Question
ITN 100 ASSIGNMENT 4 SECTION: 1 LAST NAME (capitals) : F NAME EAST VIRGINIA STATE BANK : Perform a risk assessment. Fill out the control
ITN 100 ASSIGNMENT 4 SECTION: 1
LAST NAME (capitals) :
F NAME
EAST VIRGINIA STATE BANK : Perform a risk assessment. Fill out the control table for East Virginia State Bank
| Fire | Flood | Power loss | Circuit failure | Virus | External intruder | Internal intruder |
(70) Client computers at branches |
|
|
|
|
|
|
|
(60) ATMs at branches |
|
|
|
|
|
|
|
(90) Servers at branches |
|
|
|
|
|
|
|
(80) Dedicated circuits to central facility |
|
|
|
|
|
|
|
INTENTIONAL LEFT BLANK | |||||||
(80) Dial-up circuits |
|
|
|
|
|
|
|
(60) Branches |
|
|
|
|
|
|
|
(60) Central computing facility |
|
|
|
|
|
|
|
(90) Software applications |
|
|
|
|
|
|
|
(100) Data files |
|
|
|
|
|
|
|
SMART-TOYS-SMART KIDS IS A TOY MANUFACTURING COMPANY.
They have been providing toys to more than 150 different Toy retail stores in the region. The company has 500 employees and 150 Toy retail stores ( the clients). And conduct B2B transactions between his employees and the Toy retail stores ( the clients). Perform a risk assessment for Smart-Toys-Smart Kids. Fill out the control table for the Company
| Fire | Flood | Power loss | Circuit failure | Virus | External intruder | Internal intruder |
(80) Client computers-sales |
|
|
|
|
|
|
|
(75) Client computers-warehouse |
|
|
|
|
|
|
|
(70) Client computers-other |
|
|
|
|
|
|
|
(90) Internal app server |
|
|
|
|
|
|
|
(90) E-mail server |
|
|
|
|
|
|
|
INTENTIONAL LEFT BLANK | |||||||
(90) Web server |
|
|
|
|
|
|
|
(80) T-1 circuit |
|
|
|
|
|
|
|
(80) Wireless circuits |
|
|
|
|
|
|
|
(60) Branches |
|
|
|
|
|
|
|
(60) Central computing facility |
|
|
|
|
|
|
|
(90) Software applications |
|
|
|
|
|
|
|
(100) Data files |
|
|
|
|
|
|
|
FOR BOTH CASES USE THE FOLLOWING CONTROL ITEMS
Disaster recovery plan
Halon fire system in server room; sprinklers in the rest of building
Not on or below ground level
UPS (uninterruptible power source )
Contract guarantees from interexchange carriers
Extra fiber backbone laid in different conduits
Virus checking software present and updated
Extensive user training about viruses and reminders in monthly newsletter
Strong password software
Extensive user training about password security and reminders in monthly newsletter
Application-layer firewall
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started