Lab9-IAP301-HE172600-IA1802
Lab9-IAP301-HE172600-IA1802
Part A – Risks, Threats, & Vulnerabilities in the Seven Domains of a typical IT Infrastructure
Sets the rules and guidelines for the principles used by an organization to obtain long term
goals. To provide general guidelines that individual policies will define explicitly.
2. When should you use a policy definition as a means of risk mitigation and element of a
layered security strategy?
You should use a policy definition as a means of risk mitigation and element of a layered
security strategy when you start a business or before you start a business in order to have
everything covered before a risk, threat or vulnerability happens.
3. In your gap analysis of the IT security framework definition provided, which policy definition
was missing for all access to various IT systems, applications, and data throughout the scenario?
4. Do you need policies for your telecommunication and Internet service providers?
Yes
5. Which policy definitions from the list provided in Lab #9 – Part B helps optimize performance
of an organization’s Internet connection?
7. Which policy definition helps achieve availability goals for data recovery when data is lost or
corrupted?
8. Which policy definitions reference a Data Classification Standard and use of cryptography for
confidentiality purposes?
9. Which policy definitions from the sample IT security policy framework definition mitigate risk
in the User Domain?
10. Which policy definition from the sample IT security policy framework definition mitigates
risk in the LAN-to-WAN Domain?