Lab2 - IAA202 - Nguyen Thu Ngan
Lab2 - IAA202 - Nguyen Thu Ngan
Overview
Think of the COBIT framework as a giant checklist for what an IT or Risk Management auditors would
do if they were going to audit how your organization approaches risk management for your IT
infrastructure. COBIT P09 defines 6 control objectives for assessing and managing IT risk within four
different focus areas.
The first lab task is to align your identified threats and vulnerabilities from Lab #1 – How to Identify
Threats and Vulnerabilities in Your IT Infrastructure.
a. High Nessus Risk Factor : Service provider has a major network outage
b. High Nessus Risk Factor : User destroys data in application and deletes all files
c. Medium Nessus Risk Factor : Communication circuit outages
2. For the above identified threats and vulnerabilities, which of the following COBIT P09 Risk
Management control objectives are affected?
Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011
www.jblearning.com All Rights Reserved.
-14-
Student Lab Manual
3. From the identified threats & vulnerabilities from Lab #1 – (List At Least 3 and No More than 5),
specify whether the threat or vulnerability impacts confidentiality – integrity – availability:
4. For each of the threats and vulnerabilities from Lab #1 (List at Least 3 and No More than 5) that you
have remediated, what must you assess as part of your overall COBIT P09 risk management approach
for your IT infrastructure?
Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011
www.jblearning.com All Rights Reserved.
-15-
Student Lab Manual
5. For each of the threats and vulnerabilities from Lab #1 – (List at Least 3 and No More than 5) assess
the risk impact or risk factor that it has on your organization in the following areas and explain how
this risk can be mitigated and managed:
o People – Employees relying on the network for tasks may face productivity losses.
Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011
www.jblearning.com All Rights Reserved.
-16-
Student Lab Manual
c. Threat or Vulnerability #3: User Destroys Data in Application and Deletes All Files
6. True or False – COBIT P09 Risk Management controls objectives focus on assessment and
management of IT risk.
7. Why is it important to address each identified threat or vulnerability from a C-I-A perspective?
8. When assessing the risk impact a threat or vulnerability has on your “information” assets, why must
you align this assessment with your Data Classification Standard? How can a Data Classification
Standard help you assess the risk impact on your “information” assets?
Aligning with the Data Classification Standard ensures proper prioritization of risks based
on the sensitivity and importance of data, aiding in targeted mitigation strategies
9. When assessing the risk impact a threat or vulnerability has on your “application” and
“infrastructure”, why must you align this assessment with both a server and application software
vulnerability assessment and remediation plan?
Aligning with a vulnerability assessment plan helps identify and address weaknesses,
ensuring applications and infrastructure remain secure.
Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011
www.jblearning.com All Rights Reserved.
-16-
Student Lab Manual
10. When assessing the risk impact a threat or vulnerability has on your “people”, we are concerned with
users and employees within the User Domain as well as the IT security practitioners who must
implement the risk mitigation steps identified. How can you communicate to your end-user
community that a security threat or vulnerability has been identified for a production system or
application? How can you prioritize risk remediation tasks?
11. What is the purpose of using the COBIT risk management framework and approach?
It ensures IT risks are systematically identified, assessed, and mitigated in alignment with
business objectives.
12. What is the difference between effectiveness versus efficiency when assessing risk and risk
management?
Effectiveness: Achieving desired security outcomes.
Efficiency: Doing so with minimal resources and cost.
13. Which three of the seven focus areas pertaining to IT risk management are primary focus areas of risk
assessment and risk management and directly relate to information systems security?
14. Why is it important to assess risk impact from four different perspectives as part of the COBIT P.09
Framework?
15. What is the name of the organization who defined the COBIT P.09 Risk Management Framework
Definition?
ISACA (Information Systems Audit and Control Association) defines the COBIT framework.
Copyright © 2013 Jones & Bartlett Learning, LLC, an Ascend Learning Company Current Version Date: 05/30/2011
www.jblearning.com All Rights Reserved.
-17-