Preview

File11

Good Essays
Open Document
Open Document
466 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
File11
Week 1 Assignment 1: Application of Risk Management
Learning Objectives and Outcomes
You will be able to identify different risk management techniques for the seven domains of a typical IT infrastructure and apply them under different situations.

Assignment Requirements
Introduction:
As discussed in this Unit, after IT professionals identify threat/vulnerability pairs and estimate the likelihood of their occurrence, IT management must decide which risk management techniques are appropriate to manage these risks. IT managers then present this information to senior management. The role of the senior management is to allocate resources, specifically money and employees, to prepare for and respond to identified threats and vulnerabilities appropriately.
This assignment allows you to fulfill the role of an IT manager in a small business tasked with determining appropriate risk management techniques for identified threats and vulnerabilities and to make related recommendations to senior management.
Read the scenario given below and then complete the assignment tasks:
Scenario:
YieldMore is a small agricultural company that produces and sells fertilizer products. The company operates through its headquarters in a small town in Indiana. Outside its headquarters, there are two large production facilities—one in Nebraska and one in Oklahoma. Furthermore, YieldMore employs sales force personnel in every state in the U.S. to serve its customers locally.
The company has three servers located at its headquarters—Active Directory Server, a Linux application server, and an Oracle database server. The application server hosts YieldMore’s primary software application, which is a proprietary program managing inventory, sales, supply-chain, and customer information. The database server manages all data stored locally with direct attached storage.
All three major sites use Ethernet cabled local area networks (LANs) to connect the users’ Windows Vista workstations via industry

You May Also Find These Documents Helpful

  • Satisfactory Essays

    When developing a multi-layered security plan, you must look at each of the seven domains of the IT infrastructure and increase security on each of those domains. The seven domains are user domain, workstation domain, LAN domain, LAN to WAN domain, WAN domain, and remote access domain. Increasing the security on each of those seven domains will increase the overall security of the system and create a multi-layered security plan.…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Unit 6 Lab

    • 727 Words
    • 2 Pages

    After you inventory your assets, you would need to identify the scope of your risk management. You would want to identify things such as your critical business operations, how you connect with your customers, mission-critical data, systems, and applications, and security gaps and identify these throughout all 7 domains of your infrastructure.…

    • 727 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue four. You must research and formulate a plan to implement monitoring and analysis based on the premise that all employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently. You must determine system implementation and access in accordance with defined IT criteria as well as how to collect information for identification of and response to security breaches or events.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    IS3110 - lab 6

    • 511 Words
    • 3 Pages

    4. What risk mitigation solutions do you recommend for handling the following risk element? User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers.…

    • 511 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    4. What tasks and deliverables are needed to implement your risk mitigation recommendations? Pick one of the seven domains of a typical IT infrastructure and answer uniquely.…

    • 960 Words
    • 4 Pages
    Good Essays
  • Good Essays

    IS3110 Quiz 6 2015

    • 600 Words
    • 2 Pages

    3. Using the WORKSTATION domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…

    • 600 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Is 305 Week 3 Quiz

    • 577 Words
    • 3 Pages

    Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Iscm Strategic Plan

    • 1276 Words
    • 6 Pages

    To the extent possible, organizations should identify, report, and remediate vulnerabilities in a coordinated, organization-wide manner using automated vulnerability and patch management tools and technologies. Vulnerability scanners are commonly used in organizations to identify known vulnerabilities on hosts and networks and on commonly used operating systems and applications. These scanning tools can proactively identify vulnerabilities, provide a fast and easy way to measure exposure, identify out-of-date software versions, validate compliance with an organizational security policy, and generate alerts and reports about identified…

    • 1276 Words
    • 6 Pages
    Good Essays
  • Better Essays

    NT2580 Graded Assignments

    • 5288 Words
    • 22 Pages

    You will learn how to match common risks or threats within the seven domains of a typical IT infrastructure with solutions and preventative actions.…

    • 5288 Words
    • 22 Pages
    Better Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    3. How does risk management and risk assessment relate to a business impact analysis for an IT infrastructure?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 3

    • 412 Words
    • 2 Pages

    5. Which of the seven domains of a typical IT infrastructure is easy to implement risk mitigation solutions but difficult to monitor and track effectiveness? Of the seven domains, in my opinion, the remote access domain is the easiest to implement solutions for but more difficult to monitor and track effectiveness.…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Finance Questions

    • 600 Words
    • 2 Pages

    7. For each of the seven domains of a typical IT infrastructure, what process or procedures would you perform to obtain information about security controls and safeguards?…

    • 600 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Risk Management

    • 622 Words
    • 3 Pages

    To assess risks and vulnerabilities with the operating IT facilities we must create a mitigation plan. The mitigation plan will ensure what actions or steps to take when a risk were to occur. If the company were to experience risk such as fire, users outages, remote access, opening unknown e-mail attachment or have equipment failure, the mitigation plan will let you know…

    • 622 Words
    • 3 Pages
    Good Essays
  • Good Essays

    To modify the erroneousness risk management, in order to optimize they should develop the risk management system alongside with the Safety Management Systems (SMS) which consist of four components: Policy (establish the SMS structure), Safety Risk Management (controlling risk in acceptable level), Safety Assurance (make sure that they are continuously improving) and Safety promotion (promote safety as core values). When they apply all of the components, they will understand the system and environment and can identify hazardous conditions to find the efficient solution to solve the entire problem for secure access and smooth…

    • 1443 Words
    • 6 Pages
    Good Essays