Professional Documents
Culture Documents
Overview:
After completing your IT risk mitigation plan outline, answer the following Lab
#6 – Assessment Worksheet questions. These questions are specific to the IT risk
mitigation plan outline you crafted as part of Lab #6 – Develop a Risk Mitigation
Plan Outline for an IT Infrastructure.
The nature and magnitude of a threat, the vulnerabilities to that threat, and the
consequences that could result.
Disable internal CD drives and USB ports. Enable automatic antivirus scans for
insertedmedia drives, flies, and e-mail attachments. An antivirus scanning system
examines all new files on your computer’s hard drive for viruses. Set up antivirus.
Is therea budget for a migration plan and what are their priorities? If there are
other options, let them know and make sure the executive management approves.
12.Why is the Remote Access Domain the most risk prone of all within a
typical IT infrastructure?
The most obvious risk involved with remote access use is the unauthorized user.
Unfortunately, this risk is one that you will never be able to entirely avoid.
Regardless of the level of care you take in keeping password information a secret,
programs exist that can break into most secure networks. Anti-virus programs and
intrusion technologies are ways to avoid this problem. Another possible risk of
remote-access technology is the loss of files . This can happen for many different
reasons, whether its partial file transfers or transfer errors. Once again,
technologies exist to help minimize this risk, but it is generally a safe strategy to
keep. Some other problems that can be encountered with Remote Access Domain
are ; Data Interception and Eavesdropping; Device Loss ; Malware; Firewall
Problems.
It is a very critical situation because this could lead to hefty fines and can,
depending on the type of business, end in the closing the business.