Lab 9-Nhóm 5
Lab 9-Nhóm 5
Definition
Vulnerability Management &
Workstation browser has software vulnerability
Vulnerability Window Policy Definition
WAN Service Availability Policy
Service provider has a major network outage
Definition
Weak ingress/egress traffic filtering degrades Internet Ingress/Egress Traffic Policy
Performance Definition
User inserts CDs and USB hard drives with
vulnerability
Fire destroys primary data center System/Application Domain
Denial of service attack on organization e- LAN-to-WAN Domain
mail Server
Loss of production data System/Application Domain
Intra-office employee romance gone bad User Domain
User destroys data in application and deletes System/Application Domain
all files
Remote communications from home office Remote Acces Domain
LAN server OS has a known software LAN-to-WAN Domain
vulnerability
User downloads an unknown e –mail User Domain
attachment
Workstation browser has software Workstation Domain
vulnerability
Service provider has a major network outage WAN Domain
Weak ingress/egress traffic filtering degrades LAN Domain
Performance
VPN tunneling between remote computer and LAN-to-WAN Domain
ingress/egress router
User inserts CDs and USB hard drives with User Domain
Workstation
WLAN access points are needed for LAN LAN Domain
policies?
Establishes the rules and standards for the concepts that an organization will employ to achieve
long-term goals. To offer general recommendations that will be explicitly defined in particular
policies.
2. When should you use a policy definition as a means of risk mitigation and element of a
To fix policy loopholes that allow a danger to exist with the potential to be exploited.
3. In your gap analysis of the IT security policy framework definition provided, which policy
definition was missing for all access to various IT systems, applications, and data
4. Do you need policies for your telecommunication and Internet service providers?
Yes. ISPs make it possible for their customers to surf the web, shop online, conduct
business, and connect with family and friends—all for a fee. ISPs may also provide other
services including email services, domain registration, web hosting, and browser packages.
provider, an Internet service provider (INSP), or any combination of these three based on
5. Which policy definitions from the list provided in Lab #9 – Part B helps optimize performance
infrastructure?
system. It evaluates if the system is susceptible to any known vulnerabilities, assigns severity
needed.
Managing an organisation’s assets to deliver the required level of service, the objective being to
7. Which policy definition helps achieve availability goals for data recovery when data is lost or
corrupted?
8. Which policy definitions reference a Data Classification Standard and use of cryptography for
confidentiality purposes?
9. Which policy definitions from the sample IT security policy framework definition mitigate risk
11. How does an IT security policy framework make it easier to monitor and enforce throughout
an organization?
It establishes standards that must be followed in order to function well in the organization.
12. Which policy definition requires an organization to list its mission critical business operations
and functions and the accompanying IT systems, applications, and databases that support it?
13. Why is it common to find a Business Continuity Plan (BCP) Policy Definition and a
It is common because the CSIRT is a component of the BCP. The CSIRT enables the firm to
14. True or False. A Data Classification Standard will define whether or not you need to encrypt
True
15. True or False. Your upstream Internet Service Provider must be part of your Denial of
Service / Distributed Denial of Service risk mitigation strategy at the LAN-to-WAN Domain’s
Internet ingress/egress. This is best defined in a policy definition for Internet ingress/egress
availability.
False