What is an it risk assessments goal or objective

Assignment Help Computer Engineering
Reference no: EM131192172

Assignment: Performing a Qualitative Risk Assessment for an IT Infrastructure

Overview

In this lab, you defined the purpose of an IT risk assessment, you aligned identified risks, threats, and vulnerabilities to an IT risk assessment that encompasses the seven domains of a typical IT infrastructure, you classified the risks, threats, and vulnerabilities, and you prioritized them.

Finally, you wrote an executive summary that addresses the risk assessment findings, risk assessment impact, and recommendations to remediate areas of noncompliance.

Lab Assessment Questions & Answers

1. What is an IT risk assessment's goal or objective?

2. Why is it difficult to conduct a quantitative risk assessment for an IT infrastructure?

3. What was your rationale in assigning a "1" risk impact/risk factor value of "Critical" to an identified risk, threat, or vulnerability?

4. After you had assigned the "1," "2," and "3" risk impact/risk factor values to the identified risks, threats, and vulnerabilities, how did you prioritize the "1," "2," and "3" risk elements? What would you say to executive management about your final recommended prioritization?

5. Identify a risk-mitigation solution for each of the following risk factors:

a. User downloads and clicks on an unknown e-mail attachment
b. Workstation OS has a known software vulnerability
c. Need to prevent eavesdropping on WLAN due to customer privacy data access
d. Weak ingress/egress traffic-filtering degrades performance
e. DoS/DDoS attack from the WAN/Internet
f. Remote access from home office
g. Production server corrupts database.

Reference no: EM131192172

Questions Cloud

Charges between the terminals of a battery : What from of energy is used to maintain an imbalance of charges between the terminals of a battery?
List and explain the essential psychological tests : List and explain the essential psychological tests and screening instruments that would assist the forensic mental health professional in conducting a CST evaluation. Be sure that you provide enough information to thoroughly explain the theory beh..
Instances of suspicious intrusive activities : Identify a scenario where two instances of suspicious intrusive activities were detected in a computer information system. The two activities might or might not be of the same type (i.e., spam, phishing, DOS, etc.).
What gives rise to the currency exposure at aifs : What gives rise to the currency exposure at AIFS?-  What are the two random variables that Archer-Lock and Tabaczynski have to deal with?
What is an it risk assessments goal or objective : What is an IT risk assessment's goal or objective? Why is it difficult to conduct a quantitative risk assessment for an IT infrastructure?
Matter are present inside the container : A 50.0 g piece of CO2(s) (i.e. "dry ice") is sealed inside a0.250 L container held at 20°C. Based on the phase diagram of CO2(Figure 11.42 in the textbook), what state(s) of matter are present inside the container?
How was your professional work impacted by the stressor : In this portion of the paper, you should provide information from the textbook and an additional source identified from the CSU Library to analyze the impact that the stressful event could have placed upon your health, future goals, and motivation..
Supply chain management is the purchasing strategy : One of the most strategic decisions facing a company in supply chain management is the purchasing strategy. In most industries, cost of raw materials and procured components consume a significant portion of the company's budget.
Deployment services and the windows automated installation : For a highly virtualized data center, how does this change the deployment options available from traditional data centers? Is there any benefit or need in using some of the traditional deployment options (e.g., disk imaging using software like Gho..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Explain a network design for a client

explain a network design for a client that has 50 remote locations in addition to a central headquarters

  What are the kinds of information systems

What are the kinds of information systems

  How to write a python program

design a Python program that would prompt the user for the number of employees to be entered, and then prompt for employee name, followed by wage, followed by hours worked.

  Convert 6bd3h into its binary and decimal equivalent

The following code utilizes a while loop. Assume that sum references a doubleword in the data segment and that count is in the ECX register. Give a fragment of 80x86 cod that implements the design.

  What security issues should be resolved now which cannot

question 1 what security issues must be resolved now which cannot wait for the next version of windows to arrive? are

  Express the service quality problem

discuss the service quality problems that can occur in VOIP. Why are these problems so difficult to solve.

  Define interactions required between a user and a web site

design a flowchart of the interactions required between a user and a web site during a shopping cart "checkout". Possible error conditions such as missing input or invalid credit card numbers.

  Compute the file directory and fat entries

Using a text editor, create a file that is between 5,000 and 6,000 bytes long on a newly formatted floppy disk. compute the file directory and FAT entries for the type of disk used.

  How does implementation differ for product innovation and

how culture affects innovationthe discussion of how different countries governments are involved in the innovation

  Using the division algorithm

Using the division algorithm where the 8 bit dividend is put into a 16 bit register R and the divisor is put into an 8 bit register D, and the result is that the quotient is in the lower half of R and the remainder is in the upper half of R, divid..

  Translate that into physical addresses using a page

You need to read an inputFile.txt which contains integers that are virtual addresses, and I am supposed to translate that into physical addresses using a page table and a transition look aside buffer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd