Performing a Qualitative Risk Assessment for an IT InfrastructureDodi185
What is an IT risk assessment’s goal or objective?
Why is it difficult to conduct a quantitative risk assessment for an IT infrastructure?
What was your rationale in assigning a “1” risk impact/risk factor value of “Critical” to an
identified risk, threat, or vulnerability?
After you had assigned the “1,” “2,” and “3” risk impact/risk factor values to the identified risks,
threats, and vulnerabilities, how did you prioritize the “1,” “2,” and “3” risk elements? What
would you say to executive management about your final recommended prioritization?
Identify a risk-mitigation solution for each of the following risk factors:
a. User downloads and clicks on an unknown e-mail attachment
b. Workstation OS has a known software vulnerability
c. Need to prevent eavesdropping on WLAN due to customer privacy data access
d. Weak ingress/egress traffic-filtering degrades performance
e. DoS/DDoS attack from the WAN/Internet
f. Remote access from home office
g. Production server corrupts database
- 6 days ago
- history short paper
- Week 5 Discussion 3
- In the attached document there are nine review questions. Answer each as detailed as possible. A paragraph is sufficient. Do not copy answers directly from the book; reword them so I know you understand them .Give examples from other sources than the
- Mental Status Plan
- Help! Human Development Class
- (SCADA) systems