Identify threats to the seven domains of it

Assignment Help Computer Engineering
Reference no: EM133558484

Case Study: Fertilizer Plus is a small agricultural company that produces and sells fertilizer products. The company headquarters is in a small town in Indiana. In addition to its headquarters, there are two large production facilities-one in Nebraska and the other in Oklahoma. Furthermore, Fertilizer Plus employs salespersons in every state in the United States to serve its customers locally.

The company has three servers located at its headquarters-an Active Directory server, a Linux application server, and an Oracle database server. The application server hosts Fertilizer Plus's primary software application, which is a proprietary program managing inventory, sales, supply chain, and customer information. The database server manages all data stored locally with direct-attached storage.

All three sites use Ethernet-cabled local area networks (LANs) to connect the users' Windows 7 workstations via industry-standard managed switches.

The remote production facilities connect to headquarters via routers with T-1 LAN connections provided by an external internet service provider (ISP), and share an internet connection through a firewall at headquarters.

Individual salespersons throughout the country connect to the Fertilizer Plus network via virtual private network (VPN) software through their individual internet connections, typically in a home office.

Questions: Assume the role of IT professionals assigned by Fertilizer Plus's IT management to conduct the following risk management tasks:

  1. Identify threats to the seven domains of IT within the organization.
  2. Identify vulnerabilities in the seven domains of IT within the organization.
  3. Identify threat/vulnerability pairs to determine threat actions that could pose risks to the organization.
  4. Estimate the likelihood of each threat action identified (i.e., high, medium, low).
  5. Prepare a brief report or presentation of your findings for IT management to review.

 

 

Reference no: EM133558484

Questions Cloud

Create quizzes and test users based on the quizzes : You are asked to create a program that will be used to create quizzes and test users based on these quizzes.
Eight different project delivery methods : List the eight different project delivery methods listed in the book. You've won $50,000,000 in the lottery and want to build a bank to hold all your money.
How a worker would order a lunch using your application : Write a short scenario describing how a worker would order a lunch using your application. Provide a hierarchical task diagram and description of the lunch
Moral responsibility to future generations : To what extent do humans have a moral responsibility to future generations that are yet to be born? Explain your reasoning.
Identify threats to the seven domains of it : Identify threats to the seven domains of IT within the organization. Identify vulnerabilities in the seven domains of IT within the organization.
What tips did you learn about effective presentations : What common mistakes do people make when presenting information to a group? What tips did you learn about effective PowerPoint presentations?
What is malware and why we use malware : What is malware? Why we use malware? What are the key concepts of malware ? What is dumpster diving ? Why er use dumspter diving? What are the key concepts
Starting restaurant in your community : Imagine you are thinking of starting a restaurant in your community. Describe how the free market system works for the restaurant business.
Discuss the role of the negotiation team : Define and describe ethics and ethical reasoning. Discuss the role of the negotiation team. Discuss the pros and cons of negotiation teams.

Reviews

Write a Review

Computer Engineering Questions & Answers

  How to use control flow to track membership

Using the Internet and other resources, discuss and study "control flow" in programming. How would you use control flow in computer programming to solve problems? Give an example of how you would use control flow to track membership dues in a smal..

  Discuss how to access team productivity

Discuss how to access team productivity: What conditions need to be in place for teams to excel and why? Suggestion ways to design teamwork so that threats.

  Is there a flaw in this scheme

Information & Network Security. Alice and Bob agree to communicate privately via email using a scheme based on RC4, but they want to avoid using a new secret key for each transmission.

  Specify all the properties

Specify all the properties - reflexive, antisymmetric, symmetric, transitive they have.

  How they apply to the criminal event

Identify the relevant U.S. Laws covered in Chapter 2 of the textbook and how they apply to the criminal event. What investigative processes will computer

  Describing the purpose of a browser

Use the information in the video and this week's in-class presentation to write a 250-300 word short essay describing the purpose of a browser, browser wars.

  What is the largest number of nand operators required

Express each of the different Boolean expressions in three variables in disjunctive normal form with just the NAND operator.

  Define in detail minimum five practices

Your Web design firm has just hired a talented graphic artist with years of expertise in print media and no experience with producing image production. You have to train this person in the best practices for Web graphics. Explain in detail minimum..

  Identify single-variable unconstrained minimization problem

Identify a single-variable unconstrained minimization problem relevant to engineering. That is, your minimization should arise in the solution of some real-world, physicallybased design or analysis problem

  What is a cryptosystem and what services can cryptosystems

What is a cryptosystem and what services can cryptosystems provide? Give an example of a cryptosystem and describe its operation

  Perform the steps of abstraction and refinement on them

Bees shall spawn from the hive when the user interacts with the hive. Bees shall be able to move from the hive to a flower.

  Write another model program for the newsreader

Write another model program, implementation, and stepper for the newsreader, where each action returns value of all three state variables as C# out parameters.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd