IAA202 Lab4 SE140810
IAA202 Lab4 SE140810
IAA202 Lab4 SE140810
SE140810
Lab 4
2.
3. For each of the identified risks, threats, and vulnerabilities, prioritize them by listing a “1”, “2”,
and “3” next to each risk, threat, vulnerability found within each of the seven domains of a typical IT
infrastructure. “1” = Critical, “2” = Major, “3” = Minor. Define the following qualitative
risk impact/risk factor metrics:
a. To Identify and evaluate risks. Risks are then quantified based on their importance or impact severity.
Then the risks are prioritized. They are a major part of an overall risk management program and they
help identify which risks are most important.
4. When you assembled all of the “1” and “2” and “3” risk impact/risk factor values to the identified
risks, threats, and vulnerabilities, how did you prioritize the “1”, “2”, and “3” risk
elements? What would you say to executive management in regards to your final recommended
prioritization?
-First you identify the risks by surveys and interviewing experts and then assign probability and impact
values to the risks. Then compile and summarize so put in number value. I would tell the executive
management that Risk level 3 needs to be attended to as soon as possible in order for the others to be
completed.
5. Identify a risk mitigation solution for each of the following risk factors:
a. User downloads and clicks on an unknown e-mail attachment
– The organization should provide training to all employees in the proper handling of e-mail
attachments and hyperlinks. Never open any attachments or click on links from unknown sources.
b. Workstation OS has a known software vulnerability – Apply the latest OS patches and updates to
eliminate software vulnerabilities.
c. Need to prevent eavesdropping on WLAN due to customer privacy data access – Ensure all unused
ports are disabled on the edge routers. Use packet tracer equipment to find and block any suspicious
traffic found on WAN circuits.
d. Weak ingress/egress traffic filtering degrades performance – Update and apply all router OS patches.
Build filters to block employees from music and movie torrent databases. These databases are notorious
for having spyware, malware and viruses that all degrade network performance.
e. DoS/DDoS attack from the WAN/Internet – Ensure the internal systems administrators are aware of
any suspicious traffic sources that have been reviewed and are known to launch DDos attacks. If a DDos
is occurring it is vital that the proper engineering resources are notified immediately so that they can
locate the offending IP addresses and block them at the organization firewalls.
f. Remote access from home office – remote policies, Ensure that all employees are again notified and
trained on proper use of the VPN connections. They should never share the VPN with any public access
terminals such as internet café’s or any unknown wireless networks. They also
need to aware that no usb drives are allowed connection to their home PCs or laptops. The home PCs
have to have the necessary anti-virus/malware programs to ensure the home PCs do not infect the
organizations systems via the VPN.
g. Production server corrupts database – The server needs to be brought down and anti-virus tools need
to be implemented to remove the corrupted data. Any corrupted data will then be re-imaged from the
back up data the company has been storing at an offsite facility. The data can also be restored from a
stand-alone server that functions as a hot standby for occasions that the organization finds itself dealing
with corrupted servers