What is an it risk assessments goal or objective

Assignment Help Computer Engineering
Reference no: EM131192172

Assignment: Performing a Qualitative Risk Assessment for an IT Infrastructure

Overview

In this lab, you defined the purpose of an IT risk assessment, you aligned identified risks, threats, and vulnerabilities to an IT risk assessment that encompasses the seven domains of a typical IT infrastructure, you classified the risks, threats, and vulnerabilities, and you prioritized them.

Finally, you wrote an executive summary that addresses the risk assessment findings, risk assessment impact, and recommendations to remediate areas of noncompliance.

Lab Assessment Questions & Answers

1. What is an IT risk assessment's goal or objective?

2. Why is it difficult to conduct a quantitative risk assessment for an IT infrastructure?

3. What was your rationale in assigning a "1" risk impact/risk factor value of "Critical" to an identified risk, threat, or vulnerability?

4. After you had assigned the "1," "2," and "3" risk impact/risk factor values to the identified risks, threats, and vulnerabilities, how did you prioritize the "1," "2," and "3" risk elements? What would you say to executive management about your final recommended prioritization?

5. Identify a risk-mitigation solution for each of the following risk factors:

a. User downloads and clicks on an unknown e-mail attachment
b. Workstation OS has a known software vulnerability
c. Need to prevent eavesdropping on WLAN due to customer privacy data access
d. Weak ingress/egress traffic-filtering degrades performance
e. DoS/DDoS attack from the WAN/Internet
f. Remote access from home office
g. Production server corrupts database.

Reference no: EM131192172

Questions Cloud

Charges between the terminals of a battery : What from of energy is used to maintain an imbalance of charges between the terminals of a battery?
List and explain the essential psychological tests : List and explain the essential psychological tests and screening instruments that would assist the forensic mental health professional in conducting a CST evaluation. Be sure that you provide enough information to thoroughly explain the theory beh..
Instances of suspicious intrusive activities : Identify a scenario where two instances of suspicious intrusive activities were detected in a computer information system. The two activities might or might not be of the same type (i.e., spam, phishing, DOS, etc.).
What gives rise to the currency exposure at aifs : What gives rise to the currency exposure at AIFS?-  What are the two random variables that Archer-Lock and Tabaczynski have to deal with?
What is an it risk assessments goal or objective : What is an IT risk assessment's goal or objective? Why is it difficult to conduct a quantitative risk assessment for an IT infrastructure?
Matter are present inside the container : A 50.0 g piece of CO2(s) (i.e. "dry ice") is sealed inside a0.250 L container held at 20°C. Based on the phase diagram of CO2(Figure 11.42 in the textbook), what state(s) of matter are present inside the container?
How was your professional work impacted by the stressor : In this portion of the paper, you should provide information from the textbook and an additional source identified from the CSU Library to analyze the impact that the stressful event could have placed upon your health, future goals, and motivation..
Supply chain management is the purchasing strategy : One of the most strategic decisions facing a company in supply chain management is the purchasing strategy. In most industries, cost of raw materials and procured components consume a significant portion of the company's budget.
Deployment services and the windows automated installation : For a highly virtualized data center, how does this change the deployment options available from traditional data centers? Is there any benefit or need in using some of the traditional deployment options (e.g., disk imaging using software like Gho..

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd