Lab 2 IAA202
Lab 2 IAA202
Align Risk, Threats, & Vulnerabilities to COBIT P09 Risk Management Controls
1:
c. User inserts CDs and USB hard drives with personal photos, music, and videos on organization
2:
c. User inserts CDs and USB hard drives with personal photos, music, and videos on organization
3:
a. x x
b. x
c. x
d. x
e. x x
4:
5: For each of the threats and vulnerabilities from Lab #1 – (List at Least 3 and No More than 5)
assess the risk factor that it has on your organization in the following areas and explain how
Information –Threat
Applications –Threat
Infrastructure –Threat
People – None
Information – Threat
Application – Vulnerability
Infrastructure – Vulnerability
People – Threat
Information – Threat
Applications – Threat
Infrastructure – Threat
Information – Vulnerability
Application – Vulnerability
Infrastructure – Vulnerability
People – None
Information – Vulnerability
Application – Vulnerability
Infrastructure – Vulnerability
6:
True or False – COBIT P09 Risk Management controls objectives focus on assessment
TRUE
7:
Why is it important to address each identified threat or vulnerability from a C-I-A perspective?
Because CIA is a balanced perspective. When it’s too secure, people will not use it, when it’s not secure
8:
We have to align it because it helps you classify the importance of the information and use. It will
determine the level the risk factor is if it was comprom
We have to align it because it helps you classify the importance of the information and use. It will
9:
It is what any high level company works on. Anything less is unacceptable
10:
When assessing the risk impact a threat or vulnerability has on your “people”, we are concerned
with users and employees within the User Domain as well as the IT security practitioners who must
implement the risk mitigation steps identified. How can you communicate to your end-user
community that a security threat or vulnerability has been identified for a production system or
Send e-mail, memos, setup a training class. The risk that can come to users the quickest or highest threat
11:
What is the purpose of using the COBIT risk management framework and approach?
Comprehensive framework that assists enterprises in achieving their objectives for the governance and
management of enterprise information and technology assets (IT). Simply stated, it helps enterprises
create optimal value from IT by maintaining a balance between realizing benefits and optimizing risk
12:
efficiency is doing the instructions in lesser time and cost. They say
rightly done.
Result.
14:
Why is it important to assess risk impact from the four different perspectives as part of the
The more perspective you have, the better the view of all the risk that are available.
15:
What is the name of the organization who defined the COBIT P.09 Risk Management
Framework definition?