pdf-div-class-2qs3tf-truncatedtext-module-wrapper-fg1km9p-classtruncatedtext-module-lineclamped-85ulhh-style-max-lines5iaa202-lab-1-se151495-nguyen-huynh-minh-dan-p-div
pdf-div-class-2qs3tf-truncatedtext-module-wrapper-fg1km9p-classtruncatedtext-module-lineclamped-85ulhh-style-max-lines5iaa202-lab-1-se151495-nguyen-huynh-minh-dan-p-div
MSSV: SE151495
Lame: Lguyễn Huỳnh Minh Ðan
Part A – List of Risks, Threats, and Vulnerabilities Commonly Found in an IT
Infrastructure
Which one of the listed risks, threats, or vulnerabilities can violate HIPPA privacy requirements?
List one and justify your answer in one or two sentences.
Risk: Unauthorized access from public lnternet
2. How many threats and vulnerabilities did you find that impacted risk within each of the seven
domains of a typical IT infrastructure?
User Domain: 4
Workstation Domain: 2
LAN Domain: 3
LAN-to-WAN Domain: 4
WAN Domain: 3
Systems/Application Domain: 3
3. Which domain(s) had the greatest number of risks, threats, and vulnerabilities?
LAN-to-WAN Domain
4. What is the risk impact or risk factor (critical, major, minor) that you would qualitatively assign
to the risks, threats, and vulnerabilities you identified for the LAL-to-WAL Domain for the
- Minor:
+ Denial of service attack on organization e-mail Server
- Major:
VPN tunneling between remote computer and ingress/egress router
5. Of the three Systems/Application Domain risks, threats, and vulnerabilities identified, which
one requires a disaster recovery plan and business continuity plan to maintain continued
operations during a catastrophic outage?
Fire destroys primary data center:
User destroys data in application and deletes all files and Loss of production data cannot be as
severe as the fire that destroyed the main data center, having to recover both hardware
and software data.
7. Which domain requires stringent access controls and encryption for connectivity to corporate
resources from home?
Remote Access Domain
8. Which domain requires annual security awareness training and employee background checks
for sensitive positions to help mitigate risk from employee sabotage?
User Domain
- Workstation Domain
- Systems/Application Domain
10. Which domain requires AUPs to minimize unnecessary User initiated Internet traffic and can be
monitored and controlled by web content filters?
User Domain
12. If you implement a wireless LAL (WLAL) to support connectivity for laptops in the Workstation
Domain, which domain does WLAL fall within?
LAN Domain
13. A bank under Gramm-Leach-Bliley-Act (GLBA) for protecting customer privacy has just
implemented their online banking solution allowing customers to access their accounts and
perform transactions via their computer or PDA device. Online banking servers and their public
Internet hosting would fall within which domains of security responsibility?
The bank server will be in the System/Application domain, and their public lnternet
15. Explain how a layered security strategy throughout the 7-domains of a typical IT infrastructure
can help mitigate risk exposure for loss of privacy data or confidential data from the
Systems/Application Domain.
- Control user access, monitor and manage network traffic.
-should
Security
be control in LAN
taken when and LAN-to-WAN
securing domains,
this boundary great
because care
the and extreme
following care
risks may
exist in this domain: