Premium Essay

Is3110 Labs

In:

Submitted By BrettR67
Words 373
Pages 2
Brett Reigel
Lab 2 Assessment Worksheet
COBIT
1. A. WAN to LAN Domain
B. System Application Domain
C.LAN Domain
D. Server Domain 2. a. PO9.3 Event Identification – Identify threats with potential negative impact on the enterprise, including business, regulatory, legal, technology, trading partner, human resources and operational aspects.
b. PO9.4 Risk Assessment – Assess the likelihood and impact of risks, using qualitative and quantitative methods.
c. PO9.5 Risk Response – Develop a response designed to mitigate exposure to each risk – Identify risk strategies such as avoidance, reduction, acceptance – determine associated responsibilities; and consider risk tolerance levels.

3.
a. Unauthorized access from public internet - AVAILABILITY
b. User destroys data in application and deletes all files - INTEGRITY
c. Workstation OS has a known software vulnerability – CONFIDENTIALITY
d. Communication circuit outages – AVAILABILITY

e. User inserts CD’s and USB hard drives with personal photos, music and videos on organization owned computers – INTEGRITY
4. I have yet to remediate any threats in a real world application.
5. a. People b. Infrastructure c. People d. People e. People
6. True
7. Because risk management is an ongoing process that requires a constant, and vigilant application of COBIT.
8. The data classification standard defines categories of data. Each Category defines how you must handle that data and any special handling requirements.
9. Ensuring the C – I – A of an application requires that the server and it’s operating system software is secure and free from threats and vulnerabilities.
10. Real time threats require time to remediate. The users or employees who are impacted should be immediately notified esp. if downtime is required to fix it.
11. The COBIT P.09 risk management controls framework

Similar Documents

Premium Essay

Is3110 Lab 6

...IS3110 Lab 6 DAWOOD ALRUBAYE 1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities? Because you need to know which is most important and which is negligible. In some cases, protecting your infrastructure from a high priority threat is more important and so you may want to protect against that even if it leaves you vulnerable to low priority threats. This mainly just shows you which areas need your attention the most. 2. 2. Based on your executive summary produced in Lab #4 – Perform a Qualitative Risk Assessment for an IT infrastructure, what was the primary focus of your message to executive management? * Setting up security measures through various means. * Forcing users to update password every X number of days. * Educating users. * Firewalls * Anti-malware 3. Given the scenario for your IT risk mitigation plan, what influence did your scenario have on prioritizing your identified risks, threats, and vulnerabilities? 4. What risk mitigation solutions do you recommend for handling the following risk element? User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers. * A good antivirus program and have all devices scanned as soon as they are plugged in. * Educate employees. * Disable optical drives/USB ports (if they are not needed) 5. What is security baseline definition? A baseline is a starting point or a standard. Within...

Words: 319 - Pages: 2

Free Essay

Is3110 Lab 4

...| LAB 4 * A. Healthcare provider under HIPPA compliance law * Risk-Threat-Vulnerability | Primary Domain Impacted | Risk Impact/Factor | Unauthorized access from public Internet | LAN-WAN | Major | User destroys data in application and deletes all files | USER | Minor | Hacker penetrates your IT infrastructure and gains access to you internal network | SYSTEM APPLICATION | Critical | Intra-office employee romance gone bad | USER | Minor | Fire destroys primary data center | LAN | Major | Service provider SLA is not achieved | WAN | Major | Workstation OS has a known software vulnerability | LAN-WAN | Major | Unauthorized access to organization owned workstations | USER | Major | Loss of production data | SYSTEM APPLICATION | Minor | Denial of Service attack on organization DMZ and e-mail server | LAN-WAN | Critical | Remote communications from home office | REMOTE ACCESS | Minor | LAN server OS has a known software vulnerability | LAN | Major | User downloads an unknown e-mail attachment | USER | Minor | Workstation browser has software vulnerability | WORKSTATION | Major | Mobile employee needs secure browser access to sales order entry system | REMOTE ACCESS | Minor | Service provider has a major network outage | WAN | Critical | Weak ingress/ egress traffic filtering degrades Performance | LAN-WAN | Major | User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers |...

Words: 296 - Pages: 2

Premium Essay

Is3110 Lab 6

...Lab 6 1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities? It is important to prioritize because you must be aware of what the risks, threats, and vulnerabilities there are to your infrastructure. You need this so that you know where the most attention needs to be focused on. 2. Based on your executive summary produced in Lab #4 Perform a Qualitative Risk Assessment for an IT infrastructure, what was the primary focus of your message to executive management? Setting up security measures through various means includes the following: * Forcing users to update password every X number of days. * Educating the users. * Firewalls - Anti-malware 3. Given the scenario for your IT risk mitigation plan, what influence did your scenario have on prioritizing your identified risks, threats, and vulnerabilities? Common things such as user activity can be a very big risk, so your best bet is to consider all options as potential threats. You will have to rank some risk higher than the others. 4. What risk mitigation solutions do you recommend for handling the following risk element? A user inserts a CD or USB hard drive with personal photos, music, and videos on organization owned computers. A good antivirus program and have all devices scanned as soon as they are plugged in. Educate employees Disable optical drives/USB ports. 5. What is security baseline definition? A baseline is a starting point or a standard...

Words: 759 - Pages: 4

Premium Essay

Is3110 Lab 6

...1. You must be aware of what the risks, threats, and vulnerabilities are to your infrastructure so that you know where the most attention is needed 2. Setting up security measures through various means. Forcing users to update password every X number of days. Educating users. Firewalls Anti-malware 3. Common things such as user activity can be a huge risk, so it’s best to consider all options as potential threats with some being higher and lower than others. 4. Disable auto-run, deny USB storage devices for users, and restrict installation rights from within Active Directory 5. Security baselines are security settings which establish duties, but nothing else. 6. What are your plans/goals? What will the budget cost be? 7. Evaluating risk interactions and common causes because if you don’t know what the risk is, you can’t possibly mitigate it. 8. All short-term mitigation tasks need to be implemented immediately. Long-term mitigation tasks should be implemented immediately following all critical tasks. On- going is exactly that, the tasks involved here are part of day-to-day operations and need to be handled. 9. User Domain 10. System-Application 11. WorkStation 12. Because it allows users to access the private network 13. Because you do not know how it will react to the already implemented software. Just because there is a security does not mean you install it to the live servers. You basically need...

Words: 290 - Pages: 2

Free Essay

Is3110 Week 5 Lab

...Lab Assessment Questions 1. How do documented back-up and recovery procedures help achieve RTO? * By documenting and implementing backup and recovery procedures, the process for recovery is much more efficient, helping with the time portion of RTO. By having effective backup and recovery procedures you should have the necessary resources to restore systems from backups and a repeatable process that is known to succeed in achieving RTO. 2. True or False. To achieve an RTO of 0, you need 100% redundancy in your IT system, application, and data. * True. This is a special case of disaster recovery called business continuance. Technology that is capable of maintaining a synchronous mirror or continuous data replication stream must be utilized for all data (work product, application, server personalities, etc.). 3. Review the “Restore Horror Stories” scenario on page 371 of the text. What is most important when considering data back-up? * The goal of backing up data is to be able to restore it. 4. Review the “Restore Horror Stories” scenario on page 371 of the text. What is most important when considering data recovery? * Perform test restores. A test restore will attempt to restore data from a recent backup. If the test succeeds, the backup is good. If the test doesn’t succeed, the backup process needs to be addressed. 5. What are the risks of using your external e-mail box as a back-up and data storage...

Words: 467 - Pages: 2

Free Essay

Test

...Major Milestones of the Telecommunications Industry 1837 Samuel Morse invents the telegraph - The information age began with the telegraph, which was invented by Samuel F.B. Morse in 1837. This was the first instrument to transform information into electrical form and transmit it reliably over long distances. The earliest form of electrical communication, the original Morse telegraph of 1837 did not use a key and sounder. Instead it was a device designed to print patterns at a distance. 1858 Transoceanic telegraph cable is laid – The transoceanic telegraph cable is an undersea cable running under the Atlantic Ocean used for telegraph communications. The first communications occurred August 16, 1858, reducing the communication time between North America and Europe from ten days, the time it took to deliver a message by ship, to a matter of minutes. 1876 Alexander Graham Bell invents the telephone - The telegraph was followed by Alexander Graham Bell's invention of the telephone in 1876. The magneto-telephone was one of the first telephones on which both transmission and reception were done with the same instrument. 1885 - Incorporation of the American Telephone and Telegraph company (AT&T). After its incorporation in 1885, the American Telephone and Telegraph company dominated the telecommunications market. 1888 - Heinrich Hertz discovers the electromagnetic wave 1895 - Marconi begins experimenting with wireless telegraph 1901 Guglielmo Marconi invented the radio—the...

Words: 727 - Pages: 3

Premium Essay

Unit 1 Pt1420

...Unit 1 Research 1 PT1420 In the 1970s the programming language that was most popular was Pascal. Pascal was designed in 1968-69 but published in 1970. Niklaus Wirth created the Pascal language to “1) make available a language suitable for teaching programming as a systematic discipline based on fundamental concepts clearly by the language, and 2) to define a language whose implementations could be both reliable and efficient on then-available computers. In 1972 the C programming language was developed by Dennis Ritchie. C was created to work with the system Unix. “Unix gives C such advanced features as dynamic variables, multitasking, interrupt handling, forking, and strong, low-level, input-output. Because of this, C is very commonly used to program operating systems such as Unix, Windows, the MacOS, and Linux.” In the 1980s the popular programming language was C++. C++ was developed at Bell Laboratories. C++ is a general purpose multi-paradigm spanning compiled language that has both high-level and low-level languages’ features. It was started as an enhancement to the C programming language, Bjarne Stroustrup in 1979. In the 1990s Java was the popular programming language. It was created in 1991 developed by James Gosling at Sun Microsystems and release in 1995. In the 2000s Visual Basic (VB) was popular in the programming world. VB was developed from BASIC which was originally developed in 1964 by John Kemeny and Thomas Kurts. VB is a Microsoft programing language and software...

Words: 261 - Pages: 2

Free Essay

Indian Ipr

...2/16/2014 Intellectual Property creation witnessing steady growth in India: Report - Economic Times You are here: Home > Collections > India RELATED ARTICLES Budget 2012: Relax corporate tax and surcharges to boost... March 5, 2012 Intellectual Property creation witnessing steady growth in India: Report PTI Jun 26, 2013, 06.43PM IST Bharti Airtel gives IP contract to Alcatel Lucent India June 1, 2012 Tags: Texas Instruments general motors | Mercedes-Benz | investments | intellectual property | Intel | Hewlett-Packard | | gdp | Alstom | Alcatel Lucent Alcatel-Lucent launches IP Transformation Center Septemb er 8, 2009 IN-DEPTH COVERAGE India Intellectual Property Alcatel-lucent Alstom NEW DELHI: The country's contribution to Intellectual Property (IP) creation is witnessing a steady growth, however, investments in R&D and patent activities in the country are still relatively slow when compared to developed nations, a report says. According to globalisation and market expansion advisory firm Zinnov's study 'Enhancing the IP Quotient in MNC R&D centres', IP creation is witnessing steady growth in MNC R&D centres, but investments in R&D and patent activities in India are still relatively slow. (A sector-wise analysis…) The study further said India spends just 1 per cent of its GDP on R&D, while countries like Israel spends 4.2 per cent, Japan 3.7 per cent, US 2.7 per cent and China 2.0 per cent...

Words: 815 - Pages: 4

Free Essay

The Birth and Evolution of Transistors and Impact on the Transport Industry

...Electronics rely heavily on electronic switching and amplification to generate and capture the various signals which allow them to operate. A controllable valve that allows a small signal to control a much larger signal does this, and could be related to a controllable valve used in the control of water flow. This was once done by a device known as vacuum tube but was later brought down to a much lower production scale for a variety of industrial, economical and business related reasons. Bell Laboratories, the research arm of telecommunications company American Telephone and Telegraph’s (AT&T) director Mervin Kelly put together the first team of researchers and scientists placed on the task of research and development of a solid state-semiconductor later called a transistor that would supersede vacuum tubes and provide numerous advantages. The success of this development would prove to change the computing, electronics and telecommunications systems altogether. Up until the invention of the transistor a vacuum tube was used in the control, amplification and generation of electrical signals. Vacuum tubes are tubes usually made from glass and designed in an airtight manner as to keep the flow of “cathode rays” from external disturbance as they pass from each terminal and laid the foundation for numerous technical innovations, such as the light bulb discovered by Thomas Edison (fig. 1). Joseph John Thomson further made a vacuum tube and placed a third terminal to attain a grasp...

Words: 1787 - Pages: 8

Premium Essay

Hiro

...Fall 2015 Analytical Chemistry I Quantitative Analysis Chem 341WI 4 Credit Hrs | Instruction Mode: L (lab) and P (class) Professor Andrew Holder holdera@umkc.edu • SCB 113 • 816-235-2293 • 913-543-3709 (fax) Office Hours: T/Th 1:00-4:00, 5:00 – 7:30 Lecture: T/Th 4PM | Labs: T/Th 1PM (AFT), 5PM (EVE) Credit: Lab + Lecture = 4 credits | Format: Lab + Lecture (P) Lecture / Class Policies and Procedures Correspondence with UMKC Student Learning Outcomes Scientific Reasoning & Quantitative Analysis * Apply principles/methods of sciencea, mathb, statisticsc and logicd to solve problems and draw logical inferences. * Chpt 3: Experimental Error (c) * Chpt 4: Statistics (c) * Chpt 6: Chemical Equilibrium (a, b, d, e, f) * Chpt 7: Activity & Systematic Trtmnt, (a, d, e, h) * Chpt 8: Monoprotic Acid-Base Equil., * Chpt 9: Polyprotic Acid-Base Equil. (a, d, e, g, h) * Develop quantitative literacy enabling comprehensione and evaluationf of info in broad contexts. * Chpt 3: Experimental Error, Chpt 4: Statistics (f) * Chpt 5: Quality Assurance and Calibration Methods (c) * Understand methodsg/principlesh of scientific discovery and their application * Sxn 0-2: The Analytical Chemist’s Job (g, h) * Sxn 0-3: General Stages in a Chemical Analysis (g, h) * Chpt 2: Tools of the Trade (g) * Carrying out laboratory analyses (g, h) ...

Words: 4091 - Pages: 17

Premium Essay

Blogging

...Blogging is popular among the people in today’s society, especially amongst teenagers. In fact, the number of blogs is exploding, with about 14 million existing blogs. On average, the number of blogs is doubling every five months. There are many advantages of blogging. Firstly, people can use as an online dairy, using it to share the day’s happening in her life with other visitors on the net. Furthermore, if the blogger (author of the blog) has met up with certain incidents in her life, he can share it on the blog and others can console or praise him, by giving comments or leaving a message in the blog’s tag board, depending on the incident. Blogging can also be a good way to relieve stress as some way wants to use their blog to vent out their frustration or pour out their woes when stress becomes too much for them. Some bloggers even use their blogs to flaunt their literati skills by posting poems about themselves or things around them. Secondly, bloggers can also use their blogs to inform others on a certain topic which happens to be his niche, thus allowing others who are interested in the topic to learn some tricks from the blog, they are also post questions to the blogger if they meet up with problems. Even Mr. Donald Trump is doing so, he launched the Trump Blog last month to share his insights into and answer questions about corporation ethics, personal success and business dilemmas. Other organizations are also using blogs to make announcements to...

Words: 663 - Pages: 3

Free Essay

Aspodij

...fornia, start-up, Shockley Semiconduc tor Laboratory. Shockley had been part of the Bell Labs team that invented the transistor. He had quit his job and come west to start his own company, telling people his goal was to make a million dollars. Everyone thought he was crazy. Shockley knew he wasn't. Unlike a lot of the people at Bell Labs, he knew the transistor was going to be big. Shockley had an idea about how to make transistors c heaply. He wa s going to f abric a te them out of si li con. He had come to this valley, south of San Francisco, to start production. He felt like hewas on the cusp of history, in the right place at the right time. All that he needed was the right people. Shockleywas leaving nothingto c hance. Tod a y's in ter vi ew wa s J i m Gibb ons . Hewa s a young guy, earl y twenti es . He already had a Stanford Ph.D. He had s tudied a t Cambridgetoo - on a Fulbri ght sc holars hip he'dwon. Gibbons was si tting in front of hi m ri ght now, in Shockley's Quonset hut of fice. Shockley picked up his s topwa tch. In Augus t 1957 William Shockleywas recrui ting s taff for hisPalo Alto, Cali fornia, start-up, Shockley Semiconduc tor Laboratory. Shockley had been part of the Bell Labs team that invented the transistor. He had quit his job and come west to start his...

Words: 447 - Pages: 2

Free Essay

It113 Project Scope

...the company obtains a high performance network for a reasonable price. Project description MK Institute of Higher Learning is purposing a project with the description to network a classroom based floor. This floor will consist of three wings. Each wing accommodates one distribution closet, which must be interconnected to one another. Each wing also has eight classrooms and one computer lab. Classrooms will need 2 drops and the computer labs will need 44 drops, resulting in 60 drops in all per wing. The ISP connection will be entering from the north wing’s distribution room. The institute will also be requiring that a wireless access coverage to the central lobby area, allowing 100 users simultaneously, to be made possible. Also noting that the central lobby area consists of three solid supports, holding a 25’ ceiling. Major Deliverables * The networking of the MK Institute of Higher Learning. * Placing needed hardware. * Wiring the hardware and network. * Interconnecting distribution rooms. * 3 wings, each consisting of 8 classrooms = 16 drops, one computer lab = 44, and one distribution room. * Wireless central lobby allowing 100+ users simultaneously. * Fully functional Networking...

Words: 607 - Pages: 3

Free Essay

Fortune 500

...As the old saying goes “Only the strong survives,” seems to be true in this struggling economy, and this statement is true when referring to AT&T which is among the strongest company’s listed in the Fortune 500. AT&T’s success is garnered by a willingness to function well as an organization, and also by being leaders in innovation. For a company to be successful there has to be proper planning, organizing, leading, and controlling on their part,  coupled by the awareness of internal, and external factors, and how they affect the company.       According to "AT&T" (2012), "We're recognized as one of the leading worldwide providers of IP-based communications services to businesses. We also have the nation's largest 4G network – covering 275 million people, and 2,000 more 4G cities and towns than Verizon, and the largest international coverage of any U.S.” That statement alone says that AT&T has a well defined business plan, and economical external factors, such as their competition will not stand in their way. AT&T has not allowed internal factors like having to find qualified people for the jobs, and then training them affect their “bottom line,” and they understand that the quality of their employees affect their customer satisfaction, and customer satisfaction is key when dealing with a competitive market. One of the main components of the four function of management is leading. Leading in this sense is, stimulating the employees to achieve their goals and perform...

Words: 531 - Pages: 3

Free Essay

Student

...Net-Worm.Win32.Kido.ih Detected | Feb 20 2009 07:04 GMT | Released | Apr 02 2009 16:24 GMT | Published | Feb 20 2009 07:04 GMT | Manual description Auto description This description was created by experts at Kaspersky Lab. It contains the most accurate information available about this program. Manual description Auto description This is a description which has been automatically generated following analysis of this program on a test machine. This description may contain incomplete or inaccurate information. Technical Details Payload Removal instructions Technical Details This network worm spreads via local networks and removable storage media. The program itself is a Windows PE DLL file. The worm components vary in size from 155KB to 165KB. It is packed using UPX. Installation The worm copies its executable file with random names as shown below: %System%\<rnd> %Program Files%\Internet Explorer\<rnd>.dll %Program Files%\Movie Maker\<rnd>.dll %All Users Application Data%\<rnd>.dll %Temp%\<rnd>.dll %Temp%\<rnd>.tmp <rnd> is a random string of symbols. In order to ensure that the worm is launched next time the system is started, it creates a system service which launches the worm’s executable file each time Windows is booted. The following registry key will be created: [HKLM\SYSTEM\CurrentControlSet\Services\netsvcs] ...

Words: 1158 - Pages: 5