Risk - Threat - Vulnerability Primary Domain Impacted

Download as docx, pdf, or txt
Download as docx, pdf, or txt
You are on page 1of 4

Lab #1: Assessment Worksheet

Part A – List of Risks, Threats, and Vulnerabilities


Commonly Found in an IT Infrastructure

Course Name: IAA202


Student Name: Dương Chí Hùng
Instructor Name: Nguyễn Tấn Danh
Lab Due Date: 14/5/2021

Risk – Threat – Vulnerability Primary Domain Impacted

Unauthorized access from public


Remote Access Domain
Internet
User destroys data in application and
System/Application domain
deletes all files
Hacker penetrates your IT infrastructure
and gains access to your internal System/Application domain
network

Intra-office employee romance gone bad User domain

Fire destroys primary data center System/Application domain

Communication circuit outages LAN domain

Workstation OS has a known software


Workstation domain
vulnerability

Unauthorized access to organization


Remote Access Domain
owned

Workstations Workstation domain

Loss of production data System/Application domain

Denial of service attack on organization


System/Application domain
e-mail Server
Remote communications from home
Remote Access Domain
office

LAN server OS has a known software


LAN domain
vulnerability
User downloads an unknown e-mail
User domain
attachment
Workstation browser has software
Workstation domain
vulnerability
Service provider has a major network
WAN domain
outage

Weak ingress/egress traffic filtering


LAN-to-WAN domain
degrades Performance

User inserts CDs and USB hard drives


with personal photos, music, and videos Workstation domain
on organization owned computers

VPN tunneling between remote


Remote Access Domain
computer and ingress/egress router

WLAN access points are needed for LAN


LAN-to-WAN domain
connectivity within a warehouse
Need to prevent rogue users from
LAN-to-WAN domain
unauthorized WLAN access

Lab #1: Assessment Worksheet


Identify Threats and Vulnerabilities in an IT Infrastructure

Course Name: IAA202


Student Name: Dương Chí Hùng
Instructor Name: Nguyễn Tấn Danh
Lab Due Date: 14/5/2021

1. Health care organizations must strictly comply with the Health


Insurance Portability and Accountability Act(HIPPA).Personal
Information refer to as "protected health information" or "PHI". Security
controls for the I.T infrastructurehandlin PHI. Vulnerabilities can violate
HIPPA rivac and securit reuirements.

2. User Domain: 2
Workstation Domain: 4
LAN Domain: 2
LAN-to-WAN Domain: 3
WAN Domain: 1
Remote Access Domain: 4
System/Application Domain: 5

3. System/Application Domain

4. Consider the both minor for the most part unless performance
become a working for both would be consider minor in relation in
HIPPA.

5. Loss of production data, recover critical business function, fire


destroys primary center.

6. The User Domain represents the greatest risk and uncertainty because
human behavior is unreliable and influenced by factors uncontrolled by
policy.

7. Remote access control requires stringent access controls.

8. User Domain
9. Work Station domain needs software vulnerability assessments to
mitigate risk from software vulnerabilities.

10. WAN Domain requires AUPs to minimize unnecessary user-initiated


internet traffic.

11. LAN-to-WAN Domain

12. LAN Domain

13. WAN Domain

14. True

15. Layer
security strategy will provide protection in the system domain
by providing protections like anti-virus,authentication to users.

You might also like