Managing Risk in Information Systems
ISS3110 Lab One Worksheet and Assessment
[Type the author name]
Unauthorized access from public Internet User destroys data in application and deletes all files Hacker penetrates your IT infrastructure and gains access to your internal network Intra-office employee romance gone bad Fire destroys primary data center Communications circuit outages Workstation OS has a known software vulnerability Unauthorized access to organization owned workstations Loss of production data Denial of service attack on organization e-mail Server Remote communications from home office LAN server OS has a known software vulnerability User downloads an unknown e-mail attachment Workstation browser has software vulnerability Service provider has a major network outage Weak ingress/egress traffic filtering degrades performance User inserts CDs and USB hard drives with personal photos, music and videos on organization owned computers VPN tunneling between remote computer and ingress/egress router WLAN access points are needed for LAN connectivity within a warehouse Need to prevent rouge users from unauthorized WLAN access
Remote Access Domain
Systems/Application Domain LAN-to-WAN Domain User Domain Systems/Application Domain WAN Domain Workstation Domain Workstation Domain Systems/Application Domain LAN-to-WAN Domain Remote Access Domain LAN Domain User Domain Workstation Domain WAN Domain LAN-to-WAN Domain
User Domain LAN-to-WAN Domain LAN Domain LAN Domain
1. Unauthorized access to organization owned workstations. If anyone has access to the organizations machines they would be able to get a hold of client personal information. 2. User Domain: Three Workstation Domain: Three LAN Domain: Three LAN-to-WAN Domain: Four WAN Domain: Two Remote Access Domain: Two Systems/Application: Three 3. LAN-to-WAN Domain. 4. Critical. 5. Fire destroys primary data center. 6. LAN-to-WAN. 7. Remote Access Domain. 8. Systems/Application...