Preview

Is 305 Week 3 Quiz

Good Essays
Open Document
Open Document
577 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is 305 Week 3 Quiz
Week 3 Quiz

General Instructions:

1. This is a closed-book, closed-notes quiz. No reference material (including assignments and labs) will be permitted for use during the quiz session. 2. The quiz contains the following types of questions: * Short essay type 3. Place your answers in the space immediately following each question.

Quiz Questions 1. Define an SLA and state why it is required in a risk adverse organization. A SLA is a service level agreement, which is a contract between the ISP and the company. A SLA gives the company an idea of how much time they will be without services, should something happen with the ISP. A SLA is important to a company in making recovery plans, knowing what critical systems need to be available for a continuance of business and formulation of disaster recovery.

2. Using the user domain, define risks associated with users and explain what can be done to mitigate them. The user domain has several risk’s involved, as people are involved and there is no way employees can be monitored without the use of CCTV. Social engineering a person trying to obtain information through malicious means. The greatest tool in mitigating risk in the user domain is training and reminders for users to be aware of their surroundings. No acceptable user’s policy, AUP, or lack of training employees on the correct usage of the network. User accounts left active, if the employee is terminated, and another employee has the log on credentials. Mitigation would to be disabling all user accounts upon termination. .

3. Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain. The use of USB’s or disk, the files could contain viruses and infect other files or applications on the network. No acceptable user’s policy, AUP, or lack of training employees on the correct usage of the network. The users staying signed into their

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Opm/305 Week 4

    • 1351 Words
    • 6 Pages

    Koç University OPSM 305 Supply Chain Management Class 10: Incentive issues Zeynep Aksin zaksin@ku.edu.tr 1 Hamptonshire Express § Anna has a degree from journalism & operations research § She has started a daily newspaper in her hometown § She used a leased PC: lease cost $10 per day § A local printer prints newspapers at 0.20 per copy § Sales the next day between 6 am and 10 am § Newsstand rental $30 per day § Express sold to customers at $1 per copy § Copies not sold by 10 am are discarded…

    • 1351 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Bat1 Task 1

    • 1280 Words
    • 6 Pages

    IT staff can diminish security breaches by developing effective ways to teach clinical staff about securing their workstations when not in use. Mandatory in-service and power point presentations would be an effective way to do this. The importance of workstation security, not accessing another employee's computer while in use and not using another employee's password should be discussed. Along with how doing so would be in violation of company policy and the HIPAA Privacy Act. Disciplinary action should also be discussed.…

    • 1280 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    Lab 6 Assessment

    • 450 Words
    • 2 Pages

    7. Which of the seven domains of a typical IT infrastructure is easy to implement risk mitigation solutions but difficult to monitor and track effectiveness?…

    • 450 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure servicing patients with life-threatening situations. Given the list, select which of the seven domains of a typical IT infrastructure is primarily impacted by the risk, threat, or vulnerability.…

    • 404 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    7. List at least 3 risks your company will face, and explain how you will manage those risks.…

    • 309 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    c. Workstation OS has a known software vulnerability – Define a workstation application software vulnerability window policy. Update application software and security patches according to defined policies, standards, procedures, and guidelines.…

    • 868 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    I am addressing the impact of how the “Internal Use Only” should be used in our organization and how by using this term would add to the security of this organization. Of the seven layers IT infrastructure there are three that this policy would differently have an impact on the User Domain, Workstation Domain and the LAN Domain. The User Domain is made up of people who access the system on a daily basis because these are the users or people we have to educate them on how to protect their passwords and critical data for those who will have access to such data. We have an AUP (Acceptable Use Policy) set in place. We have post around the office reminders of how each employee can assist to protect critical information as well we have enable content filtering to prevent users from downloading files that could be malicious to the infrastructure. Workstation Domain are made up of the devices that employee used to connect to the IT Infrastructure with this we must make sure all the tools that are needed to do their jobs must be accessible and secure. The Workstation Domain must be kept as tight as possible without hindering the employee this where they first access the domain at this level also this where the most damage can be done by an employee. We have again educate our employees that a strong password that they can easily remember and no else can easily figure out also set certain policy on the workstations auto lockout after three attempts and workstation lock after idle for a period of time. We can install antivirus and malware software to ensure that our workstations are protected and monitored at all times. The LAN Domain is the one the requires the strongest security because at this level all the hardware and software were are joined together and also this is where the outside world meet the inside world meaning our LAN by connecting…

    • 416 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    1.3. Explain what risk assessment is and how this is managed in the work setting…

    • 3026 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Osi Layers

    • 597 Words
    • 3 Pages

    Companies should take the time to educate their employees on the security threats that each individual brings to the company. Throwing personal information into a dumpster and not shredding this information is a huge security risk. Each individual is given a password to access the system for his or her job and should never reveal their password to anyone. Employee’s must keep in mind that anything done under their login and password is considered that persons responsibility and therefore, by keeping their password safe, it eliminates the possibility of someone else using his or her log-in for malicious purposes.…

    • 597 Words
    • 3 Pages
    Good Essays
  • Good Essays

    You are the Information Security Officer at a medium-sized company (1,500 employees). The CIO asks you to explain why you believe it is important to secure the Windows and Unix/Linux servers from known shortcomings and vulnerabilities. Explain to your CIO what you can do to make sure the network infrastructure is more secure.…

    • 732 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Internet abuse

    • 1449 Words
    • 5 Pages

    Young, K. S. (2001). Managing employee internet abuse: a comprehensive plan to increase your productivity and reduce liability. Employee Internet Management, 1-37.…

    • 1449 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    * Create User types in the system and define user rights to them, to allow employees to access the system at any time, while preserving the confidentiality of other employee information.…

    • 970 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Misuse of Internet

    • 1778 Words
    • 8 Pages

    * 2. It is important to learn how to prevent misuse of your company’s technology resources and how to protect your business from legal liability for employee misuse of e-mail, blogs and the Internet. Managing Internet Misuse Introduction…

    • 1778 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    Library System

    • 714 Words
    • 3 Pages

    Poor Data Storage - All the data is stored in filing cabinets. Data could be misplaced due to human error. Data could be stolen very easily.…

    • 714 Words
    • 3 Pages
    Good Essays