Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

1) 4. What is the first step in performing risk management? 2) What practice hel

ID: 3908113 • Letter: 1

Question

1) 4. What is the first step in performing risk management? 2) What practice helps address a risk? 3) What ongoing practice helps track risk in real time? 4) In the seven domains of a typical IT infrastructure, which domain is the most difficult to plan, identify, assess, treat, and monitor? 5) What risks, threats, and vulnerabilities did you identify and assess that require immediate risk mitigation given the criticality of the threat or vulnerability? 6) For risk monitoring, what techniques or tools can you implement within each of the seven domains of a typical IT infrastructure to help mitigate risk? 7) For risk mitigation, what processes and procedures can help streamline and implement risk- mitigation solutions to the production IT infrastructure?

Explanation / Answer

(1) What is the first step in performing risk management

Ans:The first step in performing risk management to identify the risk. In it uncover, recognize and describe risks that might affect project or its outcomes. There are a number of techniques can use to find project risks. During this step start to prepare Project Risk Register.

(2)What practice helps address a risk?

ANS:Risk Management.

(3)What ongoing practice helps track risk in real time?

Ans: Monitoring

(4)In the seven domains of a typical IT infrastructure, which domain is the most difficult to plan, identify, assess, treat, and monitor?

Ans: LAN-WAN

(5)What risks, threats, and vulnerabilities did you identify and assess that require immediate risk mitigation given the criticality of the threat or vulnerability?

ANS:Unauthorized access from public Internet

User destroys data in application and deletes all files

Hacker penetrates your IT infrastructure and gains access to your internal network

(6)For risk monitoring, what techniques or tools can you implement within each of the seven domains of a typical IT infrastructure to help mitigate risk?

ANS:     IDS/IPS Program

             Firewalls

             Antivirus

            User Authentication

            Data Backups

(7)For risk mitigation, what processes and procedures are needed to help streamline and implement risk mitigation solutions to the production IT infrastructure?

ANS:Setting up Procedures and Schedules which should help streamline the process and provide the team with a timeline or milestones to ensure timely completion. This can be done using milestones or gannett charts.