based on your IT risk mitigation plan, what is the difference between short-
term and long-term risk mitigation tasks and on-going duties?

Short-term risks are risks that can be rectified quickly and have no (long-term) impact
on the business, while long-term risks are risks that are punishable in terms of
compliance issues.

9. Which of the seven domains of a typical IT infrastructure is easy to implement


risk mitigation solutions but difficult to monitor and track effectiveness?

User domains include all users (regardless of rank) with access to the other six
domains.
Risk:
Users can delete application data (intentionally or unintentionally) and delete
everything.
Users can insert a virus-infected CD or USB flash drive into their work computer.

10. Which of the seven domains of a typical IT infrastructure usually contains


privacy data within systems, servers, and databases?

Systems/Application Domain

11. Which of the seven domains of a typical IT infrastructure can access privacy
data and also store it on local hard drives and disks?

LAN-WAN Domain

12. Why is the Remote Access Domain the most risk prone of all within a typical
IT infrastructure?

Companies that allow their employees to work from home can leave their networks
vulnerable to unwanted and malicious attacks. Employees who use their devices to
connect to the company network can use the company's personal security system. The
problem with this type of experience is that employees have many security flaws and
issues with their terminal devices. Some can be infected with malware and other
viruses that can compromise network security. If these devices can connect to your
remote network, your corporate network may be exposed to the same threats. That's
why it's so important for companies to ask employees to check their devices regularly.
If possible, make sure you have antivirus software installed to protect your device
from such malware. This allows employees to securely connect to the network
anytime, anywhere.
13. When considering the implementation of software updates, software patches,
and software fixes, why must you test this upgrade or software patch before you
implement this as a risk mitigation tactic?

Whether you're a small business, a large business, or an individual, upgrading and


adjusting is an important part of your security policy. Patches fix big and small issues
and make sure you use the latest software available. Learn why fixes and updates are
important and explore best fixes. There is a major issue in policy making. Do not
delay the patch unless absolutely necessary.

14. Are risk mitigation policies, standards, procedures, and guidelines needed as
part of your long-term risk mitigation plan? Why or why not?

It is very necessary because in any operational process, there must be standards and
procedures, there must always be a common direction for those working in risk
management to follow.

15. If an organization under a compliance law is not in compliance, how critical


is it for your organization to mitigate this non-compliance risk element?

Compliance helps organizations meet their obligations before taking legal action
against them for non-compliance.

You might also like