Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Risks threats and vulnerabilities commonly found in the workstation domain

22/11/2021 Client: muhammad11 Deadline: 2 Day

Student Lab Manual

Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011 www.jblearning.com All Rights Reserved. -3-

Laboratory #1 Lab 1: How to Identify Threats & Vulnerabilities in an IT Infrastructure Learning Objectives and Outcomes Upon completing this lab, students will be able to:

• Identify common risks, threats, and vulnerabilities found throughout the seven domains of a

typical IT infrastructure

• Align risks, threats, and vulnerabilities to one of the seven domains of a typical IT infrastructure

• Given a scenario, prioritize risks, threats, and vulnerabilities based on their risk impact to the

organization from a risk assessment perspective

• Prioritize the identified critical, major, and minor risks, threats, and software vulnerabilities found

throughout the seven domains of a typical IT infrastructure

Required Setup and Tools This is a paper-based lab and does not require the use of the ISS “mock” IT infrastructure or virtualized

server farm.

The standard Instructor and Student VM workstation with Microsoft Office 2007 or higher is required for

this lab. Students will need access to Lab #1 – Assessment Worksheet Part A (a list of 21 risks, threats,

and vulnerabilities commonly found in an IT infrastructure) and must identify which of the seven

domains of a typical IT infrastructure the risk, threat, or vulnerability impacts.

In addition, Microsoft Word is a required tool for the student to craft an executive summary for

management summarizing the findings and alignment of the identified risks, threats, and vulnerabilities

that were found. Recommended Procedures Lab #1 – Student Steps: Student steps needed to perform Lab #1 – Identify Threats and Vulnerabilities in an IT Infrastructure:

1. Connect your removable hard drive or USB hard drive to a classroom workstation.

2. Boot up your classroom workstation and DHCP for an IP host address.

3. Login to your classroom workstation and enable Microsoft Word.

4. Review Figure 1 – Seven Domains of a Typical IT Infrastructure.

Student Lab Manual

Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011 www.jblearning.com All Rights Reserved. -4-

5. Discuss how risk can impact each of the seven domains of a typical IT infrastructure: User,

Workstation, LAN, LAN-to-WAN, WAN, Remote Access, Systems/Applications Domains.

6. Work on Lab #1 – Assessment Worksheet Part A. Part A is a matching exercise that requires the

students to align the risk, threat, or vulnerability with one of the seven domains of a typical IT

infrastructure where there is a risk impact or risk factor to consider. Students may work in small

groups of two or three.

7. Have the students perform Lab #1 – Assessment Worksheet

8. Answer Lab #1 – Assessment Questions and submit.

Figure 1 – Seven Domains of a Typical IT Infrastructure

Deliverables

Upon completion of Lab #1 – Identify Threats and Vulnerabilities in an IT Infrastructure, students are

required to provide the following deliverables as part of this lab:

1. Lab #1 – Assessment Worksheet Part A. Identification and mapping of 21 risks, threats, and

vulnerabilities to the seven domains of a typical IT infrastructure

2. Lab #1 - Assessment Questions and Answers

Student Lab Manual

Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011 www.jblearning.com All Rights Reserved. -5-

Evaluation Criteria and Rubrics The following are the evaluation criteria and rubrics for Lab #1 that the students must perform:

1. Was the student able to identify common risks, threats, and vulnerabilities found throughout the

seven domains of a typical IT infrastructure? – [ 25%]

2. Was the student able to align risks, threats, and vulnerabilities to one of the seven domains of a

typical IT infrastructure accurately? – [ 25%]

3. Given a scenario in Part A, was the student able to prioritize risks, threats, and vulnerabilities

based on their risk impact to the organization? – [ 25%]

4. Was the student able to prioritize the identified critical, major, and minor risks, threats, and

software vulnerabilities? – [ 25%]

Student Lab Manual

Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011 www.jblearning.com All Rights Reserved. -6-

Lab #1: Assessment Worksheet

Part A – List of Risks, Threats, and Vulnerabilities

Commonly Found in an IT Infrastructure

Course Name: _____________________________________________________________ Student Name: _____________________________________________________________ Instructor Name: ___________________________________________________________ Lab Due Date: _____________________________________________________________ Overview

The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing

patients with life-threatening situations. Given the list, select which of the seven domains of a typical IT

infrastructure is primarily impacted by the risk, threat, or vulnerability.

Risk – Threat – Vulnerability Primary Domain Impacted Unauthorized access from public Internet

User destroys data in application and deletes all files

Hacker penetrates your IT infrastructure and gains access to your internal network

Intra-office employee romance gone bad

Fire destroys primary data center

Communication circuit outages

Workstation OS has a known software vulnerability

Unauthorized access to organization owned

Workstations

Loss of production data

Denial of service attack on organization e-mail Server

Student Lab Manual

Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011 www.jblearning.com All Rights Reserved. -7-

Risk – Threat – Vulnerability Primary Domain Impacted Remote communications from home office

LAN server OS has a known software vulnerability User downloads an unknown e –mail attachment Workstation browser has software vulnerability Service provider has a major network outage Weak ingress/egress traffic filtering degrades Performance User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers VPN tunneling between remote computer and ingress/egress router WLAN access points are needed for LAN connectivity within a warehouse Need to prevent rogue users from unauthorized WLAN access

Student Lab Manual

Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011 www.jblearning.com All Rights Reserved. -8-

Lab #1: Assessment Worksheet

Identify Threats and Vulnerabilities in an IT Infrastructure

Course Name: _____________________________________________________________ Student Name: _____________________________________________________________ Instructor Name: ___________________________________________________________ Lab Due Date: _____________________________________________________________ Overview

One of the most important first steps to risk management and implementing a risk mitigation strategy is to

identify known risks, threats, and vulnerabilities and organize them. The purpose of the seven domains of

a typical IT infrastructure is to help organize the roles, responsibilities, and accountabilities for risk

management and risk mitigation. This lab requires students to identify risks, threats, and vulnerabilities

and map them to the domain that these impact from a risk management perspective.

Lab Assessment Questions

Given the scenario of a healthcare organization, answer the following Lab #1 assessment questions from a risk management perspective:

1. Healthcare organizations are under strict compliance to HIPPA privacy requirements which require

that an organization have proper security controls for handling personal healthcare information (PHI)

privacy data. This includes security controls for the IT infrastructure handling PHI privacy data.

Which one of the listed risks, threats, or vulnerabilities can violate HIPPA privacy requirements? List

one and justify your answer in one or two sentences.

2. How many threats and vulnerabilities did you find that impacted risk within each of the seven

domains of a typical IT infrastructure?

User Domain:

Workstation Domain:

LAN Domain:

LAN-to-WAN Domain:

WAN Domain:

Student Lab Manual

Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011 www.jblearning.com All Rights Reserved. -9-

Remote Access Domain:

Systems/Application Domain:

3. Which domain(s) had the greatest number of risks, threats, and vulnerabilities?

4. What is the risk impact or risk factor (critical, major, minor) that you would qualitatively assign to the

risks, threats, and vulnerabilities you identified for the LAN-to-WAN Domain for the healthcare and

HIPPA compliance scenario?

5. Of the three Systems/Application Domain risks, threats, and vulnerabilities identified, which one

requires a disaster recovery plan and business continuity plan to maintain continued operations during

a catastrophic outage?

6. Which domain represents the greatest risk and uncertainty to an organization?

7. Which domain requires stringent access controls and encryption for connectivity to corporate

resources from home?

8. Which domain requires annual security awareness training and employee background checks for

sensitive positions to help mitigate risk from employee sabotage?

9. Which domains need software vulnerability assessments to mitigate risk from software

vulnerabilities?

10. Which domain requires AUPs to minimize unnecessary User initiated Internet traffic and can be

monitored and controlled by web content filters?

Student Lab Manual

Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011 www.jblearning.com All Rights Reserved. -10-

11. In which domain do you implement web content filters?

12. If you implement a wireless LAN (WLAN) to support connectivity for laptops in the Workstation

Domain, which domain does WLAN fall within?

13. A bank under Gramm-Leach-Bliley-Act (GLBA) for protecting customer privacy has just

implemented their online banking solution allowing customers to access their accounts and perform

transactions via their computer or PDA device. Online banking servers and their public Internet

hosting would fall within which domains of security responsibility?

14. Customers that conduct online banking using their laptop or personal computer must use HTTPS:, the

secure and encrypted version of HTTP: browser communications. HTTPS:// encrypts webpage data

inputs and data through the public Internet and decrypts that webpage and data once displayed on

your browser. True or False.

15. Explain how a layered security strategy throughout the 7-domains of a typical IT infrastructure can

help mitigate risk exposure for loss of privacy data or confidential data from the Systems/Application

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Assignment Hut
Smart Tutor
Engineering Solutions
Assignment Solver
A Grade Exams
Top Quality Assignments
Writer Writer Name Offer Chat
Assignment Hut

ONLINE

Assignment Hut

I am a PhD writer with 10 years of experience. I will be delivering high-quality, plagiarism-free work to you in the minimum amount of time. Waiting for your message.

$43 Chat With Writer
Smart Tutor

ONLINE

Smart Tutor

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$46 Chat With Writer
Engineering Solutions

ONLINE

Engineering Solutions

I am a PhD writer with 10 years of experience. I will be delivering high-quality, plagiarism-free work to you in the minimum amount of time. Waiting for your message.

$41 Chat With Writer
Assignment Solver

ONLINE

Assignment Solver

I will be delighted to work on your project. As an experienced writer, I can provide you top quality, well researched, concise and error-free work within your provided deadline at very reasonable prices.

$42 Chat With Writer
A Grade Exams

ONLINE

A Grade Exams

Being a Ph.D. in the Business field, I have been doing academic writing for the past 7 years and have a good command over writing research papers, essay, dissertations and all kinds of academic writing and proofreading.

$39 Chat With Writer
Top Quality Assignments

ONLINE

Top Quality Assignments

I am a professional and experienced writer and I have written research reports, proposals, essays, thesis and dissertations on a variety of topics.

$28 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Business ethics - 3 phase colour code singapore - Jasper jones charlie's parents - In praise of the f word - Do stingrays have teeth - Breadboard projects for beginners pdf - Qualitative analysis of group 1 cations lab report conclusion - Sam excel project - Symphonic line rg14 edition - Budgeting and finance - Weber unit of magnetic flux - Do not go gentle into that good night title meaning - Antique white usa colour combination - Different roles that people play in the design, development, and use of information systems. - Klein isd two step equations distributive property answers - November 2013 maths mark scheme - Global warming - Article analysis by 10/16 /2020 at 6:00 pm please add references - Brightpath early learning inc - The hollywood film industry reading answers - Vals segmentation - Wall street journal magazine editorial calendar - List of 2005 playstation 2 games - Essentialfunctions xlsx at www seletraining com - Your inner fish chapter 2 - Powerpoint elbow connector orientation - The metamorphosis family relationships - MGT312T Week 4 Knowledge Check SCORE 100 PERCENT3 - Volume of hydrogen gas at stp - True false making data secure means keeping it secret - True or false comic relief is only found in comedies - Alliterative adjective name game - Briggs and stratton twin cylinder engine manual - Unlike the classical economists keynes asserted that - What football defensive position is dubbed a rover or monster - REP 2 - Eli lilly ranbaxy joint venture case - Tesla strategic business units - Ravi puravankara email id - Discusison(MIS) - Policy & politics in nursing and healthcare 7th ed - Why does pure water not conduct electricity - Senior bookkeeper job description - 12460 uncle charlies spur dunkirk md - Mini-Project #1: - Application level gateway firewall - Mother tongue close reader answers - John edgar wideman quotes - Words that describe jay gatsby - Voltmeter and ammeter lab report - 2 PAGE CASE STUDY on Diversity, inclusion, and followership (Article provided) - Master of rehabilitation counselling - Discussion 3 - Security Threats & Vulnerabilities - Writing essay - Which of the following transactions occurred in the marketspace? - Describe the relationship between mandela and pienaar - What are the side effects of diabex - A box contains 6 blue marbles and 4 red marbles - Business jet makers eye china - Abb case study answers - Air lock in tap - International finance mcq questions and answers - Application of trapezoidal rule in engineering - 2 http www youtube com watch v ufkafo_etke - Gu health cover guide - Alanis morissette ironic controversy - Sulfuric acid h2so4 is a common laboratory chemical - Isbn 13 978 0 13 283487 2 - Jewelry worn by barbara stanwyck in double indemnity crossword - Inténtalo textbook escribe el equivalente de las palabras en inglés - Compensation Strategies, Best Practices, and Challenges Presentation - Allen johnson claims that patriarchy is - Tricky problem solving questions - Global Societal Problem, Argument and Solution - Bayonne packaging case study solution - Consider the following segment table - Michelle o connor unsw - Stand a bottle carnival game - Eurydice poem analysis duffy - Semester paper - When was the richter scale invented - Form 18a tenancy agreement - Ways of conquest by denise levertov analysis - Clinical Field Experience A: Understanding Collaboration - Roles and Responsibilities - Supply chain management case study walmart - Week 7 Discussion - Fj benjamin annual report - Relational database schema normalization is not for - The old lady who swallowed a pie - Parkland primary school bradford - Liu zhang operates lawson consulting - Hierarchical page table example - Positive transfer of skills examples - Ib biology syllabus guide - Theory of games and economic behavior summary - Mcgraw hill auditing and assurance services - Anth journal - HRM 652 EVALUATING RESULTS AND BENEFITS - Cengage medical terminology chapter 1