What is a security baseline definition

Assignment Help Computer Engineering
Reference no: EM132058081

Question: Overview: In this lab, you identified the scope for an IT risk-mitigation plan, you aligned the plan's major parts with the seven domains of an IT infrastructure, you defined the risk-mitigation steps, you defined procedures and processes needed to maintain a security baseline for ongoing mitigation, and you created an outline for an IT risk-mitigation plan.

Lab Assessment Questions & Answers

1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities?

2. Based on your executive summary produced in the Performing a Qualitative Risk Assessment for an IT Infrastructure lab in this lab manual, what is the primary focus of your message to executive management?

3. Given the scenario for your IT risk-mitigation plan, what influence did your scenario have on prioritizing your identified risks, threats, and vulnerabilities?

4. What risk-mitigation solutions do you recommend for handling the following risk element: User inserts CDs and USB hard drives with personal photos, music, and videos on organization-owned computers?

5. What is a security baseline definition?

6. What questions do you have for executive management to finalize your IT risk-mitigation plan?

7. What is the most important risk-mitigation requirement you uncovered and want to communicate to executive management? In your opinion, why is this the most important risk-mitigation requirement?

8. Based on your IT risk-mitigation plan, what is the difference between short-term and long-term risk-mitigation tasks and ongoing duties?

9. For which of the seven domains of a typical IT infrastructure is it easy to implement riskmitigation solutions but difficult to monitor and track effectiveness?

10. Which of the seven domains of a typical IT infrastructure usually contains privacy data in systems, servers, and databases?

11. Which of the seven domains of a typical IT infrastructure can access privacy data and also store it on local hard drives and disks?

12. Why is the Remote Access Domain the most risk-prone of all in a typical IT infrastructure?

13. When considering the implementation of software updates, software patches, and software fixes, why must you test the upgrade or software patch before you implement it as a risk-mitigation tactic?

14. Are risk-mitigation policies, standards, procedures, and guidelines needed as part of your longterm risk-mitigation plan? Why or why not?

15. If an organization under a compliance law is not in compliance, how critical is it for your organization to mitigate this noncompliance risk element?

Reference no: EM132058081

Questions Cloud

Record the transactions in the books of prime entry : May 16 Received cheque from Bruce in settlement of his account. Record the transactions in the books of prime entry. Post the entries in the ledger accounts
Balanced equation for the production of nh3 : The coefficients in the balanced equation for the production of NH3 can be interpreted to correspond to which of the following equation quantities?
Capital structures-What is the break-even EBIT : DAR Corporation is comparing two different capital structures: an all-equity plan (Plan I) and a levered plan (Plan II). What is the break-even EBIT?
Account that standard pressure : Oxygen gas most closely exhibits ideal behaviour under conditions of (high/low) temperature and (high/low) pressure.
What is a security baseline definition : In this lab, you identified the scope for an IT risk-mitigation plan, you aligned the plan's major parts with the seven domains of an IT infrastructure.
Determine the balance of allowance for doubtful accounts : Assume no other transactions occurred that affected the allowance account during March. Determine the balance of Allowance for Doubtful Accounts at March 31
The emergence of trading via ECNs has : A bank-customer relationship gives rise to contractual rights and duties. The emergence of trading via ECNs has:
What is the average percentage by volume of ethanol : What is the average percentage by volume of ethanol for this batch?
What is the concentration of caffeine in tea : A cup of 125 mL of reasonably strong Twinings English BreakfastTM tea has approximately 110 mg of caffeine.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain how erp systems mitigate risk

Using scholarly material, explain how Enterprise Resource Planning (ERP) Systems mitigate risk and assist in organizational decision making.

  Compile and run the program until it works

Write down overloaded Java methods that return the difference of two parameters. Your methods should contain the logic to return the difference of the larger parameter.

  Write down a swing applet that displays

Write down a Swing applet that displays your name (Gary Vega) in blue the first time the user clicks a JButton4, and then displays your name larger and in gray second time the user clicks the JButton. Save program as JBlueGray.java

  Identity theft contribution to terrorism

Pharming, Phishing and Various types of Identity theft contribution to Terrorism in 21st Century.  Provide supporting facts in the form of "charts/graphs" (3 to 4 graphs, no more than 2 pages) and should provide citations for the source work.

  What is the latest status of the fire wire standard

What is the latest status of the Fire Wire standard? Is it going to succumb to the USB standard? Explain your response.

  Management tools for microsoft windows server

Based on the Kercher (2009) article, how can management tools for Microsoft Windows Server 2008 automate user account administration

  Explain the low benefit and cost of pollution control

Assume there are two types of communities in the US, those in which there is a high benefit of pollution control and a high cost of pollustion control.

  What classification systems and descriptions are used

What classification systems and descriptions are used, and how can these be used to compare the features and components of each IDPS

  How many bits are used to store each data type

What data types are supported? How many bits are used to store each data type? How is each data type represented internally?

  Explain what the given program does

Explain what the following 68000 program does. Use the 68000 simulator to test your observations.

  Explain digital resources by relying on search engine result

Explain digital resources by relying on search engine results and distinguishing relevant digital materials from irrelevant materials.

  Write a program which requests that the user enters model

Write a program which requests that the user enters a computer model, year purchased, blue plate number and owner.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd