29 Dec 13. When considering the implem
Assessment Worksheet
Developing a Risk-Mitigation Plan Outline for an IT Infrastructure Course Name and Number:
Overview
In this lab, you identified the scope for an IT risk-mitigation plan, you aligned the plan’s major parts with the seven domains of an IT infrastructure, you defined the risk-mitigation steps, you defined procedures and processes needed to maintain a security baseline for ongoing mitigation, and you created an outline for an IT risk-mitigation plan.
Lab Assessment Questions & Answers
1. Why is it important to prioritize your IT infrastructure risks, threats, and vulnerabilities?
2. Based on your executive summary produced in the Performing a Qualitative Risk Assessment for an IT Infrastructure lab in this lab manual, what is the primary focus of your message to executive management?
3. Given the scenario for your IT risk-mitigation plan, what influence did your scenario have on prioritizing your identified risks, threats, and vulnerabilities?
4. What risk-mitigation solutions do you recommend for handling the following risk element: User inserts CDs and USB hard drives with personal photos, music, and videos on organization-owned computers?
5. What is a security baseline definition?
6. What questions do you have for executive management to finalize your IT risk-mitigation plan?
7. What is the most important risk-mitigation requirement you uncovered and want to communicate to executive management? In your opinion, why is this the most important risk-mitigation requirement?
8. Based on your IT risk-mitigation plan, what is the difference between short-term and long-term
risk-mitigation tasks and ongoing duties?
9. For which of the seven domains of a typical IT infrastructure is it easy to implement risk- mitigation solutions but difficult to monitor and track effectiveness?
10. Which of the seven domains of a typical IT infrastructure usually contains privacy data in systems, servers, and databases?
11. Which of the seven domains of a typical IT infrastructure can access privacy data and also store it on local hard drives and disks?
12. Why is the Remote Access Domain the most risk-prone of all in a typical IT infrastructure?
13. When considering the implementation of software updates, software patches, and software fixes, why must you test the upgrade or software patch before you implement it as a risk-mitigation tactic?
53
Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblea
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
Do you need help with this question?
Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.
WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.
With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Chat with us today! We are always waiting to answer all your questions.