Performing qualitative risk assessment

Assignment Help Basic Computer Science
Reference no: EM132407338

Overview

In this lab, you identified the scope for an IT risk-mitigation plan, you aligned the plan's major parts with the seven domains of an IT infrastructure, you defined the risk-mitigation steps, you defined procedures and processes needed to maintain a security baseline for ongoing mitigation, and you created an outline for an IT risk-mitigation plan.

Lab Assessment Questions and Answers

1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities?

2. Based on your executive summary produced in the Performing a Qualitative Risk Assessment for an IT Infrastructure lab in this lab manual, what is the primary focus of your message to executive management?

3. Given the scenario for your IT risk-mitigation plan, what influence did your scenario have on prioritizing your identified risks, threats, and vulnerabilities?

4. What risk-mitigation solutions do you recommend for handling the following risk element: User inserts CDs and USB hard drives with personal photos, music, and videos on organization-owned computers?

5. What is a security baseline definition?

6. What questions do you have for executive management to finalize your IT risk-mitigation plan?

7. What is the most important risk-mitigation requirement you uncovered and want to communicate to executive management? In your opinion, why is this the most important risk-mitigation requirement?

8. Based on your IT risk-mitigation plan, what is the difference between short-term and long-term risk-mitigation tasks and ongoing duties?

9. For which of the seven domains of a typical IT infrastructure is it easy to implement riskmitigation solutions but difficult to monitor and track effectiveness?

10. Which of the seven domains of a typical IT infrastructure usually contains privacy data in systems, servers, and databases?

11. Which of the seven domains of a typical IT infrastructure can access privacy data and also store it on local hard drives and disks?

12. Why is the Remote Access Domain the most risk-prone of all in a typical IT infrastructure?

13. When considering the implementation of software updates, software patches, and software fixes, why must you test the upgrade or software patch before you implement it as a risk-mitigation tactic?

14. Are risk-mitigation policies, standards, procedures, and guidelines needed as part of your longterm risk-mitigation plan? Why or why not?

15. If an organization under a compliance law is not in compliance, how critical is it for your
organization to mitigate this noncompliance risk element?

Reference no: EM132407338

Questions Cloud

List strategies to prevent spread of the organism : List strategies to prevent spread of the organism, list antimicrobial medication used for treatment i.e. antibiotics, antivirals, or antifungals.
How large should wei dividend payout ratio be next year : According to the residual distribution model (assuming all payments are in the form of dividends), how large should Wei's dividend payout ratio be next year?
How influential can an informal leader be among team members : How influential can an informal leader be among team members? What barriers to effective teamwork can you anticipate and how will it be addressed?
Account in making decisions about program cutbacks : What factors would you take into account in making decisions about program cutbacks?
Performing qualitative risk assessment : Based on your executive summary produced in the Performing a Qualitative Risk Assessment for an IT Infrastructure lab in this lab manual
Discuss the three primary concepts of demarketing : Discuss the three primary concepts of demarketing. Mention when healthcare organizations face opportunities to utilize demarketing strategies.
How to analyze ethical issues : How to analyze ethical issues; feel free to conduct your own research to learn more about these ethical issues - prepare to lead the next staff training
What will be total profit or loss on these option positions : What will be total profit or loss on these option positions if the stock price is $24.60 on the day the options expire?
Percent of the current cash flows : The board announce a plan to pay out 50 percent of the current cash flows as a dividend to its shareholders.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Countries with the largest copper capacity

There are 10 countries with the largest copper capacity in the world have agreed to reduce their copper production capacity

  Develop a project proposal for an it project

The Individual Projects throughout this course will give you an opportunity to put into practice the Project Management concepts you are learning about. For the first week, your mission is to develop a project proposal for an IT project of your..

  Reduces real wealth significantly

Suppose, now, that there is a global stock market crash -- which reduces real wealth significantly, shifting aggregate demand (AD) to the left

  Determining the comparing approaches

Outline the primary ways in which the traditional approach to modeling a use case differs from an object-oriented approach.

  Facebook strong social graph

Facebook's Strong Social Graph: In its early days, Facebook's social graph was considered to be stronger than social graphs created by its competitors. What made it stronger.

  Developing deployment proposal

Many organizations use graphical representation for discussing important proposals. The presentation of your recommendation about investing in an appropriate IT solution to the stakeholders is equally important to the recommendation generating pro..

  Job offers an annual salary

You are considering a job offer. The job offers an annual salary of $42,000, $45,000, and $48,000 a year for the next three years

  Discuss and explain the emerging information needs

Discuss and explain the emerging information needs

  Primary concern of game theory in economics

1. Define a dominant strategy? 2. What is the primary concern of Game theory in economics?

  Why is it governance important

Why is IT Governance important? A situation that could have been prevented had a corporate of IT policy been in place?

  C++ function that receives an integer passed to it

Name the function divide By Two. Name the formal parameter whole Number. (The answers to TRY THIS Exercises are located at the end of the chapter.)

  Why are these changes so difficult to implement

What are your recommendations for long-term growth? Why are these changes so difficult to implement?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd