Lab 4: Perform A Qualitative Risk Assessment For An IT Infrastructure
This document contains a qualitative risk assessment performed for the IT infrastructure of a healthcare provider. Various risks were identified across seven domains: user, workstation, LAN, LAN-to-WAN, WAN, remote access, and systems/applications. Each risk was assigned a priority level of 1, 2, or 3 based on its potential impact. Risks rated 1 were critical and involved compliance or liability issues. Risks rated 2 impacted the confidentiality, integrity and availability of assets. Risks rated 3 involved user productivity or availability. The assessment aims to identify and prioritize risks to help secure systems and data.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0 ratings0% found this document useful (0 votes)
266 views
Lab 4: Perform A Qualitative Risk Assessment For An IT Infrastructure
This document contains a qualitative risk assessment performed for the IT infrastructure of a healthcare provider. Various risks were identified across seven domains: user, workstation, LAN, LAN-to-WAN, WAN, remote access, and systems/applications. Each risk was assigned a priority level of 1, 2, or 3 based on its potential impact. Risks rated 1 were critical and involved compliance or liability issues. Risks rated 2 impacted the confidentiality, integrity and availability of assets. Risks rated 3 involved user productivity or availability. The assessment aims to identify and prioritize risks to help secure systems and data.
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 4
Lab 4: Perform a Qualitative Risk Assessment for
an IT Infrastructure Name: Nguyễn Huỳnh Minh Đan MSSV: SE159145
Part A – Perform a Qualitative Risk Assessment
for an IT Infrastructure 1. Scenario/Vertical Industry: Healthcare provider under HIPPA compliance law Risk – Threat – Vulnerability Primary Domain Risk Impact/Factor Impacted Unauthorized access from Wan 1 public Internet User destroys data in User 2 application and deletes all files Hacker penetrates your IT LAN 1 infrastructure and gains access to your internal network Intra-office employee User 3 romance gone bad Fire destroys primary data System/Application 1 center Service provider SLA is not Wan 1 achieved Workstation OS has a known Workstation 2 software vulnerability Unauthorized access to Workstation 3 organization owned workstations Loss of production data System/Application 2 Denial of service attack on System/Application 1 organization DMZ and e- mail server Remote communications Remote Access 3 from home office LAN server OS has a known LAN 1 software vulnerability User downloads and clicks User 3 on an unknown Workstation browser has Workstation 2 software vulnerability Mobile employee needs User 3 secure browser access to sales order entry system Service provider has a major WAN 1 network outage Weak ingress/egress traffic LAN 3 filtering degrades performance User inserts CDs and USB User 3 hard drives with personal photos, music, and videos on organization owned computers VPN tunneling between Remote Access 2 remote computer and ingress/egress router is needed WLAN access points LAN-to-WAN 2 are needed for LAN connectivity within a warehouse Need to prevent LAN-to-WAN 3 eavesdropping on WLAN due to customer privacy data access DoS/DDoS attack from the WAN 1 WAN/Internet 3. For each of the identified risks, threats, and vulnerabilities, prioritize them by listing a “1”, “2”, and “3” next to each risk, threat, vulnerability found within each of the seven domains of a typical IT infrastructure. “1” = Critical, “2” = Major, “3” = Minor. Define the following qualitative risk impact/risk factor metrics: “1” Critical – a risk, threat, or vulnerability that impacts compliance (i.e., privacy law requirement for securing privacy data and implementing proper security controls, etc.) and places the organization in a position of increased liability. “2”Major – a risk, threat, or vulnerability that impacts the C-I-A of an organization’s intellectual property assets and IT infrastructure. “3”Minor – a risk, threat, or vulnerability that can impact user or employee productivity or availability of the IT infrastructure. User Domain Risk Impacts: 3 Workstation Domain Risk Impacts: 3 LAN Domain Risk Impacts: 2 LAN-to-WAN Domain Risk Impacts: 2 WAN Domain Risk Impacts: 2 Remote Access Domain Risk Impacts: 1 Systems/Applications Domain Risk Impacts: 1
Part B – Perform a Qualitative Risk Assessment
for an IT Infrastructure Lab Assessment Questions: 1. What is the goal or objective of an IT risk assessment? Risk assessment - to identify potential risks and vulnerabilities to the security, availability, and integrity that an organization creates, receives, maintains, or transmits. 2. Why is it difficult to conduct a qualitative risk assessment for an IT infrastructure? For infrastructure devices, we should only evaluate the risk on a quantitative basis, if assessed by qualitative, it must be based on a lot of infrastructure to infer the final result is the rate of risk possible risks. 3. What was your rationale in assigning “1” risk impact/ risk factor value of “Critical” for an identified risk, threat, or vulnerability? The "1" risk, threat, or vulnerability has an influence on compliance and exposes the organization to greater liability, but it is not as serious as the "2" or "3." 4. When you assembled all of the “1” and “2” and “3” risk impact/risk factor values to the identified risks, threats, and vulnerabilities, how did you prioritize the “1”, “2”, and “3” risk elements? What would you say to executive management in regards to your final recommended prioritization? By determining the importance of the danger to the infrastructure and the urgency with which it must be managed. The 1 and 2 must be mitigated as quickly as feasible, while the 3 can be mitigated or left alone at the discretion of management. 5. Identify a risk mitigation solution for each of the following risk factors: – User downloads and clicks on an unknown e-mail attachment: Set up user access restrictions and make it such that downloads require authorization. – Workstation OS has a known software vulnerability: Regularly update software, install anti-malware software – Need to prevent eavesdropping on WLAN due to customer privacy data access: Enhance WLAN security using encryptions such as: WPA2 and AES – Weak ingress/egress traffic filtering degrades performance: Strengthen firewall filtering – DoS/DDoS attack from the WAN/Internet: Always enable firewall security, install IPS and IDS systems into the infrastructure. – Remote access from home office: Make sure the VPN is in place and secure – Production server corrupts database: Restore database from last non-corrupt backup, and remove corruption from system.