Identify Threats and Vulnerabilities in an IT Infrastructure

Read Summary
Summary

The purpose of the seven domains of a typical IT infrastructure is to organize roles, responsibilities, and accountabilities for risk management and mitigation. In this lab, students will identify common risks, threats, and vulnerabilities and map them to the affected domain. The learning objectives include recognizing risks, aligning them to domains, and prioritizing risks based on their impact. The evaluation criteria and rubrics assess the student’s ability to identify, align, and prioritize risks and vulnerabilities throughout the seven domains.

Table of Content

The purpose of the seven domains in a standard IT infrastructure is to categorize and manage risks, threats, and vulnerabilities. In this lab, your objective is to identify and organize known risks, threats, and vulnerabilities. Furthermore, you will connect these risks to the appropriate domain for risk management.

Upon completing this lab, you will be able to achieve the learning objectives.

  • Identify common risks, threats, and vulnerabilities found throughout the seven domains of a typical IT infrastructure
  • Align risks, threats, and vulnerabilities to one of the seven domains of a typical IT infrastructure
  • Given a scenario, prioritize risks, threats, and vulnerabilities based on their risk impact to the organization from a risk-assessment perspective
  • Prioritize the identified critical, major, and minor risks, threats, and software vulnerabilities found throughout the seven domains of a typical IT infrastructure.

Criteria for evaluation and rubrics for assessment are provided.

The students are required to perform Lab #1. The evaluation criteria and rubrics for this lab are outlined below:

  • Was the student able to identify common risks, threats, and vulnerabilities found throughout the seven domains of a typical IT infrastructure? – [25%]
  • Was the student able to align risks, threats, and vulnerabilities to one of the seven domains of a typical IT infrastructure? – [25%]
  • Was the student able to prioritize risks, threats, and vulnerabilities based on their risk impact to the organization from a risk-assessment perspective? – [25%]
  • Was the student able to prioritize the identified critical, major, and minor risks, threats, and software vulnerabilities found throughout the seven domains of a typical IT infrastructure? – [25%]

Cite this page

Identify Threats and Vulnerabilities in an IT Infrastructure. (2016, Oct 20). Retrieved from

https://graduateway.com/risk-and-text-document/

Remember! This essay was written by a student

You can get a custom paper by one of our expert writers

Order custom paper Without paying upfront