Lab1 IAA202
Lab1 IAA202
2. How many threats and vulnerabilities did you find that impacted risk in each of the
seven domains of a typical IT infrastructure?
User Domain: 3
Workstation Domain: 3
LAN Domain: 3
LAN-to-WAN Domain: 4
WAN Domain: 2
Remote Access Domain: 2
System/Application Domain: 3
3. Which domain(s) had the greatest number of risks, threats, and vulnerabilities?
- Lan to Wan domain.
4. What is the risk impact or risk factor (critical, major, minor) that you would
qualitatively assign to the risks, threats, and vulnerabilities you identified for the LAN-
to-WAN Domain for the healthcare and HIPPA compliance scenario?
Hacker penetrates IT infrastructure and gains access to your internal network:
Critical, PHI can be compromised.
Denial of service attack on organization's e-mail server: Minor, can be mitigated.
Weak ingress/egress traffic filtering degrades performance: Minor, can be
mitigated.
VPN tunneling between the remote computer and ingress/egress router: Major, if
electronic protected health information (ePHI) is being accessed remotely.
7. Which domain requires stringent access controls and encryption for connectivity to
corporate resources from home?
- We need to strengthen access control and encrypt the remote access domain because
otherwise we can expose information such as revealing the location of individuals,
devices or even an entire company or organization.
8. Which domain requires annual security awareness training and employee background
checks for sensitive positions to help mitigate risk from employee sabotage?
- I’m sure those would be the user and workstation domain because if these domains are
not checked every year, the occurrence of problems that not only cause great damage to
the company can also affect the development of the whole team in terms of skills, income
to the company reputation is low and we can’t evaluate the employee sabotage.
9. Which domains need software vulnerability assessment to reduce the risk from
software vulnerabilities?
- Workstation domain (workstations, any smart device in the organization)
- LAN Domain (related to network equipment)
- System/application domains (web servers host Web sites and serve them to Web clients,
network storage areas (SANs), network attached storage (NAS), backup devices).
10. Which domain requires AUPs (Acceptable Use Policy) to minimize unnecessary User
initiated Internet traffic and can be monitored and controlled by web content filters?
User domain
12. If you implement a wireless LAN (WLAN) to support connectivity for laptops in the
Workstation Domain, which domain does WLAN fall within?
LAN domain
13. A bank under Gramm-Leach-Bliley-Act (GLBA) for protecting customer privacy has
just implemented their online banking solution allowing customers to access their
accounts and perform transactions via their computer or PDA device. Online banking
servers and their public Internet hosting would fall within which domains of security
responsibility?
-O
n li n e
bank i n g
s e r ve r s : System/Application Domain
- pub li c
ne
t
ho sti n g : LAN-to-WAN Domain
-O
n li n e
bank i n g
s e r ve r s : System/Application Domain
- pub li c
ne
t
ho sti n g : LAN-to-WAN Domain
-O
n li n e
bank i n g
s e r ve r s : System/Application Domain
- pub li c
ne
t
ho sti n g : LAN-to-WAN Domain
-O
n li n e
bank i n g
s e r ve r s : System/Application Domain
- pub li c
ne
t
ho sti n g : LAN-to-WAN Domain
ub li c
ne
t
ho sti n g : LAN-to-WAN Domain
Online banking server: System/ Application domain
Public internet hosting: LAN to WAN domain
14. Customers that conduct online banking using their laptop or personal computer must
use HTTPS, the secure and encrypted version of HTTP: browser communications.
HTTPS:// encrypts webpage data inputs and data through the public Internet and decrypts
that webpage and data once displayed on your browser. True or False.
- True
15. Explain how a layered security strategy throughout the 7-domains of a typical IT
infrastructure can help mitigate risk exposure for loss of privacy data or confidential data
from the Systems/Application Domain.
- Organizations can design a layered security solution by examining where privacy and
confidential data reside and are accessed. Implementing security controls in the User and
Workstation Domains grants appropriate access to systems and data. Additional measures
in the LAN and LAN-to-WAN Domains provide access controls to authorized users.
Keeping servers, operating systems, and software updated mitigates risks within the
System/Application Domain.