Lab 3-Nhóm 5
Lab 3-Nhóm 5
Definition
Business Continuity & Disaster
Communication circuit outages
Recovery Policy Definition
Vulnerability Management &
Workstation OS has a known software
Vulnerability Window Policy
vulnerability
Definition
Unauthorized access to organization owned
Access Control Policy Definition
Workstations
Production Data Back-up Policy
Loss of production data
Definition
Vulnerability Management &
Denial of service attack on organization e-
Vulnerability Window Policy
mail Server
Definition
Remote communications from home office Remote Access Policy Definition
1. Health care organizations must strictly comply with the Health Insurance Portability and
Accountability Act (HIPAA) Privacy and Security rules that require organizations to have
proper security controls for handling personal information referred to as "protected
health information," or PHI. This includes security controls for the IT infrastructure
handling PHI. Which of the listed risks, threats, or vulnerabilities can violate HIPAA
privacy and security requirements? List one and justify your answer in one or two
sentences.
2.
Unauthorized access to workstations maintained by the company. Entry to a "already
wired" workstation may provide a perpetrator direct access to confidential data, such as
HIPAA PHI privacy data. What will happen if this PHI privacy data was hacked and
leaked is the risk factor to remember here.
2. How many threats and vulnerabilities did you find that impacted risk in each of the
seven domains of a typical IT infrastructure?
3. Which domain(s) had the greatest number of risks, threats, and vulnerabilities?
LAN-to-WAN Domain
4. What is the risk impact or risk factor (critical, major, and minor) that you would
qualitatively assign to the risks, threats, and vulnerabilities you identified for the LAN-to-
WAN Domain for the health care and HIPAA compliance scenario?
A hacker gains access to your internal network after breaking into your IT infrastructure:
PHI can be jeopardized, which is critical. Assault on an organization's e-mail server that
results in a denial of service: VPN tunneling between the remote device and the
ingress/egress router is minor and can be mitigated: If electronic safe health information
(ePHI) is accessed remotely, this is a major issue.
Since human action is unreliable and affected by forces outside policy's control, the
User Domain poses the greatest danger and ambiguity.
7. Which domain requires stringent access controls and encryption for connectivity to
corporate resources from home?
The Remote Access Domain requires stringent access controls and encryption because
of risks inherent in connectivity from home.
User Domain
10. Which domain requires acceptable use policies (AUPs) to minimize unnecessary
user-initiated Internet traffic and can be monitored and controlled by Web content
filters?
User Domain
11. In which domain do you implement Web content filters?
LAN-to-WAN Domain
12. If you implement a Wireless LAN (WLAN) to support connectivity for laptops in the
Workstation Domain, which domain does WLAN fall within?
LAN Domain
13. Under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy. A
given bank has just implemented its online banking solution that allows customers to
access their accounts and perform transactions via their computers or personal digital
assistant (PDA) devices. Online banking servers and their public Internet hosting would
fall within which domains of security responsibility?
14. True or false: Customers who conduct online banking on their laptops or personal
computers must use Hypertext Transfer Protocol Secure (HTTPS), the secure and
encrypted version of Hypertext Transfer Protocol (HTTP) browser communications.
HTTPS encrypts Web page data inputs and data through the public Internet and
decrypts that Web page and data on the user's PC or device.
True
15. Explain how a layered security strategy throughout the seven domains of a typical IT
infrastructure can help mitigate risk exposure for loss of privacy data or confidential data
from the System/Application Domain.