Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

System application domain risks

18/03/2021 Client: saad24vbs Deadline: 2 Day

Student Lab Manual

Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011 www.jblearning.com All Rights Reserved. -3-

Laboratory #1 Lab 1: How to Identify Threats & Vulnerabilities in an IT Infrastructure Learning Objectives and Outcomes Upon completing this lab, students will be able to:

• Identify common risks, threats, and vulnerabilities found throughout the seven domains of a

typical IT infrastructure

• Align risks, threats, and vulnerabilities to one of the seven domains of a typical IT infrastructure

• Given a scenario, prioritize risks, threats, and vulnerabilities based on their risk impact to the

organization from a risk assessment perspective

• Prioritize the identified critical, major, and minor risks, threats, and software vulnerabilities found

throughout the seven domains of a typical IT infrastructure

Required Setup and Tools This is a paper-based lab and does not require the use of the ISS “mock” IT infrastructure or virtualized

server farm.

The standard Instructor and Student VM workstation with Microsoft Office 2007 or higher is required for

this lab. Students will need access to Lab #1 – Assessment Worksheet Part A (a list of 21 risks, threats,

and vulnerabilities commonly found in an IT infrastructure) and must identify which of the seven

domains of a typical IT infrastructure the risk, threat, or vulnerability impacts.

In addition, Microsoft Word is a required tool for the student to craft an executive summary for

management summarizing the findings and alignment of the identified risks, threats, and vulnerabilities

that were found. Recommended Procedures Lab #1 – Student Steps: Student steps needed to perform Lab #1 – Identify Threats and Vulnerabilities in an IT Infrastructure:

1. Connect your removable hard drive or USB hard drive to a classroom workstation.

2. Boot up your classroom workstation and DHCP for an IP host address.

3. Login to your classroom workstation and enable Microsoft Word.

4. Review Figure 1 – Seven Domains of a Typical IT Infrastructure.

Student Lab Manual

Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011 www.jblearning.com All Rights Reserved. -4-

5. Discuss how risk can impact each of the seven domains of a typical IT infrastructure: User,

Workstation, LAN, LAN-to-WAN, WAN, Remote Access, Systems/Applications Domains.

6. Work on Lab #1 – Assessment Worksheet Part A. Part A is a matching exercise that requires the

students to align the risk, threat, or vulnerability with one of the seven domains of a typical IT

infrastructure where there is a risk impact or risk factor to consider. Students may work in small

groups of two or three.

7. Have the students perform Lab #1 – Assessment Worksheet

8. Answer Lab #1 – Assessment Questions and submit.

Figure 1 – Seven Domains of a Typical IT Infrastructure

Deliverables

Upon completion of Lab #1 – Identify Threats and Vulnerabilities in an IT Infrastructure, students are

required to provide the following deliverables as part of this lab:

1. Lab #1 – Assessment Worksheet Part A. Identification and mapping of 21 risks, threats, and

vulnerabilities to the seven domains of a typical IT infrastructure

2. Lab #1 - Assessment Questions and Answers

Student Lab Manual

Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011 www.jblearning.com All Rights Reserved. -5-

Evaluation Criteria and Rubrics The following are the evaluation criteria and rubrics for Lab #1 that the students must perform:

1. Was the student able to identify common risks, threats, and vulnerabilities found throughout the

seven domains of a typical IT infrastructure? – [ 25%]

2. Was the student able to align risks, threats, and vulnerabilities to one of the seven domains of a

typical IT infrastructure accurately? – [ 25%]

3. Given a scenario in Part A, was the student able to prioritize risks, threats, and vulnerabilities

based on their risk impact to the organization? – [ 25%]

4. Was the student able to prioritize the identified critical, major, and minor risks, threats, and

software vulnerabilities? – [ 25%]

Student Lab Manual

Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011 www.jblearning.com All Rights Reserved. -6-

Lab #1: Assessment Worksheet

Part A – List of Risks, Threats, and Vulnerabilities

Commonly Found in an IT Infrastructure

Course Name: _____________________________________________________________ Student Name: _____________________________________________________________ Instructor Name: ___________________________________________________________ Lab Due Date: _____________________________________________________________ Overview

The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing

patients with life-threatening situations. Given the list, select which of the seven domains of a typical IT

infrastructure is primarily impacted by the risk, threat, or vulnerability.

Risk – Threat – Vulnerability Primary Domain Impacted Unauthorized access from public Internet

User destroys data in application and deletes all files

Hacker penetrates your IT infrastructure and gains access to your internal network

Intra-office employee romance gone bad

Fire destroys primary data center

Communication circuit outages

Workstation OS has a known software vulnerability

Unauthorized access to organization owned

Workstations

Loss of production data

Denial of service attack on organization e-mail Server

Student Lab Manual

Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011 www.jblearning.com All Rights Reserved. -7-

Risk – Threat – Vulnerability Primary Domain Impacted Remote communications from home office

LAN server OS has a known software vulnerability User downloads an unknown e –mail attachment Workstation browser has software vulnerability Service provider has a major network outage Weak ingress/egress traffic filtering degrades Performance User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers VPN tunneling between remote computer and ingress/egress router WLAN access points are needed for LAN connectivity within a warehouse Need to prevent rogue users from unauthorized WLAN access

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Top Grade Tutor
Buy Coursework Help
Homework Guru
Maths Master
Top Writing Guru
Online Assignment Help
Writer Writer Name Offer Chat
Top Grade Tutor

ONLINE

Top Grade Tutor

I will cover all the points which you have mentioned in your project details.

$18 Chat With Writer
Buy Coursework Help

ONLINE

Buy Coursework Help

I have read your project details. I can do this within your deadline.

$63 Chat With Writer
Homework Guru

ONLINE

Homework Guru

I have read your project details. I can do this within your deadline.

$47 Chat With Writer
Maths Master

ONLINE

Maths Master

You can award me any time as I am ready to start your project curiously. Waiting for your positive response. Thank you!

$70 Chat With Writer
Top Writing Guru

ONLINE

Top Writing Guru

Give me a chance, i will do this with my best efforts

$62 Chat With Writer
Online Assignment Help

ONLINE

Online Assignment Help

I have read your project details. I can do this within your deadline.

$30 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Each spot on the dna microarray in embedded with quizlet - Love vashikaran specialist In jAlAndhAR {*+91 9928097710*} Top And Best Tantrik Aghori Baba - Late nite labs ph indicator answers - Physics lab homework answers - Cast in lifting eyes for concrete - 普羅 米 修 斯 故事 - City never sleeps lyrics tourism - Ethanol test for fats - Glycosuria medical terminology - Essentials of business communication 9th edition pdf chapter 2 - If you adopt ethical egoism as your moral code then - Evaporation and intermolecular forces lab conclusion - Centrelink unreasonable to live at home over 18 - What number is halfway between 0.1 and 0.13 - Journey of the magi line by line analysis - LDR-463 - Sime darby industrial academy - Implement the following function with two level nor gate circuit - Supply chain management sunil chopra 6th edition ppt - Tartaric acid pka1 and pka2 - Palliative care - 7 2 final project submission statistical analysis report - How do you calculate the case mix index - Business case proposal - Elkay plumbing products division case solution - Competitive Advantage - Federal safety commissioner accreditation scheme - Week-2 - Japanese and literature hsc - Poe shock and horror - Church fire evacuation plan - Audit sample size calculator - Costco wholesale corporation financial statement analysis case study - Nativity of the lord redhill - Automatic negative thoughts examples - Dhanishta nakshatra pada 1 - Tableau problem homework to be done in Tableau format - Need 5+ pages with no plagiarism and 2+ scholarly references in APA7 Format - Nsw companion animals register permanent identification form - Mueller and dweck 1998 - Who is zelda in nic sheff's book tweak - T accounts wileyplus - A little water clears us of this deed literary device - Integrated case tools examples - Mobil electric motor grease - Solubility of a salt lab answer key - For what values of p does the integral converge - 1 3 6 10 15 21 28 - Doctor bones prescribed physical therapy - Week 5 Project - Casa rio gold floor plan - 1.2 6 maximizing motor power vex answers - Uni of beds jobs - Pauls online notes calc 1 - Unsw canberra key dates - Mars inc marketing strategy - Crisis intervention strategies 8th edition pdf - Brain games pay attention answers - Ken blanchard net worth - Www uwimona edu jm application form - Nursing process worksheet - Robin hutson hotel du vin - Acne keloidalis nuchae icd 10 code - The puzzle of motivation ted talk - Zappos case study - A trainer has a client request their records - Ruck march packing list - Graphing linear equations worksheet - I wanna be yours - Cambridge o level islamiyat - Reply to each post (Must be 175 words long for each one) in words. I expect perfect APA technique. The minimum requirement is three (4) scholarly sources two for each - Fix bayonets love honour and obey - Exp 105 week 3 discussion 1 - Caryn campbell ted bundy - Use exploit windows smb ms08_067_netapi - Write ac program to implement functions of dictionary using hashing - St rafqa mass times - How to work out square metres for tiles - Dorothea Orem theory case study - Analysis of the Film Mapantsula - Chapter 10 selecting toys equipment and educational materials - Vision for the Future - How to make navy blue icing without black - What is tone in music - Abe odd hull up hop - Frederic bastiat petition of the candlemakers - Actus reus and mens rea of burglary - Invaluable human resources - Which protozoan group consists solely of parasitic forms - Jasper jones craig silvey pdf - Bsbpmg522 assessment 1 answers - Minimal human language module - Aduwa tool in english - Business partnership letter sample - State farm business plan proposal - Find the Premises - 5 grams to kilograms - Hw 2 - After his company merged with another firm ayush used - Mindtap a gray whale performs a pole dance