0% found this document useful (0 votes)
77 views

Lab #4

The document provides instructions for a qualitative risk assessment of an IT infrastructure. It lists various risks, threats, and vulnerabilities across different domains - including user, workstation, LAN, LAN-to-WAN, WAN, remote access, and systems/applications. For each risk, it provides a description and assigns a risk impact factor of 1, 2, or 3 to designate the risk as critical, major, or minor based on its potential impact. The assessment aims to identify and prioritize risks in order to improve security and compliance.

Uploaded by

Trần Mỹ Linh
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
77 views

Lab #4

The document provides instructions for a qualitative risk assessment of an IT infrastructure. It lists various risks, threats, and vulnerabilities across different domains - including user, workstation, LAN, LAN-to-WAN, WAN, remote access, and systems/applications. For each risk, it provides a description and assigns a risk impact factor of 1, 2, or 3 to designate the risk as critical, major, or minor based on its potential impact. The assessment aims to identify and prioritize risks in order to improve security and compliance.

Uploaded by

Trần Mỹ Linh
Copyright
© © All Rights Reserved
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 6

Lab #4: Assessment Worksheet

Perform a Qualitative Risk Assessment for an IT Infrastructure


Overview
The following risks, threats, and vulnerabilities were found in an IT
infrastructure. Your Instructor will assign you one of four different scenarios
and vertical industries each of which is under a unique compliance law.
1. Scenario/Vertical Industry:
 Healthcare provider under HIPAA compliance law
 Regional bank under GLBA compliance law
 Nationwide retailer under PCI DSS standard requirements
 Higher-education institution under FERPA compliance law
2. Given the list, perform a qualitative risk assessment by assigning a risk
impact/risk factor to each of identified risks, threats, and vulnerabilities
throughout the seven domains of a typical IT infrastructure that the risk, threat,
or vulnerability resides
Risk-Threat- Primary Domain Risk Impact/Factor
Vulnerability Impacted
Unauthorized access Internet Remote Access 1
from public
User destroys data in Systems/Application 3
application and
deletes all files

Hacker penetrates your LAN-to-WAN 1


IT infrastructure and
gains access to your
internal network

Intra-office employee User 3


romance gone bad
Fire destroys primary Systems/Application 1
data center
Service provider SLA is WAN 3
not achieved
Workstation OS has a Workstation 2
known software
vulnerability
Unauthorized access to Workstation 1
organization owned
workstations
Loss of production data Systems/Application 2
Denial of service attack LAN-to-WAN 1
on organization DMZ e-
mail server
Remote Remote Access 2
communications from
home office
LAN server OS has a LAN 2
known software
vulnerability

User downloads and User 1


clicks on an unknown
Workstation browser Workstation 3
has a software
vulnerability

Mobile employee needs Remote Access 3


secure browser access to
sales order entry system

Service provider has a WAN 2


major network outage
Weak ingress/egress LAN-to-WAN 3
traffic filtering degrades
performance
User inserts CDs and User 2
USB hard drives with
personal photos, music,
and videos on
organization owned
computers

VPN tunneling between LAN-to-WAN 2


remote computer
and ingress/egress router
is needed
WLAN access points LAN 3
are needed for LAN
connectivity within a
warehouse
Need to prevent LAN 1
eavesdropping on
WLAN
due to customer privacy
data access

DoS/DDoS attack from WAN 1


the WAN/Internet

3. For each of the identified risks, threats, and vulnerabilities, prioritize


them by listing a “1”, “2”, and “3” next to each risk, threat, vulnerability found
within each of the seven domains of a typical IT infrastructure. “1” = Critical,
“2” = Major, “3” = Minor. Define the following qualitative risk impact/risk
factor metrics:
a. “1” Critical – a risk, threat, or vulnerability that impacts compliance
(i.e., privacy law requirement for securing privacy data and implementing
proper security controls, etc.) and places the organization in a position of
increased liability.
b. “2” Major – a risk, threat, or vulnerability that impacts the C-I-A of an
organization’s intellectual property assets and IT infrastructure.
c. “3”Minor – a risk, threat, or vulnerability that can impact user or
employee productivity or availability of the IT infrastructure.
User Domain Risk Impacts: (refer to previous chart):
1) User downloads and clicks on an unknown e-mail attachment.
Explanation: This error occurs when the user downloads and opens a file
Email attachments of unknown origin. This is possible lead to infection with
malware or other malicious software and create risks to the system and user
data.
Example: User receives a strange email with attachment "invoice.zip" and do
not know the source of this email. They download and extract the attachment
without checking. However, the file contains a malicious program that is
activated when the user open it. This can damage the system and steal personal
information user's kernel.
2) User inserts CDs and USB hard drives with personal photos, music,
and videos on organization ownedcomputers.
Explanation: This risk occurs when a user inserts a CD or USB hard drive
stores personal data such as photos, music, and videos onto computers owned by
the organization. This can create security holes and threaten information
security, because data individuals may contain malware, malicious code, or
other unsafe files.
3) Intra-office employee romance gone bad
Explanation: This risk occurs when an emotional relationship between
individuals employees in the office become worse. This may affect digestion
harmful to the work environment, causing distraction, conflict, and even
affect job performance and organizational stability.
Workstation Domain Risk Impacts: (refer to previous chart):
1) Unauthorized access to organization owned workstations.
Explanation: This risk occurs when there is unauthorized access to
workstations owned by the organization. This may lead to information
disclosure sensitive, violates privacy, and harms systems and organizational data
office.
2) Workstation OS has a known software vulnerability.
Explanation: This risk occurs when the workstation's operating system has
a hole known software vulnerabilities. This can create conditions for attackers
publicly exploit the vulnerability to penetrate the workstation, causing harm to
the system and information theft.

3) Workstation browser has software vulnerability.


Explanation: This risk occurs when the browser on the workstation has a
hole software vulnerability, which is a weakness in browser software, can be
exploited by attackers to get into machines station and harm the system and data.
Example: A computer on an organization's network uses a certain web
browsers, and this version of the browser has a hole known software
vulnerabilities. Attackers exploit this vulnerability by taking advantage of
security holes in the browser, for example such as cache errors, to perform
remote attacks. This may lead to the installation of malicious software on the
computer, steal personal information or take control of your computer remotely.
LAN Domain Risk Impacts: (refer to previous chart):
i. Need to prevent eavesdropping on WLAN due to customer privacy data
access.
Explanation : This risk occurs when it is necessary to prevent
eavesdropping on the WLAN (wireless local area network) to protect customers'
private data. This is especially important when transmitting sensitive data over a
WLAN, as the information can be expose and harm the privacy and reputation
of customers.
ii. LAN server OS has a known software vulnerability.
Explanation: This risk occurs when the LAN server operating system has
a hole known software vulnerabilities. This makes it possible for the attacker to
openly exploit the vulnerability to penetrate the LAN server, causing harm to the
system, image affect the performance and security of the LAN.
iii. WLAN access points are needed for LAN connectivity within a
warehouse.
Explanation : This risk occurs when WLAN access points are required to
connect LAN in a warehouse. This creates a security hole, because the WLAN
access point can become a potential weakness and be vulnerable to an attacker
exploit to infiltrate LAN and cause harm.
LAN-to-WAN Domain Risk Impacts: (refer to previous chart):
1) Denial of service attack on organization DMZ and e-mail server.
2) VPN tunneling between remote computer and ingress/egress router is
needed.
3) Weak ingress/egress traffic filtering degrades performance
WAN Domain Risk Impacts: (refer to previous chart):
1) DoS/DDoS attack from the WAN/Internet.
2) Service provider has a major network outage.
3) Service provider SLA is not achieved.
Remote Access Domain Risk Impacts: (refer to previous chart):
1) Unauthorized access from public Internet.
2) Remote communications from home office.
3) Mobile employee needs secure browser access to sales order entry
system
Systems/Applications Domain Risk Impacts: (refer to previous chart):
1) Fire destroys primary data center.
2) Loss of production data.
3) User destroys data in application and deletes all files.

You might also like