Top-Rated Free Essay
Preview

IS3110 Quiz 6 2015

Good Essays
600 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3110 Quiz 6 2015
1. Define an SLA and state why it is required in a risk adverse organization
Is a document that identifies an expected level of performance. It identifies the minimum uptime or the maximum downtime. Organizations use SLAs as contracts between a service provider and a customer. An SLA can identify monetary penalties if the terms are not met. Also at the bare minimum is should be the organizational Mission. If your organization has SLAs with other organizations, these should be included in the risk management review. You should pay special attention to monetary penalties. For example, an SLA could specify a maximum downtime of four hours. After four hours, hourly penalties will start to accrue. You can relate this to the maximum acceptable outage (MAO).

2. Using the USER domain, define risks associated with users and explain what can be done to mitigate them. Are related to social engineering. Users can be conned and tricked. A social engineer tries to trick a user into giving up information or performing an unsafe action. You can try to minimize these risks by raising user awareness. Implement acceptable use policies (AUPs) to ensure users know what they should and should not be doing. Use logon banners to remind users of the AUP. Send out occasional e-mails with security tidbits to keep security in their minds. Use posters in employee areas.

3. Using the WORKSTATION domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.

These are related to malware and Viruses. Users can bring malware from home on Universal Serial Bus (USB) flash disks. They can accidentally download malware from Web sites. They can also install malware from malicious e-mails. The primary protection is to ensure that you install antivirus (AV) software. Additionally, you need to update AV signatures regularly. You can’t depend on the users to keep their signatures up to date. Instead, you must take control of the process. Many AV vendors provide tools to automatically install and update AV software on workstations. You must also be sure to keep operating systems up to date. When security patches become available, they should be evaluated and deployed when needed. Many of these security patches remove vulnerabilities. Without the patch, the systems remain vulnerable.

4. List four compliance laws, regulations, or mandates and explain them.
a. GLBA This is a standard for any organization dealing with Financials like a BANK
b. HIPPA HIPAA applies to any organization that handles health information. The obvious organizations that handle health information are hospitals and doctor’s offices. However, HIPAA reaches much farther than the medical industry. Health information includes any data that relates to the health of individuals
c. SOX is a standard for any organization that deals with Trade and Exchange.
d. ERPA = Is a set standard for educational Organizations which protect children from the age of 13 an below from viewing potential disturbing images on the Internet.

5. Define risk with a formula. Explain what each variable means.
The formula for risk is as follows:
Vulnerability X Threat = RISKS

A Vulnerability can be an open port that shouldn’t be open, Which can be exploited. Furthermore Vulnerability can be software as well as Physical access to a computer or server that shouldn’t be accessible.
A Threat can be a disgruntle employee can has the capability to do harm to an IT infrastructure.
Risks is when there’s an assessment performed and that can be determined the possibility or Potential Exploitation of Vulnerability by the Potential Threat. Also risk can be rated as High, Medium, and Low.

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Lab 9

    • 1001 Words
    • 3 Pages

    1. What are some common risks, and vulnerabilities commonly found in the System/Application Domain that must be mitigated with proper security countermeasures?…

    • 1001 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    HCS 451 Week 5 DQs

    • 407 Words
    • 2 Pages

    2. How can these strategies help minimize risk and improve quality? Provide specific examples to support your answers.…

    • 407 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    The User Domain is made up of the employees that have access to the organizations equipment and network and is the weakest link in any IT infrastructure, including the one here at Richman Investments. The amount of social networking and the errors that are made by employees may end be detrimental to the network and cause data to be lost, tampered with, or stolen. The best way to avoid this would be to implement an Acceptable Use Policy (AUP). This will inform the employees what they can and cannot do with company information, resources, and equipment. Anyone that abuses the AUP will be held accountable for their actions. Employees must have their individual permissions for what they can and cannot do in order to make them accountable. It is the responsibility of the HR to check the background of each employee thoroughly and follow with regular evaluations. It is also important that security control audits are performed to secure the system against risks and threats.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    We will educate employees on how to properly secure information by user ID and password management training. Instructing them on how to…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    You Decide- Sec572 Week 2

    • 577 Words
    • 3 Pages

    To develop network security strategies that will ensure that the organization's network is protected from both internal and external security risks. A summary of the steps I can take to mitigate the risk in the following areas: Denial-of-Service attacks (DoS), Distributed Denial-of-Service attacks (DDoS), Masquerading and IP Spoofing, Smurf attacks, Land.c attacks, Man-in-the-Middle attacks.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Is3110 Week5 Quiz

    • 218 Words
    • 2 Pages

    3. Define three of the responsibilities that an Incident Response Team would have. List them and describe the responsibilities.…

    • 218 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    User domain is essentially the people who access the information system. User domains tend to receive risk due to the user’s carelessness due to lack of awareness, not caring for policies, and security violations. These can easily be rectified with training. Conduct security awareness training, display security posters around the office, and send email reminders to keep the policies fresh in the employee’s mind. Another common threat is caused by employee misuse of the system. Employees might insert USB drives, or download photos music and videos. These items might contain virus’s which in turn damages the system. The USB ports should be disabled and content filtering and antivirus scanning should be enabled.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Itm/6015 Week 3 Quiz

    • 806 Words
    • 4 Pages

    3. All of the following led to an unprecedented level of IT investments in the 1990s…

    • 806 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    POL 310 Week 2 Quiz

    • 519 Words
    • 4 Pages

    10. The Clean Air Act requires states to work in conjunction with the federal government to develop a(n) _________ to bring air quality into compliance with national standards. (Points : 1)…

    • 519 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC 363 Week 2 Quiz

    • 320 Words
    • 2 Pages

    What would you most commonly do to reduce the potential risk from a threat/vulnerability pair?…

    • 320 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SOC 313 Week 5 Quiz

    • 649 Words
    • 3 Pages

    In this file of SOC 313 Week 5 Quiz you will find the next information: 1. An important consideration regarding assistive devices is that…

    • 649 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Is 305 Week 3 Quiz

    • 577 Words
    • 3 Pages

    Using the workstation domain, define risks associated within that domain and explain what can be done to reduce risks in that domain.…

    • 577 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Pt1420 Quiz 6

    • 332 Words
    • 2 Pages

    Out of all of the 16 arguments, I think that the first and the eleventh are the most compelling. The reason for this is because freedom of speech is important, and giving opinions would not only be helpful to certain things, but it is only fair. Another reason is that practicality and wisdom are both very good to have, and it would come in handy when it comes to voting and things such as that.…

    • 332 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Anth100 Quiz 1

    • 298 Words
    • 3 Pages

    Which of the following can you use to help you during the take-home essay midterm or take-home essay final?…

    • 298 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Unit 7 Lab

    • 293 Words
    • 2 Pages

    7. What must you explain to executive management when defining RTO and RPO objectives for the BIA?…

    • 293 Words
    • 2 Pages
    Satisfactory Essays

Related Topics