Get help now

Identify Threats and Vulnerabilities in an IT Infrastructure

  • Pages 2
  • Words 253
  • Views 188
  • dovnload

    Download

    Cite

  • Pages 2
  • Words 253
  • Views 188
  • Academic anxiety?

    Get original paper in 3 hours and nail the task

    Get your paper price

    124 experts online

    The purpose of the seven domains of a typical IT infrastructure is to help organize the roles, responsibilities, and accountabilities for risk management and risk mitigation. In this lab, you will identify known risks, threats, and vulnerabilities, and then organize them. Finally, you will map these risks to the domain that was impacted from a risk management perspective.

    Learning Objectives. Upon completing this lab, you will be able to:

    • Identify common risks, threats, and vulnerabilities found throughout the seven domains of a typical IT infrastructure
    • Align risks, threats, and vulnerabilities to one of the seven domains of a typical IT infrastructure
    • Given a scenario, prioritize risks, threats, and vulnerabilities based on their risk impact to the organization from a risk-assessment perspective
    • Prioritize the identified critical, major, and minor risks, threats, and software vulnerabilities found throughout the seven domains of a typical IT infrastructure.

    Evaluation Criteria and Rubrics

    The following are the evaluation criteria and rubrics for Lab #1 that the students must perform:

    • Was the student able to identify common risks, threats, and vulnerabilities found throughout the seven domains of a typical IT infrastructure? – [25%]
    • Was the student able to align risks, threats, and vulnerabilities to one of the seven domains of a typical IT infrastructure? – [25%]
    • Was the student able to prioritize risks, threats, and vulnerabilities based on their risk impact to the organization from a risk-assessment perspective? – [25%]
    • Was the student able to prioritize the identified critical, major, and minor risks, threats, and software vulnerabilities found throughout the seven domains of a typical IT infrastructure? – [25%]

    This essay was written by a fellow student. You may use it as a guide or sample for writing your own paper, but remember to cite it correctly. Don’t submit it as your own as it will be considered plagiarism.

    Need a custom essay sample written specially to meet your requirements?

    Choose skilled expert on your subject and get original paper with free plagiarism report

    Order custom paper Without paying upfront

    Identify Threats and Vulnerabilities in an IT Infrastructure. (2016, Oct 20). Retrieved from https://graduateway.com/risk-and-text-document/

    Hi, my name is Amy 👋

    In case you can't find a relevant example, our professional writers are ready to help you write a unique paper. Just talk to our smart assistant Amy and she'll connect you with the best match.

    Get help with your paper
    We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy