The document summarizes a lab assignment where students were asked to identify risks, threats, and vulnerabilities across seven domains of a typical IT infrastructure for a healthcare organization. They then matched appropriate security policy definitions that could help mitigate each issue. Finally, the document discusses how defining policies for each domain can strengthen security across the entire IT infrastructure. It emphasizes that successful policy implementation requires support from people, policies, and technologies within the organization.
The document summarizes a lab assignment where students were asked to identify risks, threats, and vulnerabilities across seven domains of a typical IT infrastructure for a healthcare organization. They then matched appropriate security policy definitions that could help mitigate each issue. Finally, the document discusses how defining policies for each domain can strengthen security across the entire IT infrastructure. It emphasizes that successful policy implementation requires support from people, policies, and technologies within the organization.
The document summarizes a lab assignment where students were asked to identify risks, threats, and vulnerabilities across seven domains of a typical IT infrastructure for a healthcare organization. They then matched appropriate security policy definitions that could help mitigate each issue. Finally, the document discusses how defining policies for each domain can strengthen security across the entire IT infrastructure. It emphasizes that successful policy implementation requires support from people, policies, and technologies within the organization.
The document summarizes a lab assignment where students were asked to identify risks, threats, and vulnerabilities across seven domains of a typical IT infrastructure for a healthcare organization. They then matched appropriate security policy definitions that could help mitigate each issue. Finally, the document discusses how defining policies for each domain can strengthen security across the entire IT infrastructure. It emphasizes that successful policy implementation requires support from people, policies, and technologies within the organization.
Download as DOCX, PDF, TXT or read online from Scribd
Download as docx, pdf, or txt
You are on page 1of 6
Lab #3 – Assessment Worksheet
Part A – List of Risks, Threats, and Vulnerabilities Commonly Found in an IT
Infrastructure Course Name: IAP301 Student Name: SonLTSE161501 Instructor Name: DinhMH Lab Due Date: 3-2-2023 Overview The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure serving patients with life-threatening situations. Given the following list, select where the risk, threat, or vulnerability resides in the seven domains of a typical IT infrastructure Risk- Threat- Vulnerability Primary Domain Impacted Unauthorized access from public Remote Access Domain Internet User destroys data in application and System/Application Domain deletes all files Hacker penetrates your IT Lan-to-Wan Domain infrastructure and gains access to your internal network Intra-office employee romance gone User Domain bad Fire destroys primary data center System/Application Domain Communication circuit outages Wan Domain Workstation OS has a known software Workstation Domain vulnerability Unauthorized access to organization Workstation Domain owned Workstation Loss of production data System/Application Domain Denial of service attack on Lan-to-Wan Domain organization e-mail Server Remote communications from home Remote Access Domain office LAN server OS has a known software LAN Domain vulnerability User downloads an unknown e-mail User Domain attachment Workstation browser has software Workstation Domain vulnerability Service provider has a major network WAN Domain outage Weak ingress/egress traffic filtering LAN-to-WAN Domain degrades Performance User inserts CDs and USB hard drives User Domain with personal photos, music and videos on organization owned computers VPN tunneling between remote LAN-to-WAN Domain computer and ingress/egress router WLAN access points are needed for LAN Domain LAN connectivity within a warehouse Need to prevent rogue users from LAN Domain unauthorized WLAN access
Part B –List of Risks, Threats, and Vulnerabilities Commonly Found in an IT
Infrastructure Overview For each of the identified risks, threats, and vulnerabilities; select the most appropriate policy definition that may help mitigate the identified risk, threat, or vulnerability within that domain from the following list: Policy Definition List Acceptable Use Policy Access Control Policy Definition Business Continuity – Business Impact Analysis (BIA) Policy Definition Business Continuity & Disaster Recovery Policy Definition Data Classification Standard & Encryption Policy Definition Internet Ingress/Egress Traffic Policy Definition Mandated Security Awareness Training Policy Definition Production Data Back-up Policy Definition Remote Access Policy Definition Vulnerability Management & Vulnerability Window Policy Definition WAN Service Availability Policy Definition
Unauthorized access from public Remote Access Policy Definition Internet User destroys data in application and Acceptable Use Policy deletes all files Hacker penetrates your IT Access Control Policy Definition infrastructure and gains access to your internal network Intra-office employee romance gone Acceptable Use Policy bad Fire destroys primary data center Business Continuity & Disaster Recovery Policy Definition Communication circuit outages WAN Service Availability Policy Definition Workstation OS has a known software Vulnerability Management & vulnerability Vulnerability Window Policy Definition Unauthorized access to organization Access Control Policy Definition owned Workstation Loss of production data Production Data Back-up Policy Definition Denial of service attack on WAN Service Availability Policy organization e-mail Server Definition Remote communications from home Remote Access Policy Definition office LAN server OS has a known software Vulnerability Management & vulnerability Vulnerability Window Policy Definition User downloads an unknown e-mail Mandated Security Awareness Training attachment Policy Definition Workstation browser has software Vulnerability Management & vulnerability Vulnerability Window Policy Definition Service provider has a major network WAN Service Availability Policy outage Definition Weak ingress/egress traffic filtering Internet Ingress/Egress Traffic Policy degrades Performance Definition User inserts CDs and USB hard drives Acceptable Use Policy with personal photos, music and videos on organization owned computers VPN tunneling between remote Internet Ingress/Egress Traffic Policy computer and ingress/egress router Definition WLAN access points are needed for WAN Service Availability Policy LAN connectivity within a warehouse Definition Need to prevent rogue users from Access Control Policy Definition unauthorized WLAN access
Define an Information Systems Security Policy Framework for an IT
Infrastructure Overview In this lab, students identified risks, threats, and vulnerabilities throughout the seven domains of a typical IT infrastructure. By organizing these risks, threats, and vulnerabilities within each of the seven domains of a typical IT infrastructure information system security policies can be defined to help mitigate this risk. Using policy definition and policy implementation, organizations can “tighten” security throughout the seven domains of a typical IT infrastructure.
Lab Assessment Questions & Answers
1. A policy definition usually contains what four major parts or elements? - command-and-control measures, enabling measures, monitoring, incentives and disincentives 2. In order to effectively implement a policy framework, what three organizational elements are absolutely needed to ensure successful implementation? - people, policy and technologies
3. Which policy is the most important one to implement to separate
employee from employee? Which is the most challenging to implement successfully? - Acceptable Use Policy is the important. - It is about how everyone has a different worldview. It is challenging to get everyone to follow the rules, and it may be laborious to update the rules frequently. 4. Which domain requires stringent access controls and encryption for connectivity to the corporate resources from home? What policy definition is needed for this domain? - Remote Access Domain and Remote Access Policy Definition, respectively. 5. Which domains need software vulnerability management & vulnerability window definitions to mitigate risk form software vulnerabilities? - Workstation Domain, System/Application Domain, LAN Domain and LAN / WAN Domain 6. Which domain requires AUPs to minimize unnecessary User-initiated Internet traffic and awareness of the proper use of organization-owned IT assets? - Workstation Domain. 7. What policy definition can help remind employees within the User Domain about on-going acceptable use and unacceptable use? - Acceptable Use Policy. 8. What policy definition is required to restrict and prevent unauthorized access to organization owned IT systems and applications? - Access Control Policy. 9. What is the relationship between an Encryption Policy and a Data Classification Standard? - Both assist in categorizing sensitive information and defending it against illegal access. 10.What policy definition is needed to minimize data loss? - Data Loss Prevention Policy Definition.