Iaa 2
Iaa 2
Management Controls
a. User destroys data in application and deletes all files. ===> High:
c. User inserts CDs and USB hard drives with personal photos, music,
and videos on organization owned computers. ===> Low: the CDs and
USB may contain some malwares that can destroy the computers or
system
e. Fire destroys primary data center ===> Medium: Total loss of data
a. User destroys data in application and deletes all files. ==> availability
c. User inserts CDs and USB hard drives with personal photos, music,
integrity – availability
4. For each of the threats and vulnerabilities from Lab #1 (List at Least 3
and No More than 5) that you have remediated, what must you assess as
part of your overall COBIT P09 risk Management approach for your IT
infrastructure?
a. User destroys data in application and deletes all files. ==> Easy to
c. User inserts CDs and USB hard drives with personal photos, music,
and videos on organization owned computers. ===> It usually occurs
and and easy to control with filter and anti-virus, if they do not work, it
may significantly impact on the computer and system
and not easily to improve the infrastrure or software in the system but can
they do not work, it may significantly impact on the computer and system
e. Fire destroys primary data center ===> seldom to occur and easily to
back up and protect the data center for the disasters, but if it occurs, it
5. For each of the threats and vulnerabilities from Lab #1 – (List at Least
3 and No More than 5) assess the risk factor that it has on your
organization in the following areas and explain how this risk can be
mitigated and managed:
Information –Threat
Applications –Threat
Infrastructure –Threat
People – Vulnerability
Information – Threat
Applications – Vulnerability
Infrastructure – Vulnerability
People – Threat
c. Threat or Vulnerability #3: User inserts CDs and USB hard drives
with personal photos, music, and videos on organization owned
computers.
Information – Threat
Application – Threat
Infrastructure – Threat
People – Vulnerability
Information – Threat
Application – Threat
Infrastructure – Vulnerability
People – Vulnerability
=> Set password to change after 90 days, set screen lockout for 10
minutes, using secure encryption while transfering data
Information – Threat
Application – Threat
Infrastructure – Vulnerability
People – Vulnerability
TRUE
10. When assessing the risk impact a threat or vulnerability has on your
“People“, we are concerned with users and employees within the User
Domain as well as the IT security practitioners who must implement the
risk mitigation steps identified. How can you communicated to your end-
user community that a security threat or vulnerability has been identified
for a production system or application? How can you prioritize risk
remediation tasks?
Send e-mail, memos, setup a training class. The risk that can come to
users the quickest or highest threat must be prioritized first.
11. What is the purpose of using the COBIT risk management framework
and approach?
The more perspectives you have, the better view of all the risk that are
available.
15. What is the name of the organization who defined the COBIT P.09
Risk Management Framework definition?