Intraoffice employee romance gone bad user domain 3 3

This preview shows page 3 - 5 out of 9 pages.

Intraoffice employee romance gone bad User Domain 3 3 This may not affect your system much. But, employees need to know and practice ethics in workplace to avoid vulnerabilities that can lead to instances such as phishing. Fire destroys primary data center System/Application domain 2 1 Always ensure that your structures have met the quality evaluation standards on disaster control management e.g. fire. Backing up your data is a practice you shouldn’t avoid. Service provider service level agreement (SLA) is not achieved WAN domain 3 2 Before entering into agreements to any service provider, ensure that you have evaluated them and they have met the quality specification and they are in conformance to set work standards. Workstation operating system (OS) has a known software vulnerability Workstation Domain 3 2 Ensure all software in your organization is up to date. Outdated software can pose vulnerability. Unauthorized access to organization- owned workstations Workstation Domain 2 1 Unauthorized access can lead to damage of critical infrastructure and data. Always ensure that there are proper physical controls such as authentication systems. Loss of production data System/Application 2 1
Lab#6 Developing a Risk-Mitigation Plan Outline for an IT Infrastructure 4 Domain Always pack up your data. Check the system regularly for any suspicious activities. Denial of service attack on organization Demilitarized Zone (DMZ) and e-mail server System/Application Domain 2 1 This can lead to lose of important emails and some critical details in them. Always caution employees against sharing their credentials to third parties. Remote communications from home office Remote access domain 3 3 Although it may not pose a serious threat, ensure remote based users are used a well-protected network and access it within their privileges. Local Area Network (LAN) server OS has a known software vulnerability Workstation domain 3 2 Ensure that your software is always up to date. There shouldn’t be any room for vulnerability because that is a threat. User downloads and clicks on an unknown e-mail attachment Workstation Domain 2 2 This can lead to malicious attacks from hackers. Always caution users against opening emails and websites from suspicious sources. Such emails should be reported immediately to admin. Workstation browser has a software vulnerability Workstation Domain 3 2 Most application vulnerabilities are always associated with outdated software. So ensure your applications are always up to date Mobile employee needs secure browser access to sales-order entry system Remote Access Domain 1 The secure browser will be vital because the mobile employee will need to access customer information

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture

  • Left Quote Icon

    Student Picture