Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Instructions: You are presented with a table of risks and threats associated with the seven domains of a typical IT infrastructure. Below the table are

image text in transcribed

image text in transcribed

image text in transcribed

Instructions: You are presented with a table of risks and threats associated with the seven domains of a typical IT infrastructure. Below the table are solutions or preventative actions to manage the risks and threats. Enter the letter of the correct solution or preventative action in the blank to the right of each risk or threat. Solution/ Preventative Action Risk/Threat 1. Security policy violation 2. Compromised confidentiality of data transmissions via WLAN 3. Unauthorized network probing and port scanning 4.P router, firewall, and network appliance operating system software vulnerability 5. Private data or confidential data compromised remotely 6. A mobile worker's laptop may be stolen 7. Infection of a user's workstation or laptop computer by viruses, malicious code, 8 Insecure cloud computing virtual environments by default 9. Downtime of IT systems for an extended period after a disaster 10. Attacks on the organization or acts of sabotage by disgruntled employees 11. Vulnerable to DoS, DDoS, TCP SYN flooding, and IP spoofing attacks 12. Employees and users want to use their own smartphone or tablets or malware Solutions or Preventative Actions A. Implement encryption between workstation and WAP to maintain confidentiality. B. Encrypt the data on the hard drive if the user has access to private or confidential data. Apply real- time lockout rules when told of a lost or stolen laptop by a user discuss status during performance reviews. WAN) interfaces. typically permit the organization to data-wipe the user's smartphone or mobile device if it is lost or C. Place employee on probation, review acceptable use policy (AUP) and employee manual, and D. Apply filters on exterior Internet Protocol (IP) stateful firewalls and IP router wide area network E. Develop a Bring Your Own Device (BYOD) policy and procedure. BYOD policies and procedures the employee is terminated F. Implement virtual firewalls and server segmentation on separate virtual LANs (VLANs). A virtual G. Define a strict zero-day vulnerability window definition. Update devices with security fixes and H. Disable ping, probing, and port scanning on all exterior IP devices within the LAN-to-WAN firewall is a software-based firewall used in virtual environments. software patches right away. Domain. Ping uses the Internet Control Message Protocol (ICMP) echo-request and echo-reply protocol. Disallow IP port numbers used for probing and scanning and monitor with IDS/IPS. Track and monitor abnormal employee behavior, erratic job performance, and use of IT infrastructure during off-hours. Begin IT access control lockout procedures based on AUP monitoring and compliance. I. J. Develop a disaster recovery plan (DRP) specific to the recovery of mission-critical applications and data to maintain operations K. Encrypt all confidential data within the database or hard drive. L. Use workstation antivirus and malicious code policies, standards, procedures, and guidelines. Enable an automated antivirus protection solution that scans and updates individual workstations with proper protection

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Readings In Database Systems

Authors: Michael Stonebraker

2nd Edition

0934613656, 9780934613651

More Books

Students also viewed these Databases questions

Question

2. Outline the functions of nonverbal communication

Answered: 1 week ago