Lab3 IAP301
Lab3 IAP301
Infrastructure
Course Name: IAP301
Student Name: Phạm Thị Minh Thúy (HE171100)
Instructor Name: Hoàng Mạnh Đức
Overview
The following risks, threats, and vulnerabilities were found in a healthcare IT infrastructure
serving patients with life-threatening situations. Given the following list, select where the
risk, threat, or vulnerability resides in the seven domains of a typical IT infrastructure.
LAN Domain
Lab #3 – Assessment Worksheet
Part B – List of Risks, Threats, and Vulnerabilities Commonly Found in an IT
Infrastructure
Overview
For each of the identified risks, threats, and vulnerabilities; select the most appropriate policy
definition that may help mitigate the identified risk, threat, or vulnerability within that
domain from the following list:
Policy Definition List
Acceptable Use Policy
Access Control Policy Definition
Business Continuity – Business Impact Analysis (BIA) Policy Definition
Business Continuity & Disaster Recovery Policy Definition
Data Classification Standard & Encryption Policy Definition
Internet Ingress/Egress Traffic Policy Definition
Mandated Security Awareness Training Policy Definition
Production Data Back-up Policy Definition
Remote Access Policy Definition
Vulnerability Management & Vulnerability Window Policy Definition
WAN Service Availability Policy Definition
User inserts CDs and USB hard drives with Internet Ingress/Egress Traffic Policy
personal photos, music, and videos on Definition
organization owned computers
Acceptable Use Policy
VPN tunneling between remote computer
and ingress/egress router
WLAN access points are needed for LAN Internet Ingress/Egress Traffic Policy
connectivity within a warehouse Definition
3. Which policy is the most important one to implement to separate employer from
employee? Which is the most challenging to implement successfully?
The most important policy to implement to separate employer from employee is the
Acceptable Use Policy. This policy outlines the acceptable behaviors and activities for
employees while using the organization's resources, including computers, networks, and
internet access. By clearly defining what constitutes acceptable use, the policy helps establish
boundaries between personal and professional activities, minimizing the risk of misuse or
abuse of company resources. It also helps protect the organization from legal liabilities
associated with inappropriate use of technology assets.
The most challenging policy to implement successfully may vary depending on the
organization's specific context and industry. However, one policy that is often challenging to
implement successfully is the Data Classification Standard & Encryption Policy. This policy
defines how sensitive data should be classified based on its level of confidentiality, integrity,
and availability, and outlines requirements for encrypting data to protect it from unauthorized
access or disclosure. Implementing this policy requires thorough assessment and
classification of data assets, deployment of encryption technologies, and ensuring compliance
with regulatory requirements. It also involves educating employees about data classification
and encryption practices, enforcing policy adherence, and regularly auditing and monitoring
data handling processes. Achieving effective implementation of this policy often requires
significant resources, coordination across departments, and ongoing efforts to address
evolving security threats and compliance obligations.
4. Which domain requires stringent access controls and encryption for connectivity
to the corporate resources from home? What policy definition is needed for this
domain?
- The domain that requires stringent access controls and encryption for connectivity to
corporate resources from home is the Remote Access Domain.
- For this domain, the policy definition needed is the Remote Access Policy Definition.
- WAN Domain: AUPs govern the use of the organization's wide area network and
internet connections. These policies establish rules and guidelines for accessing the
Internet, managing network resources, and maintaining network security. AUPs in this
domain help prevent unauthorized access, minimize the risk of malware infections,
and ensure compliance with legal and regulatory requirements related to internet
usage.
7. What policy definition can help remind employees within the User Domain about
on-going acceptable use and unacceptable use?
The policy definition that can help remind employees within the User Domain about ongoing
acceptable use and unacceptable use is the Acceptable Use Policy (AUP). The Acceptable
Use Policy outlines the rules and guidelines for the appropriate use of organization-owned IT
assets, including computers, networks, internet access, and software applications. It defines
acceptable behaviors and activities, as well as prohibited actions or uses that could pose risks
to security, productivity, or compliance.
12. Why should an organization have a remote access policy even if they already
have an Acceptable Use Policy (AUP) for employees?
13. What security controls can be implemented on your e-mail system to help
prevent rogue or malicious software disguised as URL links or e-mail
attachments from attacking the Workstation Domain? What kind of policy
definition should this be included in? Justify your answer.
Several security controls can be implemented on an email system to help prevent rogue or
malicious software disguised as URL links or email attachments from attacking the
Workstation Domain:
- Email Filtering and Anti-Spam Solutions
- Anti-Malware and Anti-Virus Scanning
- URL Filtering
- User Awareness Training
- Policy-Based Controls
These security controls should be included in both the Internet Ingress/Egress Traffic Policy
Definition and the Acceptable Use Policy (AUP):
- Internet Ingress/Egress Traffic Policy Definition: This policy defines the rules and
guidelines for managing incoming and outgoing internet traffic, including email
communications. It should specify the security controls and measures implemented to
protect against malicious email threats, such as email filtering, anti-malware scanning,
and URL filtering.
- Acceptable Use Policy (AUP): This policy outlines the acceptable behaviors and
guidelines for using organization-owned IT assets, including email systems. It should
include provisions related to safe email practices, such as avoiding clicking on
suspicious links or opening unexpected email attachments. By including email
security controls in the AUP, organizations reinforce the importance of adhering to
security measures and promoting safe email usage practices among users.
14. Why should an organization have annual security awareness training that
includes an overview of the organization’s policies?
An organization should have annual security awareness training that includes an overview of
the organization's policies because it:
- Mitigates risks by educating employees about security best practices.
- Ensures compliance with policies and regulatory requirements.
- Protects sensitive information by promoting awareness of security measures.
- Fosters a culture of security within the organization.
- Allows for continuous improvement and adaptation to evolving threats.