You are on page 1of 5

Lab #2

Assessment Worksheet Align Risk, Threats, & Vulnerabilities


to COBIT P09 Risk Management Controls
Name: Nguyễn Huỳnh Minh Đan
Student ID: SE151495

1. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5,
High/Medium/Low Nessus Risk Factor Definitions for Vulnerabilities)

a. User downloads an unknown e–mail attachment - HIGH

b. Denial of service attack on organization e-mail Server - HIGH

c. Unauthorized access to organization owned - HIGH

d. Loss of production data - MEDIUM

e. Service provider has a major network outage – LOW

2. For the above identified threats and vulnerabilities, which of the following COBIT P09 Risk
Management control objectives are affected?

• PO9.1 IT Risk Management Framework – b,e

• PO9.2 Establishment of Risk Context – d

• PO9.3 Event Identification – b,d

• PO9.4 Risk Assessment – a

• PO9.5 Risk Response – NONE

• PO9.6 Maintenance and Monitoring of a Risk Action Plan – NONE

3. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5),
specify whether the threat or vulnerability impacts confidentiality – integrity – availability

denial of service attack of


organized email server:
integrity, availability
B loss of production data:
availability, Confidentiality
C Unauthorized access to
organization owned
Workstation :integrity
D User downloads an unknown
e-mail attachment :integrity
E Workstation browser has
software
vulnerability :confidentiality,
availability
denial of service attack of
organized email server:
integrity, availability
B loss of production data:
availability, Confidentiality
C Unauthorized access to
organization owned
Workstation :integrity
D User downloads an unknown
e-mail attachment :integrity
E Workstation browser has
software
vulnerability :confidentiality,
availability
a. Denial of Service attack of organized e-mail server – Integrity, Availability

b. User downloads an unknown e-mail attachment – Integrity

c. Unauthorized access to organization owned Workstation – Integrity

d. Loss of Production Data – Confidentiality, availability

e. Workstation browser has software vulnerability – Confidentiality, availability

4. For each of the threats and vulnerabilities from Lab #1 (List at Least 3 and No More than 5) that
you have remediated, what must you assess as part of your overall COBIT P09 risk management
approach for your IT infrastructure?

Loss of Production data -> Backup data, restore from previous point

Unauthorized Access to Organization Owned Workstation -> After 1-2 months of having to change
the password once, the password is not too short and not too easy to guess.

User downloads unknown e-mail attachments -> Must always have a lighter and a virus browser or
software installed like Avast, BKAV, etc., so that it can prevent malicious files from being saved to the
computer.

5. For each of the threats and vulnerabilities from Lab #1 – (List at Least 3 and No More than 5)
assess the risk impact or risk factor that it has on your organization in the following areas and
explain how this risk can be mitigated and managed:

a. Threat or Vulnerability #1: User downloads an unknown e-mail attachment


o Information – Vulnerability

o Applications – Vulnerability

o Infrastructure – Vulnerability

o People – Threat

b. Threat or Vulnerability #2: Denial of Service attack of organized e-mail server

o Information – Threat

o Applications – Threat

o Infrastructure – Threat

o People – None

c. Threat or Vulnerability #3: Loss of Production Data

o Information – Threat

o Applications – Threat

o Infrastructure – Threat

o People – Threat

6. True or False – COBIT P09 Risk Management controls objectives focus on assessment and
management of IT risk.

True

7. Why is it important to address each identified threat or vulnerability from a C-I-A perspective?

The CIA (Confidentiality - Integrity – Availability) forms the core foundation for developing security
policies and systems for organizations.

8. When assessing the risk impact a threat or vulnerability has on your “information” assets, why
must you align this assessment with your Data Classification Standard? How can a Data
Classification Standard help you assess the risk impact on your “information” assets?

We need to assess all risks, to sort and prioritize which risks have the greatest impact on a
company's or business's information assets.

9. When assessing the risk impact a threat or vulnerability has on your “application” and
“infrastructure”, why must you align this assessment with both a server and application software
vulnerability assessment and remediation plan?

Evaluate both the server and the application to easily control the security status of the business
because it is all interrelated and security holes abound in the application and server.

10. When assessing the risk impact a threat or vulnerability has on your “people”, we are
concerned with users and employees within the User Domain as well as the IT security
practitioners who must implement the risk mitigation steps identified. How can you communicate
to your end-user community that a security threat or vulnerability has been identified for a
production system or application? How can you prioritize risk remediation tasks?

Can make announcements on the software (requiring users to upgrade the software), giving advice
and security skills to users.

11. What is the purpose of using the COBIT risk management framework and approach?

COBIT (Control Objectives for Information and Related Technology) helps organisations meet
business challenges in regulatory compliance, risk management and aligning IT strategy with
organisational goals.

12. What is the difference between effectiveness versus efficiency when assessing risk and risk
management?

Risk assessment helps us to know which risks are prioritized, and management will help us detect
vulnerabilities and risks that appear in the system.

13. Which three of the seven focus areas pertaining to IT risk management are primary focus areas
of risk assessment and risk management and directly relate to information systems security?

Assess possible risks

14. Why is it important to assess risk impact from four different perspectives as part of the COBIT
P.09 Framework?

15. What is the name of the organization who defined the COBIT P.09 Risk Management
Framework Definition?

ISACA and IT Governance Institute

You might also like