Popular in Course
verified elite notetaker
Popular in Department
This 7 page Study Guide was uploaded by kimwood Notetaker on Monday November 9, 2015. The Study Guide belongs to a course at a university taught by a professor in Fall. Since its upload, it has received 187 views.
Reviews for ISSC363_Lab 1
Report this Material
What is Karma?
Karma is the currency of StudySoup.
You can buy or earn more Karma at anytime and redeem it for class notes, study guides, flashcards, and more!
Date Created: 11/09/15
LAB ASSIGNMENT 1 1 Lab Assignment 1 Brian Page American Military University LAB ASSIGNMENT 1 2 Introduction There are many threats that are categorized based on the seven domains of Information Technology infrastructure. It is much easier to look at the threat and see how it can be applied to the given domain that it affects. Information Technology is a big part of the lives of everyone, from smartphones to maintaining critical data; it is everywhere and not going away. User Domain Common risks to the User Domain are lack of awareness, apathy towards policies, security policy violations and using personal media that contains personal files on company computers. Many users download personal files such as photos, music, or videos, this can affect systems. Another type of threat that is contained in the User Domain is systems destruction, sabotage, or extortion. Workstation Domain Risks to the Workstation Domain come from a variety of sources and are accomplished a variety of ways. Unauthorized workstation access, access to systems, applications and data, operating system vulnerabilities, application software vulnerabilities, viruses, malicious code, and malware that is introduced to the system through user supplied media such as CDs, DVDs, or USB thumb drives. Downloading photos, music, or videos also presents a danger to the workstation domain. LAN Domain When dealing with the LAN Domain, it a bit more interesting. Unauthorized physical access, unauthorized access to systems, applications and data, server operating system vulnerabilities, server application software vulnerabilities, patch updates, WLAN rogue users, WLAN confidentiality of data, and server configuration all can expose the LAN Domain to threats and vulnerabilities. LAB ASSIGNMENT 1 3 LANtoWAN Domain Some of the risks that are associated with the LANtoWAN Domain are much different than that of the other domains. Unauthorized probing, access, router, firewall, and network appliance vulnerabilities, and users downloading data from unknown sources all pose significantly different threats to the LANtoWAN domain. WAN Domain Common risks in the WAN domain are open public and accessible data, traffic being transmitted in clear text instead or over a secure protocol. This makes the transmissions vulnerable to eavesdropping (Man in the Middle), and malicious attacks such as DoS and DDoS. Also the WAN Domain is vulnerable to corruption of information and data. Remote Access Domain Remote access to systems has many distinct vulnerabilities that are different from the other domains. For instance, a hacker can use a technique called “Brute Force” to acquire users account names and passwords. Multiple login retries and access control attacks are also quite frequent. Systems/Applications Domain Sometimes data that is stored on servers requires people to have more access than they should be allowed to have. People are always requesting different permissions that grant them a higher access level, even though they may not need it. Also, security required by cloud virtual environments is another threat that affects the Systems / Applications Domain. LAB ASSIGNMENT 1 4 Lab Questions Risk – Threat – Vulnerability Primary Domain Impacted Unauthorized access from public internet WAN User Destroys data in application and deleteWorkstation all files Hacker penetrates your IT infrastructure andLAN gains access to your internal network Intraoffice employee romance gone bad User Fire destroys primary data center System Application Communication circuit outages System Application Workstation OS has a known software Workstation vulnerability Unauthorized access to organization owned LAN workstations Loss of production data System Application Denial of Service attack on organization emaSystem Application server Remote communications from home office Remote Access LAN Server OS has known software LAN vulnerability User downloads an unknown email attachment LAN Workstation browser has software User vulnerability Service provider has a major network outage WAN Weak ingress/egress traffic filtering degradWAN performance User inserts CDs and USB hard drives with Workstation personal photos, music, and videos on organization owned computers VPN tunneling between remote computer and Remote Access ingress/egress router WLAN access points are needed for LAN LANtoWAN connectivity within warehouse Need to prevent rogue users from unauthorizeLAN WLAN access Assessment Questions LAB ASSIGNMENT 1 5 1. Healthcare organizations are under strict compliance to HIPPA privacy requirements which require that an organization have proper security controls for handling personal healthcare information (PHI) privacy data. This includes security controls for the IT infrastructure handling PHI privacy data. Which one of the listed risks, threats, or vulnerabilities can violate HIPPA privacy requirements? List one and justify your answer in one or two sentences. Workstation Domain, if an individual leaves their workstation unsecured, people just walking by or into their office or place or work could potentially access HIPPA data stored on the system. 2. How many threats and vulnerabilities did you find that impacted risk within each of the seven domains of a typical IT infrastructure? User Domain: 2 Workstation Domain: 3 LAN Domain: 5 LANtoWAN Domain: 1 WAN Domain: 3 Remote Access Domain: 2 Systems/Application Domain: 3 3. Which domain(s) had the greatest number of risks, threats, and vulnerabilities? LAN Domain and Systems Application Domain 4. What is the risk impact or risk factor (critical, major, minor) that you would qualitatively assign to the risks, threats, and vulnerabilities you identified for the LANto WAN Domain for the healthcare and HIPPA compliance scenario? Major, HIPPA investigates and fines companies that have IT security problems. It is not a work stoppage or cost associated. 5. Of the three Systems/Application Domain risks, threats, and vulnerabilities identified, which one requires a disaster recovery plan and business continuity plan to maintain continued operations during a catastrophic outage? Loss of production data 6. Which domain represents the greatest risk and uncertainty to an organization? User Domain LAB ASSIGNMENT 1 6 7. Which domain requires stringent access controls and encryption for connectivity to corporate resources from home? Remote Access Domain 8. Which domain requires annual security awareness training and employee background checks for sensitive positions to help mitigate risk from employee sabotage? User Domain 9. Which domains need software vulnerability assessments to mitigate risk from software vulnerabilities? Workstation Domain 10. Which domain requires AUPs to minimize unnecessary User initiated Internet traffic and can be monitored and controlled by web content filters? User Domain 11.In which domain do you implement web content filters? LANtoWAN Domain 12. If you implement a wireless LAN (WLAN) to support connectivity for laptops in the Workstation Domain, which domain does WLAN fall within? LAN Domain 13. A bank under GrammLeachBlileyAct (GLBA) for protecting customer privacy has just implemented their online banking solution allowing customers to access their accounts and perform transactions via their computer or PDA device. Online banking servers and their public Internet hosting would fall within which domains of security responsibility? LANtoWAN Domain 14. Customers that conduct online banking using their laptop or personal computer must use HTTPS:, the secure and encrypted version of HTTP: browser communications. LAB ASSIGNMENT 1 7 HTTPS://encrypts webpage data inputs and data through the public Internet and decrypts that webpage and data once displayed on your browser. True or False. TRUE 15. Explain how a layered security strategy throughout the 7domains of a typical IT infrastructure can help mitigate risk exposure for loss of privacy data or confidential data from the Systems/Application Domain. Each Layer adds another layer of security to assist in the protection of Information technology assets. Applications should work with your network based on how the other layers are configured.
Are you sure you want to buy this material for
You're already Subscribed!
Looks like you've already subscribed to StudySoup, you won't need to purchase another subscription to get this material. To access this material simply click 'View Full Document'