Course Hero Logo

IT541+Unit+6.docx - Lab #9 Recommending IT Security...

Course Hero uses AI to attempt to automatically extract content from documents to surface to you and others so you can study better, e.g., in search results, to enrich docs, and more. This preview shows page 1 - 4 out of 10 pages.

IntroductionThe purpose of security policies is to help mitigate identified risks. Writing these policies iseasier once you have created an asset inventory list, prioritized that list, and identified the majorrisk exposures found in those assets.The task of identifying your IT assets begins with recognizing that your IT infrastructure andsupporting resources can be divided into the seven IT domains. The benefit of identifying theassets and prioritizing them across those domains is being able to document policies in asystematic and thorough manner.In this lab, you will create a high-level IT asset inventory list, you will prioritize those assets,you will identify the risk exposures, and you will make recommendations for policies that canmitigate the risk exposures.Learning ObjectivesUpon completing this lab, you will be able to:Create a high-level IT asset inventory list.Prioritize the IT assets in terms of importance to a school’s operation and business.Identify the top five risk exposures found in the high-level IT asset assessment.Recommend IT security policies that can help mitigate the identified risk exposures.63Lab #9 Recommending IT Security Policies to HelpMitigate Risk
64 | LAB #10 Case Study in Computer Forensics: Pharmaceutical CompanyDeliverablesUpon completion of this lab, you are required to provide the following deliverables to yourinstructor:1.Lab Report file;2.Lab Assessments file.Instructor DemoThe Instructor will present the instructions for this lab. This will start with a general discussionabout IT asset inventorying, prioritization and qualitative assessments of IT assets, and high-level risk assessment for those IT assets. The Instructor will then present an overview of theFamily Educational Rights and Privacy Act (FERPA) compliance case study.
Hands-On StepsNote:This is a paper-based lab. To successfully complete the deliverables for this lab, you will need access toMicrosoft® Word or another compatible word processor. For some labs, you may also need access to agraphics line drawing application, such as Visio or PowerPoint. Refer to the Preface of this manual forinformation on creating the lab deliverable files.1.On your local computer,createthelab deliverable files.2.ReviewtheLab Assessment Worksheet. You will find answers to these questions as youproceed through the lab steps.Note:Security policies mitigate risks in a wide variety of environments. Some risks are unique to differentenvironments, and some environments produce highly significant risks. To counter these specialenvironments, such as a hospital, school, or financial institution, the government legislates special acts toprovide guidance and countermeasures. This lab uses the environment of a school and the guidance ofthe Family Educational Rights and Privacy Act (FERPA).

Upload your study docs or become a

Course Hero member to access this document

Upload your study docs or become a

Course Hero member to access this document

End of preview. Want to read all 10 pages?

Upload your study docs or become a

Course Hero member to access this document

Term
Spring
Professor
NoProfessor
Tags
Personal computer, FERPA

Newly uploaded documents

Show More

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture