Premium Essay

Stepper

In:

Submitted By Stepper
Words 568
Pages 3
Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities? * To know which is first what you need to take care of and the severity level of said threat and vulnerabilities of the risk
Based on your executive summary produced in Lab 4 Perform a Qualitative Risk Assessment for an IT infrastructure, what was the primary focus of your message to executive management?
Given the scenario for your IT risk mitigation plan, what influence did your scenario have on prioritizing your identified risks, threats, and vulnerabilities?
What risk mitigation solutions do you recommend for handling the following risk element? User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers. * You may decide to institute an IT security policy in your domain that prohibits use of personal USB devices. In AD we can use Group Policy to limit access to these devices Optical drives, Floppy, Removable etc.
What is a security baseline definition? * Minimum security controls required for safeguarding the IT system based on the identified needs for confidentiality, integrity and the protection available.
What questions do you have for executive management in order to finalize your IT risk mitigation plan? * Ensure security gaps are closed. * Ensure countermeasures are implemented.
What is the most important risk mitigation requirement you uncovered and want to communicate to executive management? In your opinion, why is this most important risk mitigation requirement? * Stay on schedule * If we can stick to the schedule we are given ourselves the best chances at either finishing on time or ahead of schedule.
Based on your IT risk mitigation plan, what is the difference between short-term and long-term risk mitigation tasks and on-going duties? * Short-term is the right now