Preview

Threats and Vulnerabilities in IT Infrastructure

Satisfactory Essays
Open Document
Open Document
454 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Threats and Vulnerabilities in IT Infrastructure
Lab 1 Identify Threats and Vulnerabilities in IT Infrastructure

Denise Clark, Joseph Huiet, Anthony Brown, Orlando Rodriguez, Niko Budworth, Cory Mooney, Armando Rocha, Denny Hoang

Risk – Threat – Vulnerability
Primary Domain Impacted
Unauthorized access from public internet
WAN
User destroys data in application and deletes all files
System/Application
Hacker penetrates your IT infrastructure and gains access to your internal network
LAN
Intra-office employee romance gone bad
User
Fire destroys primary data center
LAN
Communication circuit outages
WAN
Workstation OS has a known software vulnerability
Workstation
Unauthorized access to organization owned
Remote Access
Workstations
Workstation
Loss of production data
WAN
Denial of service attack on organization e-mail Server
WAN
Remote communications from home office
Remote Access
LAN server OS has a known software vulnerability
LAN
User downloads an unknown e-mail attachment
User
Workstation browser has software vulnerability
Workstation
Service provider has a major network outage
WAN
Weak ingress/egress traffic filtering degrades Performance
LAN-to-WAN
User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers
User
VPN tunneling between remote computer and ingress/egress router
Remote Access
WLAN access points are needed for LAN connectivity
LAN
Need to prevent rogue users from unauthorized WLAN access
LAN
Lab 1 Part A List of Risks, Threats, and Vulnerabilities

Lab 1 Part B Assessment Questions
1. We chose the ‘User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers’ because, the USB device may contain malware allowing unauthorized access to the infected system.
2. User Domain: 2
Workstation Domain: 3
LAN Domain: 5
LAN-to-WAN Domain: 1
WAN Domain: 5
Remote Access Domain: 3
System/Application Domain: 1
3. The LAN and the WAN Domain had the greatest number of risks, threats, and vulnerabilities.
4.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    NT2580 Lab 2

    • 385 Words
    • 2 Pages

    2. What is the relationship between risks, threats and vulnerabilities as it pertains to Information Systems Security throughout the seven domains of a typical IT infrastructure?…

    • 385 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Nt280 Week 1 Homework

    • 359 Words
    • 2 Pages

    C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and discuss status during performance reviews.…

    • 359 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You Decide Assignment

    • 755 Words
    • 4 Pages

    As a company grows , changes and new policies are created to fit the fast pace industry that we live in today. And as a part of your IT staff, I 've collected some information that can help the company, with implementing a new policy when it comes with computer use. From legal reasons, virus attacks, to our network systems and services, we all need to be aware and cautious about this as a whole. The material I 'll be covering today will include all of the issues brought up by our CEO, CFO, and General Manager. In addition, an explanation on general use ownership, security and proprietary information, and unacceptable use, will be discussed.…

    • 755 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Dark Jerseys Group

    • 489 Words
    • 2 Pages

    Jessiman, Zachary Mongillo, Nicolas Fleck, Julien Christodoulou, Ethan Burton, Bradley Janardhanan, Haresh Johnston, Cade Sadat, Moumen Garlock, Zachary Yazdani, Cyrus Singh, Daniel…

    • 489 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    Cultural Experience

    • 3266 Words
    • 14 Pages

    Arrendondo, P., Toporek, M. S., Brown, S., Jones, J., Locke, D. C., Sanchez, J., &…

    • 3266 Words
    • 14 Pages
    Best Essays
  • Satisfactory Essays

    Nt2580 Project 1

    • 492 Words
    • 2 Pages

    For the LAN domain, we need to have annual training about fictitious emails. Most users know not to access unknown emails when on our system but a brief training course will assist in this matter. Also, adding spam filters will help rid of most junk email, so there is less risk of employees opening emails which may contain malware. In the LAN-to-WAN domain, we need to power off FTP servers running then switch over to the use of secure FTP servers so that only users allowed on our system can access them.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    User domain is essentially the people who access the information system. User domains tend to receive risk due to the user’s carelessness due to lack of awareness, not caring for policies, and security violations. These can easily be rectified with training. Conduct security awareness training, display security posters around the office, and send email reminders to keep the policies fresh in the employee’s mind. Another common threat is caused by employee misuse of the system. Employees might insert USB drives, or download photos music and videos. These items might contain virus’s which in turn damages the system. The USB ports should be disabled and content filtering and antivirus scanning should be enabled.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Identify risks that could lead to an information security breach, Identify vulnerabilities in system security, software operation, network design or employee procedures that could lead to a network failure.…

    • 339 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The reason why the User Domain infrastructure is one of the most affected infrastructures is because the User Domain infrastructure is the infrastructure that allows users to access the network. This is a problem because many users do not fully understand everything, all the time and thus is bound to make a mistake sooner or later. With so many users on our network, this is probably the most vulnerable domain infrastructures in our network.…

    • 285 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the WAN domain, we need to make sure that we have firewalls set up on our network to filter all incoming traffic. A firewall will stop all traffic coming on to our system that is not meant or not wanted on the Richman Investments network.…

    • 512 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    If the user can access the file server using an IP address but not a name, then the most likely reason for failure to connect is a name resolution problem. Name resolution can fail for NetBIOS or DNS host names. If the client operating system is NetBIOS dependent, the VPN clients should be assigned a WINS server address by the VPN server. If the client operating system uses DNS preferentially, VPN clients should be assigned an internal DNS server that can resolve internal network host names.…

    • 1528 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    IS3110 - lab 6

    • 511 Words
    • 3 Pages

    4. What risk mitigation solutions do you recommend for handling the following risk element? User inserts CDs and USB hard drives with personal photos, music, and videos on organization owned computers.…

    • 511 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    IS3110 Quiz 6 2015

    • 600 Words
    • 2 Pages

    3. Using the WORKSTATION domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…

    • 600 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    A Strategy to Enter Brazil

    • 6615 Words
    • 27 Pages

    Sylvain Charlebois1, Meera Haque1, Caleigh Nevin1, Alicia Savile1, Dana Husain1, Maggie Chen1, Benjamin Bickers1 & Dave Howard1…

    • 6615 Words
    • 27 Pages
    Powerful Essays
  • Powerful Essays

    Books Hunting

    • 5166 Words
    • 21 Pages

    Patricia M. Sias, Jolanta A. Drzewiecka, Mary Meares, Rhiannon Bent, Yoko Konomi, Maria Ortega, & Colene White…

    • 5166 Words
    • 21 Pages
    Powerful Essays