Security baseline definition for ongoing risk mitigation

Assignment Help Basic Computer Science
Reference no: EM132354008

Introduction

Identifying and assessing risks is challenging, but treating them is another matter entirely.

Treating risks means making changes based on a risk assessment and probably a few hard decisions. When treating even the most straightforward of risks, practice due diligence by documenting what steps you are taking to mitigate the risk. If you don't document the change and the reasoning behind it, it's possible that your organization could reverse the mitigation and reintroduce the risk based on the notion of "but that's how we always did it before."

After you've addressed a risk, appoint someone to make certain that the risk treatment is being regularly applied. If a security incident arises even with the change in place, having a single person in charge will ensure that any corrective action aligns with the risk-mitigation plan. You're not appointing someone so you can blame that person if things go wrong; you are instead investing that individual with the autonomy to manage the incident effectively. The purpose of a risk-mitigation plan is to define and document procedures and processes to establish a baseline for ongoing mitigation of risks in the seven domains of an IT infrastructure.

In this lab, you will identify the scope for an IT risk-mitigation plan, you will align the plan's major parts with the seven domains of an IT infrastructure, you will define the risk-mitigation steps, you will define procedures and processes needed to maintain a security baseline for
ongoing mitigation, and you will create an outline for an IT risk-mitigation plan.

Learning Objectives

Upon completing this lab, you will be able to:

Identify the scope for an IT risk-mitigation plan focusing on the seven domains of a typical IT infrastructure.

Align the major parts of an IT risk-mitigation plan in each of the seven domains of a typical IT infrastructure.

Define the tactical risk-mitigation steps needed to remediate the identified risks, threats, and vulnerabilities commonly found in the seven domains of a typical IT infrastructure.

Define procedures and processes needed to maintain a security baseline definition for ongoing risk mitigation in the seven domains of a typical IT infrastructure.

Create an outline for an IT risk-mitigation plan encompassing the seven domains of a typical IT infrastructure.

Attachment:- Developing Risk-Mitigation Plan.rar

Reference no: EM132354008

Questions Cloud

Why sales of the popular model have dropped : Hypothesis of why sales of the popular model have dropped based upon data analysis. Reference the Excel file that summarizes the data findings that resulted.
Analyse the viability of the business model : MT607 Innovation, Creativity & Entrepreneurship Assignment - Business Pitch, Laureate International Universities, Australia. Analyse viability of business model
Analyze and synthesize a harvard business review case study : OLM 511 - Systems Dynamics and Change - Peirce College in Philadelphia - Case Study Review: The Army Crew Team Paper Guidelines
What type of data collection is needed for pavement : Create a new posting. As indicated above, identify what type of critical infrastructure data collection is needed for pavement and storm water management.
Security baseline definition for ongoing risk mitigation : Define procedures and processes needed to maintain security baseline definition for ongoing risk mitigation in seven domains of typical IT infrastructure.
Discuss developments in database development history to date : Explore history of database systems and discuss the three most important developments in database development history to date.
Should an organization rehearse its contingency plans : ISOL 632 Business Continuity Plan & Disaster Recovery Plan - Why did the presence of a live attacker cause more concern than a scripted attack
Define what is meant by information : In this unit, you have learned about management information systems (MIS) and the importance of it. For this assignment, compose a paper that discusses the key.
Write a essay related to the healthcare field : Write a 5 paragraph essay related to the healthcare field/three major points are required: Use a variety of sentences, Use transitional words.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd