Performing qualitative risk assessment

Assignment Help Basic Computer Science
Reference no: EM132407338

Overview

In this lab, you identified the scope for an IT risk-mitigation plan, you aligned the plan's major parts with the seven domains of an IT infrastructure, you defined the risk-mitigation steps, you defined procedures and processes needed to maintain a security baseline for ongoing mitigation, and you created an outline for an IT risk-mitigation plan.

Lab Assessment Questions and Answers

1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities?

2. Based on your executive summary produced in the Performing a Qualitative Risk Assessment for an IT Infrastructure lab in this lab manual, what is the primary focus of your message to executive management?

3. Given the scenario for your IT risk-mitigation plan, what influence did your scenario have on prioritizing your identified risks, threats, and vulnerabilities?

4. What risk-mitigation solutions do you recommend for handling the following risk element: User inserts CDs and USB hard drives with personal photos, music, and videos on organization-owned computers?

5. What is a security baseline definition?

6. What questions do you have for executive management to finalize your IT risk-mitigation plan?

7. What is the most important risk-mitigation requirement you uncovered and want to communicate to executive management? In your opinion, why is this the most important risk-mitigation requirement?

8. Based on your IT risk-mitigation plan, what is the difference between short-term and long-term risk-mitigation tasks and ongoing duties?

9. For which of the seven domains of a typical IT infrastructure is it easy to implement riskmitigation solutions but difficult to monitor and track effectiveness?

10. Which of the seven domains of a typical IT infrastructure usually contains privacy data in systems, servers, and databases?

11. Which of the seven domains of a typical IT infrastructure can access privacy data and also store it on local hard drives and disks?

12. Why is the Remote Access Domain the most risk-prone of all in a typical IT infrastructure?

13. When considering the implementation of software updates, software patches, and software fixes, why must you test the upgrade or software patch before you implement it as a risk-mitigation tactic?

14. Are risk-mitigation policies, standards, procedures, and guidelines needed as part of your longterm risk-mitigation plan? Why or why not?

15. If an organization under a compliance law is not in compliance, how critical is it for your
organization to mitigate this noncompliance risk element?

Reference no: EM132407338

Questions Cloud

List strategies to prevent spread of the organism : List strategies to prevent spread of the organism, list antimicrobial medication used for treatment i.e. antibiotics, antivirals, or antifungals.
How large should wei dividend payout ratio be next year : According to the residual distribution model (assuming all payments are in the form of dividends), how large should Wei's dividend payout ratio be next year?
How influential can an informal leader be among team members : How influential can an informal leader be among team members? What barriers to effective teamwork can you anticipate and how will it be addressed?
Account in making decisions about program cutbacks : What factors would you take into account in making decisions about program cutbacks?
Performing qualitative risk assessment : Based on your executive summary produced in the Performing a Qualitative Risk Assessment for an IT Infrastructure lab in this lab manual
Discuss the three primary concepts of demarketing : Discuss the three primary concepts of demarketing. Mention when healthcare organizations face opportunities to utilize demarketing strategies.
How to analyze ethical issues : How to analyze ethical issues; feel free to conduct your own research to learn more about these ethical issues - prepare to lead the next staff training
What will be total profit or loss on these option positions : What will be total profit or loss on these option positions if the stock price is $24.60 on the day the options expire?
Percent of the current cash flows : The board announce a plan to pay out 50 percent of the current cash flows as a dividend to its shareholders.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd