Please look into the word document and let me know if any questions.
Content: 2-3 pages
Week 4 Lab
Perform a Qualitative Risk Assessment for an IT Infrastructure
1. Using your favorite search Engine search for more information on the Napster case
2. In your Lab Report file describe the purpose of IT risk assessment
3. Review the following table for the risks, threats and vulnerabilities found in a health care IT infrastructure servicing patients with life-threatening conditions:
Risks, Threats and Vulnerabilities |
Primary Domain Impacted |
Risk Impact/Factor |
Unauthorized access from public Internet |
||
User destroys data in application and delete all files |
||
Hackers penetrates IT infrastructure through modem bank |
||
Intraoffice Employee romance gone bad |
||
Fire destroys primary data center |
||
Service provider service level agreement (SLA) is not achieved |
||
Workstation operating system (OS) has known software vulnerability |
||
Unauthorized access to organization-owned workstations |
||
Loss of production data |
||
Denial of service attack on organization Demilitarized zone (DMZ) and email server |
||
Remote communications from home office |
||
LAN server OS has a known software vulnerability |
||
User downloads and clicks on an unknown e-mail attachment |
||
Workstation browser has software vulnerability |
||
Mobile employee needs secure browser access to sales order entry system. |
||
Service provider has a major network outage |
||
Weak ingress/egress traffic filtering degrades performance |
||
User inserts CDs and USB hard drives with personal photos, music, and videos on organization-owned computers |
||
Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router |
||
Wireless Local Area Network (WLAN) access points are needed for the LAN connectivity within a warehouse |
||
Need to prevent eavesdropping on WLAN due to customer privacy data access. |
||
Denial of service (DoS) /distributed denial of service( |
4. Review the seven domains of the typical IT Infrastructure
5. In your Lab Report file, using the table, identify the table’s primary domain impacted column which of the seven domains of a typical IT infrastructure will be most impacted by each risk, threat or vulnerability listed.
6. In your Lab Report file, using the table perform a qualitative risk assessment by assigning a risk impact/risk factor to each of the identified tasks, threats and vulnerabilities throughout the seven domains of a typical IT Infrastructure resides. Assign each risk, threat, vulnerability a priority number in the table’s Risk Impact/Factor column, where:
“1” is Critical: a risk, threat, or vulnerability that impacts compliance, (that is, privacy law requirement for securing privacy data and implementing proper security controls and so on) and places the organization in a position of increased liability.
”2” is Major: A risk, threat, or vulnerability that impacts confidentiality, Integrity and availability (C-I-A) of an organization’s intellectual property assets and IT infrastructure.
“3” is Minor: A risk, threat, or vulnerability that can impact user or employee productivity or availability of the IT infrastructure.
Note: Keeping the following in mind when working on the next step: When suggesting next step to executive management, consider your recommendations from their point of view. Be prepared to explain costs both in implementing controls and then in maintaining the controls.
Remember the costs come from many forms, not least of which is labor. Be sure accountability is thought out in terms of roles and responsibilities. Other potential costs outside the data center include goodwill or reputation, market share and lost opportunity. Executive management might have these costs topmost in mind.
7. In your Lab report write a four paragraph executive summary according to the following outline.
· Paragraph #1: Summary of findings (risks, threats, and vulnerabilities found throughout the IT infrastructure)
· Paragraph #2: Approach and prioritization of critical, major, minor risk assessment elements
· Paragraph #3: Risk assessment and risk impact summary of the seven domains of the IT infrastructure
· Paragraph #4: Recommendations and next steps for executive management.
We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.
Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.
Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.
Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.
Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.
Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.
We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.
Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.
You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.
From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.
Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.
Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.
You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.
You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.
Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.
We create perfect papers according to the guidelines.
We seamlessly edit out errors from your papers.
We thoroughly read your final draft to identify errors.
Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!
Dedication. Quality. Commitment. Punctuality
Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.
We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.
We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.
We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.
We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.