Lab 6.docx - 1 Running head Lab 6 Assignment Using the...

This preview shows page 1 - 3 out of 8 pages.

1Running head: Lab 6 AssignmentUsing the following table, review the results of your assessments in the Performing aQualitative Risk Assessment for an IT Infrastructure lab in this lab manual. In addition,review the results of how you categorized and prioritized the risks for the IT infrastructurein that labRisks, Threats, and VulnerabilitiesPrimary DomainImpactedRisk Impact/FactorUnauthorized access from public InternetRemote Access Domain1User destroys data in application anddeletes all filesUser Domain2Hacker penetrates your IT infrastructureand gains access to your internal networkUser Domain1Intraoffice employee romance gone badUser Domain3Fire destroys primary data centerSystems/Application Domain 1Service provider service level agreement(SLA) is not achievedWAN Domain3Workstation operating system (OS) has aknown software vulnerabilityWorkstation Domain2Unauthorized access to organization-owned workstationsWorkstation & User Domain3Loss of production dataSystems/Application Domain 2Denial of service attack on organizationDemilitarized Zone (DMZ) and e-mailserverSystem/Application Domain1Remote communications from home officeRemote Access Domain3Local Area Network (LAN) server OS has aknown software vulnerabilityLAN Domain1User downloads and clicks on an unknowne-mail attachmentUser Domain3Workstation browser has a softwarevulnerabilityWorkstation Domain2Mobile employee needs secure browseraccess to sales-order entry systemUser Domain3Service provider has a major networkoutageWAN Domain1Weak ingress/egress traffic-filteringdegrades performanceLAN-to-WAN Domain3User inserts CDs and USB hard drives withpersonal photos, music, and videos onUser Domain3
2Lab 6 Assignmentorganization-owned computersVirtual Private Network (VPN)tunneling between remote computer andingress/egress router is neededRemote Access Domain2Wireless Local Area Network (WLAN)access points are needed for LANconnectivity within a warehouseLAN-to-WAN Domain2Need to prevent eavesdropping on WLANdue to customer privacy data accessLAN-to-WAN Domain2Denial of service (DoS)/distributed denialof service (DDoS) attack from the WideArea Network (WAN)/InternetLAN-to-WAN Domain 2Describe the purpose of prioritizing the risks prior to creating a risk-mitigation plan.

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture