Sei sulla pagina 1di 4

Week 1 - Labs

IS3110
William Rose
9/17/2013

2013, Sep. 17

Rose, William

Part A List of Risks, Threats, and Vulnerabilities


Risk Threat Vulnerability
Unauthorized access from public internet
User destroys data in application and deletes
all files
Hacker penetrates your IT infrastructure and
gains access to your internal network
Intra-office employee romance gone bad
Fire destroys primary data center
Communication circuit outages
Workstation OS has a known software
vulnerability
Unauthorized access to organization owned
Workstations
Loss of production data
Denial of service attack on organization e-mail
Server
Remote communications from home office
LAN server OS has a known software
vulnerability
User downloads an unknown e-mail
attachment
Workstation browser has software
vulnerability
Service provider has a major network outage
Weak ingress/egress traffic filtering degrades
performance
User inserts CDs and USB hard drives with
personal photos, music, and videos on
organization owned computers
VPN tunneling between remote computer and
ingress/egress router
WLAN access points are needed for LAN
connectivity within a warehouse
Need to prevent rogue users from unauthorized
WLAN access.

Pg. 1

Primary Domain Impacted


Remote Access Domain
User
LAN-to-WAN Domain
User Domain
Systems Application Domain
LAN Domain
Workstation Domain
User Domain
Workstation
Systems Application Domain
Systems Application Domain
Remote Access Domain
LAN Domain
Workstation Domain
Workstation Domain
WAN Domain
LAN-to-WAN Domain
Workstation Domain

Remote Access Domain


LAN-to-WAN Domain
LAN Domain

2013, Sep. 17

Rose, William

Part B Identify Threats and Vulnerabilities in an IT Infrastructure


#1. Hacker penetrates your IT infrastructure and gains access to your internal network.
Justify: HIPPA is more about the accountability of keeping your medical records discreet in an
electronic world. While they are generally safe while stored on a database, if an outside user
gains access to the internal network, then the discreet nature of the medical records is
compromised.
#2. Domain Vulnerabilities
User Domain: 3
Workstation Domain: 5
LAN Domain: 3
LAN-to-WAN Domain: 3
WAN Domain: 1
Remote Access Domain: 3
Systems/Application Domain: 3
#3. The Workstation Domain had the greatest number of risks, threats, and vulnerabilities.
#4. CRITICAL IMPACT
Hacker Penetrates your IT infrastructure and gains access to your internal network.
MAJOR IMPACT
WLAN access points are needed for LAN connectivity within a warehouse.
MINOR IMPACT
Weak ingress/egress traffic filtering degrades performance.
#5. The Fire destroys primary data center threat requires a disaster recovery plan and business
continuity plan to maintain continued operations during a catastrophic outage.
#6. The User Domain represents the greatest risk and uncertainty.
#7. The Remote Access Domain requires stringent access controls and encryption for
connectivity to corporate resources from home.
#8. The User Domain requires annual security awareness training and employee background
checks.
#9. The Workstation Domain needs software vulnerability assessment to mitigate risk from
software vulnerabilities.
#10. The WAN Domain requires AUPs to minimize unnecessary User initiated Internet traffic
and can be monitored and controlled by web content filters.

Pg. 2

2013, Sep. 17

Rose, William

#11. You implement web content filters in the WAN Domain.


#12. Implementing a WLAN for laptop connectivity would fall under the Remote Access
Domain.
#13. The online banking servers and public internet hosting would fall under the WAN Domain.
#14. True.
#15. A layered security strategy throughout the seven domains mitigates risk for the
Systems/Application Domain by help prevent access to that domain. Every Domain thats not the
Systems/Applications Domain, simply makes it more difficult for an intruder to access the
Systems/Applications Domain. The harder time a person has getting into the network (via
Workstation, WAN, or Remote Access), then the more protection the final domain has. If a LAN
is properly configured to stop unauthorized access, that also makes it more difficult for an
intruder to access the final domain.

Pg. 3

Potrebbero piacerti anche