Managing Risk in Information SystemsJones & Bartlett Publishers, 2010 |
Inhalt
Identify Threats and Vulnerabilities in an IT Infrastructure | 1 |
Align Risks Threats and Vulnerabilities to COBIT P09 Risk Management Controls | 11 |
Define the Scope and Structure for an IT Risk Management Plan | 19 |
Perform a Qualitative Risk Assessment for an IT Infrastructure | 27 |
Identify Risks Threats and Vulnerabilities in an IT Infrastructure Using Zenmap GUI Nmap and Nessus Reports | 35 |
Develop a RiskMitigation Plan Outline for an IT Infrastructure | 41 |
Perform a Business Impact Analysis for a Mock IT Infrastructure | 51 |
Develop an Outline for a Business Continuity Plan for an IT Infrastructure | 59 |
Develop Disaster Recovery Backup Procedures and Recovery Instructions | 67 |
Create a CIRT Response Plan for a Typical IT Infrastructure | 75 |
Andere Ausgaben - Alle anzeigen
Häufige Begriffe und Wortgruppen
Answers for Lab ASSESSMENT WORKSHEET backup and recovery business continuity plan business impact analysis CIRT response plan COBIT P09 risk completing this lab computer workstation continuity plan BCP Create a CIRT Criteria and Rubrics customer privacy Define the Scope Deliverables Upon completion Disaster Recovery Backup e-mail attachment encompasses the seven executive summary following deliverables Hands-On Steps help mitigate risk identified risks impact analysis BIA Instructor Name known software vulnerability Lab Assessment Questions Lab Due Date Mock IT Infrastructure Name and Number Nessus Objectives Upon completing Overview The purpose P09 risk management port scanning prioritize privacy data Procedures and Recovery qualitative risk assessment Questions & Answers Recovery Instructions recovery procedures recovery time objectives Risk Management Controls risk management plan rubrics for Lab Rubrics The following server seven domains student able students must perform Submit the text text document called threats and vulnerabilities typical IT infrastructure WLAN Zenmap GUI Nmap

