Information Security Assignment

Review the seven domain of the typical IT infrastructure

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Using the following table of risks, threats, and vulnerabilities that were found in a health care IT infrastructure servicing patients with life-threatening conditions, review the risks in the following table. Consider how you might manage each risk and which of the seven domains each one affects:

Risks, Threats, and Vulnerabilities Unauthorized access from public Internet

Hacker penetrates IT infrastructure

Communication circuit outages

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

Workstations

Workstation operating system (OS) has a known software vulnerability

Denial of service attack on organization’s e-mail

Remote communications from home office

Workstation browser has software vulnerability

Weak ingress/egress traffic-filtering degrades performance

Wireless Local Area Network (WLAN) access points are needed for Local Area Network (LAN) connectivity within a warehouse

Need to prevent rogue users from unauthorized WLAN access

User destroys data in application, deletes all files, and gains access to internal network

Fire destroys primary data center

Intraoffice employee romance gone bad

Loss of production data server

Unauthorized access to organization-owned workstations

LAN server OS has a known software vulnerability

User downloads an unknown e-mail attachment

Service provider has a major network outage

A technician inserts CDs and USB hard drives with personal photos, music, and videos on organization-owned computers

User inserts CDs and USB hard drives with personal photos, music, and videos on organization-owned computers

Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router

For each of the domains, create an outline in the scope of your risk management plan. Include the following topics: The five major parts of an IT risk management process for each domain:

Risk Planning

Risk identification

Risk assessment

Risk response

Risk monitoring

Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.

Order your essay today and save 30% with the discount code ESSAYHELP