Lab4 Iaa202
Lab4 Iaa202
Overview
The following risks, threats, and vulnerabilities were found in an IT infrastructure. Your
Instructor will assign you one of four different scenarios and vertical industries each of which
is under a unique compliance law.
1. Scenario/Vertical Industry:
3. For each of the identified risks, threats, and vulnerabilities, prioritise them by listing a "1",
2",and "3" next to each risk, threat, vulnerability found within each of the seven domains of a
typical IT infrastructure. "1" = Critical, "2" = Major, "3" = Minor. Define the following qualitative
risk impact/risk factor metrics:
"1" Critical — a risk, threat, or vulnerability that impacts compliance (i.e., privacy law
requirement for securing privacy data and implementing proper security controls, etc.) and
places the organisation in a position of increased liability.
"2" Major — a risk, threat, or vulnerability that impacts the C-I-A of an organisation's
intellectual property assets and IT infrastructure.
"3"Minor — a risk, threat, or vulnerability that can impact user or employee productivity or
availability of the IT infrastructure.
3. What was your rationale in assigning "1" risk impact/ risk factor value of "Critical" for an
identified risk, threat, or vulnerability?
Assigning a "Critical" value of "1" to a risk, threat, or vulnerability is based on its potential for
severe consequences. This includes significant financial loss, reputational damage,
operational disruption, legal penalties, and impacts on data sensitivity and safety. It signifies
a high likelihood of occurrence and necessitates immediate and substantial resource
allocation for mitigation.
4. When you assembled all of the "1" and "2" and "3" risk impact/risk factor values to the
identified risks, threats, and vulnerabilities, how did you prioritise the "1", "2", and "3" risk
elements? What would you say to executive management in regards to your final
recommended prioritisation?
Our final recommended prioritisation focuses first on addressing the critical risks that could
cause the most significant harm to the organisation. Following this, we will tackle high and
medium risks in sequence, ensuring comprehensive risk management. This approach allows
us to allocate resources effectively and ensure the continued protection and resilience of our
IT infrastructure."
5. Identify a risk mitigation solution for each of the following risk factors:
User downloads and clicks on an unknown e-mail attachment —Set up user
access restrictions and make it such that downloads require authorization.
Need to prevent eavesdropping on WLAN due to customer privacy data access —Enhance
WLAN security using encryptions such as: WPAZ and AES
Weak ingress/egress traffic filtering degrades performance —- Strengthen firewall filtering