IA1803 Lab 1
IA1803 Lab 1
Class: IA1803
Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011
www.jblearning.com
All Rights Reserved.
-6-
Student Lab Manual
Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011
www.jblearning.com
All Rights Reserved.
-7-
Student Lab Manual
Class: IA1803
1. Healthcare organizations are under strict compliance to HIPPA privacy requirements which
require that an organization have proper security controls for handling personal healthcare
information (PHI) privacy data. This includes security controls for the IT infrastructure handling
PHI privacy data. Which one of the listed risks, threats, or vulnerabilities can violate HIPPA
privacy requirements? List one and justify your answer in one or two sentences.
- User inserts CDs and USB hard drives with personal photos, music, and videos on organization
owned computers.
2. How many threats and vulnerabilities did you find that impacted risk within each of the seven
domains of a typical IT infrastructure?
User Domain: 3
Workstation Domain: 3
LAN Domain: 3
LAN-to-WAN Domain: 4
WAN Domain: 2
Remote Access Domain: 2
Systems/Application Domain: 3
3. Which domain(s) had the greatest number of risks, threats, and vulnerabilities?
- LAN-to-WAN Domain
4. What is the risk impact or risk factor (critical, major, minor) that you would qualitatively assign to
the risks, threats, and vulnerabilities you identified for the LAN-to-WAN Domain for the
healthcare and HIPPA compliance scenario?
- Hacker penetrates IT infrastructure and gains access to your internal network: Critical, as it may
impact on all of Organization’s information systems.
- Unauthorized access from public Internet: Minor, as it can be denied or strict.
Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011
www.jblearning.com
All Rights Reserved.
-8-
Student Lab Manual
5. Of the three Systems/Application Domain risks, threats, and vulnerabilities identified, which one
requires a disaster recovery plan and business continuity plan to maintain continued operations
during a catastrophic outage?
- Fire destroys primary data center
7. Which domain requires stringent access controls and encryption for connectivity to
corporate resources from home?
- Remote Access Domain due to the risk of sniffing attack and the integrity while transfer
8. Which domain requires annual security awareness training and employee background checks
for sensitive positions to help mitigate risk from employee sabotage?
- User Domain: People is considered the weakest link in the security chain and are
chronically responsible for the failure of security systems
10. Which domain requires AUPs to minimize unnecessary User initiated Internet traffic and
can be monitored and controlled by web content filters
- System/application domain requires AUP to minimize unnecessary internet traffic
12. If you implement a wireless LAN (WLAN) to support connectivity for laptops in the Workstation
Domain, which domain does WLAN fall within?
- LAN Domain
13. A bank under Gramm-Leach-Bliley-Act (GLBA) for protecting customer privacy has just
implemented their online banking solution allowing customers to access their accounts and
perform transactions via their computer or personal digital assistant (PDA) device. Online
banking servers and their public Internet hosting would fall within which domains of security
responsibility?
- Online banking servers: System/Application Domain
- public Internet hosting: LAN-to-WAN Domain
Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011
www.jblearning.com
All Rights Reserved.
-9-
Student Lab Manual
14. True
15. Explain how a layered security strategy throughout the 7-domains of a typical IT infrastructure
can help mitigate risk exposure for loss of privacy data or confidential data from the
Systems/Application Domain.
- In short, the idea of a layered security is that any single defense may be flawed, and the
most certain way to find the flaws is to be compromised by an attack -- so a series of different
defenses should each be used to cover the gaps in the others' protective capabilities.
Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011
www.jblearning.com
All Rights Reserved.
-10-