Identifying Threat And Vulnerability - St.cloud State University - Assignment1

1700 words - 7 pages

Assignment #1- Assessment Worksheet 15 Points
Assignment #1 Identifying Threats and Vulnerabilities in an IT Infrastructure
Introduction
The task of identifying risks in an IT environment can become overwhelming. Once your mind starts asking “what if...?” about one IT area, you quickly begin to grasp how many vulnerabilities exist across the IT spectrum. It may seem impossible to systematically search for risks across the whole IT environment.
Thankfully, a solution is at hand that simplifies identifying threats and vulnerabilities in an IT infrastructure. That method is to divide the infrastructure into the seven domains: Wide Area Network (WAN), Local Area Network-to-Wide Area Network (LAN-to-WAN), Local Area Network (LAN), Workstation, User, System/Application, and Remote Access. Systematically tackling the seven individual domains of a typical IT infrastructure helps you organize the roles, responsibilities, and accountabilities for risk management and risk mitigation.
In this lab, you will identify known risks, threats, and vulnerabilities, and you will organize them. Finally, you will map these risks to the domain that was impacted from a risk management perspective.
Learning Objectives
Upon completing this lab, you will be able to:
Identify common risks, threats, and vulnerabilities found throughout the seven domains of a typical IT infrastructure.
Align risks, threats, and vulnerabilities to one of the seven domains of a typical IT infrastructure.
Given a scenario, prioritize risks, threats, and vulnerabilities based on their risk impact to the organization from a risk-assessment perspective.
Prioritize the identified critical, major, and minor risks, threats, and software vulnerabilities found throughout the seven domains of a typical IT infrastructure.
Deliverables
Upon completion of this lab, you are required to provide the following deliverables to your instructor: 

1. Lab #1 - Assessment Worksheet 
 (Place a copy into the D2L Assignment #1 Dropbox)
Hands-On Steps
1. Review the Lab Assessment Worksheet. You will find answers to these questions as you 
proceed through the lab steps. 

2. Review the seven domains of a typical IT infrastructure (see Figure 1). 
Figure 1 Seven domains of a typical IT infrastructure 

3. Review the left-hand column of the following table of risks, threats, and vulnerabilities that were found in a health care IT infrastructure servicing patients with life-threatening conditions: 

Note:
This is a paper-based lab. To successfully complete the deliverables for this lab, you will need access to Microsoft® Word or another compatible word processor. For some labs, you may also need access to a graphics line drawing application, such as Visio or PowerPoint. Refer to the Preface of this manual for information on creating the lab deliverable files.
Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved.
Vulnerabilities in an IT Infrastructure
Risks, Threats, ...

More like Identifying Threat And Vulnerability - St.cloud State University - Assignment1

Paul Ehrlich And The “population Bomb” - California State University Northridge, URBS 150 - Research Paper

1232 words - 5 pages ... end of World War II. As human resources become more limited and our environment progressively degrades, the fear of overpopulation becomes more apparent with every passing day. “The Population Bomb,” is a book written by Stanford University professor Paul Ralph Ehrlich, in which he talks about overpopulation on Earth. He grimly warns his audience of mass starvations in the 1970s and 1980s resulting from overpopulation, shortage of human ...

Bilingualism And Its Effets On Cognitive Development In Children - Metropolitan State University / Linguistics - Research Paper

1372 words - 6 pages Free ... intelligence and a, “state of mental confusion, as bilingual children had lower IQ values than their monolingual peers” (Nagy, 2013). A delay in bilingual children’s lexical development has also caught some light and sparked question about the negative effects of bilingualism in children. Some researchers believe that, “because of the simultaneous acquisition of two or more languages, bilingual children start speaking later than monolingual children ...

Politics And Law On Tobacco Products - Plymoouth State University - Essay

813 words - 4 pages ... current age at twenty-one. For many kids in today in this American society, the age number eighteen is very significant. Not only can you serve your military, but also you are granted the right to vote for state officials and presidential candidates. This age is a big step into adulthood given the granted opportunities that people can part take in once becoming eighteen. Since, this age is considered adult, then alcohol consumption should be legalized ...

Similarities And Differences Between Christianity And Judaism - Montclair State University - Research Paper

2622 words - 11 pages ... Eastman R (1999) The Ways of Religion: an introduction to major traditions. (3rd Ed.) pp. 289- 293 New York: Oxford University Press US Diamant A (2007) Living a Jewish Life, Jewish Customs and values for today`s families. New York: Harper Collins. Fairchild Emily (2010) An Overview of Jewish Beliefs and Traditions for Counselors. Retrieved from; https://commons.lib.jmu.edu/edspec20109/90 New Jerusalem Bible, Matthew Chapter 16 verse 13 to 20 ...

Parental Style And Socio-emotional State - Grand Canyon University/ PCN 518 - Essay

843 words - 4 pages ... Running head:  STYLE 1 5 STYLE  Parental Style and Socio-Emotional Development in Middle Childhood  Grand Canyon University: PCN-518 3/27/2017 Parenting styles are very important in enabling children to develop certain skills which include overall wellbeing in areas such as academic performance, social engagements, and even improved problem-solving abilities. This essay will explore ...

How Women Are Playing College And Pro Sports - Westfield State University - Essay

2105 words - 9 pages Free ... Jason Gouin 2/13/18 Ethics in sport Professor Condon Since the creation of Title IX, most issues have been fixed but there are many more issues in the sports industry that need to be looked at. Looking back and reading about the past you really have learned a lot about the culture and atmosphere of female athletes and coaches in the past. With many female athletes being looked down to many of the male athletes, women always had to compete at a ...

Documentary Film And Liberal Arts Discussion - Colorado State University/ Documentary Film As A Liberal Art - Essay

1644 words - 7 pages ... “Exit Through the Gift Shop” Street Art and its Quest for Authenticity Mid-Term Documentary Film Paper Documentary Film as a Liberal Art: LB-456 By: Blake Warner Exit Through the Gift Shop is a British documentary film directed by the anonymous English-based street artist Banksy. It was released in 2010 and premiered at the 2010 Sundance film festival which was nominated for the academy award for best documentary film feature. It tells the story ...

Scultz Critical Summary- South Park And The F Word - The Ohio State University/ Criticizing Television - Essay

751 words - 4 pages ... Language: South Park and the Transformation of Meaning” by Marcus Schulzke, the author discusses how although South Park can be rather crass, it touches upon taboo topics and enlightens viewers on serious social affairs. The paper focuses on the episode “The F Word” which challenges censorship and the use of offensive language. Schulzke emphasizes that “the meaning of words and their power to offend is a central theme in South Park” (Schulzke, 2012 ...

Models Of Democracy- Essay About The Models Of Democracy And How It Is Used In Our US Government - Valdosta State University/ American Government - Essay

1557 words - 7 pages Free ... . Democracy is a system of government by the whole population or all the eligible members of a state, typically through elected representatives. Democracy has two different parts which are called models of democracy, they are majoritarian and pluralist democracy. Majoritarian democracy is the classical theory of democracy in which government by the people is interpreted as government by the majority of the people. So in other words it is basically ...

Reasons For Civil War Articles - David M. Potter And Micheal F. Holt Comparison - Austin Peay State University/history 2010 36 - Essay

1317 words - 6 pages ... to Civil War,” David M. Potter agrees that the sectional divisions and their many problems were the primary causes of the Civil War rather than politics. As stated in the Article, “Once the government under the constitution went into effect, bitter sectional conflicts raged over the assumption of state debts, chartering of the central bank, and other matters.”[footnoteRef:0] [0: David M. Potter, The Sectional Divisions That Led to Civil War ...

This Assignment Was To Develop A 2 Different Product Designs And Then Create A Branding Position - Utah State University Mgt 3500 - Homework Assignment

496 words - 2 pages ... 2 new product concepts Problem: How can you overcome not being able to get a good night’s rest because it is either too hot or too cold? Solution: Comfort Plus, a heating and cooling bed technology that allows for a restful night’s sleep. Brand Positioning: COMFORT PLUS Target Audience: couples who have trouble sleeping because they get too hot or cold during the night. Benefit: “Comfort Plus” makes every night’s sleep rejuvenating and ...

Research In IRC Routing Protocol - CNA 432 - Research

1966 words - 8 pages ... NISHIT PATEL YANIK KIENTEGA PROJECT 1 CNA 451 INTERNET RELAY CHAT PROTOCOL ST.CLOUD STATE UNIVERSITY DR. EZZAT KIRMANI Table of contents Pg. 1. Introduction……………………………………………………………. 3 2. How an IRC protocol works................................................................... 4 Basic components of an IRC protocol ………………………………… 4 3. IRC protocol Services………………………………………………….. 5 4. Overview of the IRC Network ...

Lab 1 Of Aligning An IT Security Assessment - CBU Security Compliance - Lab

1112 words - 5 pages Free ... information is shared as few individuals as possible. Responsible Disclosure · During this stage of the vulnerability life cycle the method of discovery will determine how responsible disclosure will proceed. Initial contact signals the start of the disclosure stage. Existing Policies and Proposals · NTBug Traq Disclosure policy · Rain Forest Puppy “RF Policy” · IETF draft · The Fisher Plan Threat Activity Trends · Organizations should monitor all ...

Network Security Proposal Part 1 - CMIT 320 - Assignment

1226 words - 5 pages Free ... I. Analysis and Planning A. Vulnerability Assessment Requirements The security and availability of the school network plays a huge role in the success of those who attend it. In order to provide a secure network environment for the betterment of the students and faculty a vulnerability assessment needs to take place. This vulnerability assessment is used to find where the weaknesses are in a network in order to assist in the protection of the ...

Case Conceptualisation Of Marie

4927 words - 20 pages ... reliable method in identifying Marie's readiness for change is Prochaska and Diclemente's (1982) Stages of Change Model. Using Motivational Interviewing (MI) with Marie would be useful as the cycle model views change as flexible to individual needs. A template formulation for Marie has been created in Figure 5. As this assessment task did not require the completion of treatment goals for Marie, it has not been included. Vulnerability factors ...