SAITEJA LAB 6.docx - Running Head LAB 6 1 Lab 6 Questions...

This preview shows page 1 - 5 out of 7 pages.

Running Head: LAB 6 1 Lab 6: Questions and Answers Student’s Name Institutional Affiliation
Lab 6 2 Lab 6: Questions and Answers Task 4 Risks, Threats, and Vulnerabilities Primary Domain Impacted Risk Impact/ Factor Unauthorized access from public Internet LAN-to-WAN 1 User destroys data in application and deletes all files User 2 Hacker penetrates your IT infrastructure and gains access to your internal network System/ Application 1 Intraoffice employee romance gone bad User 3 Fire destroys primary data center LAN 1 Service provider service level agreement (SLA) is not achieved LAN-to-WAN 1 Workstation operating system (OS) has a known software vulnerability LAN-to-WAN 3 Unauthorized access to organization owned workstations User 2 Loss of production data System/ Application 2 Denial of service attack on organization Demilitarized Zone (DMZ) and e-mail server LAN-to-WAN 2 Remote communications from home office Remote Access 2 Local Area Network (LAN) server OS has a known software vulnerability LAN 3 User downloads and clicks on an unknown e-mail attachment User 2 Workstation browser has a software vulnerability Workstation 3 Mobile employee needs secure browser access to sales-order entry system Remote Access 1 Service provider has a major network WAN 3
Lab 6 3 outage Weak ingress/egress traffic-filtering degrades performance LAN-to-WAN 2 User inserts CDs and USB hard drives with personal photos, music, and videos on organization-owned computers User 1 Virtual Private Network (VPN) tunneling between remote computer and ingress/egress router is needed Remote Access 1 Wireless Local Area Network (WLAN) access points are needed for LAN connectivity within a warehouse LAN-to-WAN 2 Need to prevent eavesdropping on WLAN due to customer privacy data access WAN 1 Denial of service (DoS)/distributed denial of service (DDoS) attack from the Wide Area Network (WAN)/Internet WAN 1 Task 5 Only one risk, threat or vulnerability under critical 1 exists where a user gets to destroy data at the application stage, deleting all the files and gaining access to the internal network. The risk is evident since it can easily affect compliance to the law thus increasing harm to the organization through increased liability. Task 9 The purpose of prioritizing risks before developing a risk mitigation plan is to ensure an extensive risk assessment process is incorporated into the plan. It also helps in categorization of
Lab 6 4 risks where in a given category, a large number of risks may exist thus leading to development of

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture