SlideShare a Scribd company logo
1 of 40
Assessment Worksheet
Aligning Risks, Threats, and Vulnerabilities to COBIT P09 Risk
Management Controls
Course Name and Number:
_____________________________________________________
Student Name:
_____________________________________________________
___________
Instructor Name:
_____________________________________________________
_________
Lab Due Date:
_____________________________________________________
___________
Overview
In this lab, you defined COBIT P09, you described COBIT
P09’s six control objectives, you
explained how the threats and vulnerabilities align to the
definition for the assessment and
management of risks, and you used COBIT P09 to determine the
scope of risk management for
an IT infrastructure.
Lab Assessment Questions & Answers
1. What is COBIT P09’s purpose?
2. Name three of COBIT’s six control objectives.
3. For each of the threats and vulnerabilities from the
Identifying Threats and Vulnerabilities in an
IT Infrastructure lab in this lab manual (list at least three and no
more than five) that you have
remediated, what must you assess as part of your overall COBIT
P09 risk management approach
for your IT infrastructure?
4. True or false: COBIT P09 risk management control objectives
focus on assessment and
management of IT risk.
17
Copyright © 2015 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
5. What is the name of the organization that defined the COBIT
P09 Risk Management Framework?
6. Describe three of the COBIT P09 control objectives.
7. Describe three of the COBIT P09.1 IT Risk Management
Framework control objectives.
Course Name and Number: Student Name: Instructor Name: Lab
Due Date: Text16: Text17: Text18: Text19: Text20: Text21:
Text22:
18
Introduction
Every company needs to take risks to thrive, but not too much
risk which could be catastrophic.
Finding the balanced amount of risk requires identifying what
opportunities (or threats) are
present, understanding how significant each of them is,
recognizing what action to take to
smartly handle both opportunities and risks, and lastly,
monitoring all of the above, including
discovering more prospects and threats. All told, this is called
risk management. Specific to the
seven domains of the IT infrastructure, this lab will cover IT
risk management.
In this lab, you will define the purpose of an IT risk
management plan, you will define the scope
for an IT risk management plan that encompasses the seven
domains of a typical IT
infrastructure, you will relate the risks, threats, and
vulnerabilities to the plan, and you will create
an IT risk management plan outline that incorporates the five
major parts of an IT risk
management process.
Learning Objectives
Upon completing this lab, you will be able to:
Define the purpose and objectives of an IT risk management
plan.
Define the scope and boundary for an IT risk management plan
to encompass the seven
domains of a typical IT infrastructure.
Relate identified risks, threats, and vulnerabilities to an IT risk
management plan and risk
areas.
Incorporate the five major parts of an IT risk management
process into a risk management
plan’s outline.
Craft an outline for an IT risk management plan, which includes
the seven domains of a
typical IT infrastructure and the five major parts of risk
management and risk areas.
Lab #3 Defining the Scope and Structure for an IT
Risk Management Plan
Copyright © by Jones & Bartlett Learning, LLC, an Ascend
Learning Company - All Rights Reserved.
19
Copyright © 2015 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
Deliverables
Upon completion of this lab, you are required to provide the
following deliverables to your
instructor:
1. Lab Report file;
2. Lab Assessments file.
Copyright © by Jones & Bartlett Learning, LLC, an Ascend
Learning Company - All Rights Reserved.
20 | LAB #3 Defining the Scope and Structure for an IT Risk
Management Plan
Hands-On Steps
This is a paper-based lab. To successfully complete the
deliverables for this lab, you will need access to Microsoft®
Word or another compatible word processor. For some labs, you
may also need access to a graphics line drawing
application, such as Visio or PowerPoint. Refer to the Preface
of this manual for information on creating the lab
deliverable files.
1. On your local computer, create the lab deliverable files.
2. Review the Lab Assessment Worksheet. You will find
answers to these questions as you
proceed through the lab steps.
3. On your local computer, open a new Internet browser
window.
4. Using your favorite search engine, search for information on
the IT risk management
process.
5. Briefly review at least five of the first page results.
6. In the address box of your Internet browser, type the URL
http://www.uvm.edu/~erm/RiskAssessmentGuide.pdf and press
Enter to open the Web site.
7. Review the PDF titled “Guide to Risk Assessment &
Response.”
Take special note of the University of Vermont’s “Guide to Risk
Assessment & Response” document and the
insightful sections titled “Things to Keep in Mind” and “Steps
to Follow” for each of the assessment steps.
8. In the address box of your Internet browser, type the URL
https://web.archive.org/web/20130418005540/http://www.educa
tion.nt.gov.au/__data/ass
ets/pdf_file/0011/4106/risk_management_process.pdf and press
Enter to open the Web
site.
9. Review the PowerPoint slide deck titled “The Risk
Management Process.”
10. In your Lab Report file, describe in what ways the risk
management process in both IT
and non-IT environments are similar. Briefly describe in your
own words the five major
steps of risk management: plan, identify, assess, respond, and
monitor.
11. In your Lab Report file, describe the plan.
12. Review the seven domains of a typical IT infrastructure (see
Figure 1).
Copyright © by Jones & Bartlett Learning, LLC, an Ascend
Learning Company - All Rights Reserved.
https://web.archive.org/web/20130418005540/http:/www.educat
ion.nt.gov.au/__data/assets/pdf_file/0011/4106/risk_managemen
t_process.pdf
https://web.archive.org/web/20130418005540/http:/www.educat
ion.nt.gov.au/__data/assets/pdf_file/0011/4106/risk_managemen
t_process.pdf
21
Copyright © 2015 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
Figure 1 Seven domains of a typical IT infrastructure
13. Using the following table of risks, threats, and
vulnerabilities that were found in a health
care IT infrastructure servicing patients with life-threatening
conditions, review the risks
in the following table. Consider how you might manage each
risk and which of the seven
domains each one affects:
Risks, Threats, and Vulnerabilities
Unauthorized access from public Internet
Hacker penetrates IT infrastructure
Communication circuit outages
Workstations
Workstation operating system (OS) has a known software
vulnerability
Denial of service attack on organization’s e-mail
Remote communications from home office
Workstation browser has software vulnerability
Weak ingress/egress traffic-filtering degrades performance
Wireless Local Area Network (WLAN) access points are needed
for Local Area Network (LAN)
connectivity within a warehouse
Need to prevent rogue users from unauthorized WLAN access
User destroys data in application, deletes all files, and gains
access to internal network
Fire destroys primary data center
Intraoffice employee romance gone bad
Loss of production data server
Unauthorized access to organization-owned workstations
LAN server OS has a known software vulnerability
User downloads an unknown e-mail attachment
Service provider has a major network outage
Copyright © by Jones & Bartlett Learning, LLC, an Ascend
Learning Company - All Rights Reserved.
22 | LAB #3 Defining the Scope and Structure for an IT Risk
Management Plan
User inserts CDs and USB hard drives with personal photos,
music, and videos on organization-
owned computers
Virtual Private Network (VPN) tunneling between the remote
computer and ingress/egress
router
14. In your Lab Report file, for each of the domains, create an
outline in the scope of your
risk management plan. Include the following topics—the five
major parts of an IT risk
management process—for each domain:
This completes the lab. Close the Web browser, if you have not
already done so.
Copyright © by Jones & Bartlett Learning, LLC, an Ascend
Learning Company - All Rights Reserved.
23
Copyright © 2015 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
Evaluation Criteria and Rubrics
The following are the evaluation criteria for this lab that
students must perform:
1. Define the purpose and objectives of an IT risk management
plan. – [20%]
2. Define the scope and boundary for an IT risk management
plan to encompass the seven
domains of a typical IT infrastructure. – [20%]
3. Relate identified risks, threats, and vulnerabilities to an IT
risk management plan and risk
areas. – [20%]
4. Incorporate the five major parts of an IT risk management
process into a risk
management plan’s outline. – [20%]
5. Craft an outline for an IT risk management plan, which
includes the seven domains of a
typical IT infrastructure and the five major parts of risk
management and risk areas. –
[20%]
Copyright © by Jones & Bartlett Learning, LLC, an Ascend
Learning Company - All Rights Reserved.
24 | LAB #3 Defining the Scope and Structure for an IT Risk
Management Plan
Lab #3 - Assessment Worksheet
Defining the Scope and Structure for an IT Risk Management
Plan
Course Name and Number:
_____________________________________________________
Student Name:
_____________________________________________________
___________
Instructor Name:
_____________________________________________________
_________
Lab Due Date:
_____________________________________________________
___________
Overview
In this lab, you defined the purpose of an IT risk management
plan, you defined the scope for an
IT risk management plan that encompasses the seven domains of
a typical IT infrastructure, you
related the risks, threats, and vulnerabilities to the plan, and
you created an IT risk management
plan outline that incorporates the five major parts of an IT risk
management process.
Lab Assessment Questions & Answers
1. What is the goal or objective of an IT risk management plan?
2. What are the five fundamental components of an IT risk
management plan?
3. Define what risk planning is.
4. What is the first step in performing risk management?
5. What is the exercise called when you are trying to gauge how
significant a risk is?
Copyright © by Jones & Bartlett Learning, LLC, an Ascend
Learning Company - All Rights Reserved.
25
Copyright © 2015 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
6. What practice helps address a risk?
7. What ongoing practice helps track risk in real time?
8. True or False: Once a company completes all risk
management steps (identification, assessment,
response, and monitoring), the task is done.
9. Given that an IT risk management plan can be large in scope,
why is it a good idea to develop a
risk management plan team?
10. In the seven domains of a typical IT infrastructure, which
domain is the most difficult to plan,
identify, assess, treat, and monitor?
11. Which compliance laws or standards does the health care
organization mentioned in the Hands-
On Steps have to comply with (consider these: Health Insurance
Portability and Accountability
Act [HIPAA], Gramm-Leach-Bliley Act [GLBA], and Family
Educational Rights and Privacy Act
[FERPA])? How does this impact the scope and boundary of its
IT risk management plan?
12. How did the risk identification and risk assessment of the
identified risks, threats, and
vulnerabilities contribute to your IT risk management plan
outline?
13. What risks, threats, and vulnerabilities did you identify and
assess that require immediate risk
mitigation given the criticality of the threat or vulnerability?
14. For risk monitoring, what are some techniques or tools you
can implement in each of the seven
domains of a typical IT infrastructure to help mitigate risk?
Copyright © by Jones & Bartlett Learning, LLC, an Ascend
Learning Company - All Rights Reserved.
26 | LAB #3 Defining the Scope and Structure for an IT Risk
Management Plan
15. For risk mitigation, what processes and procedures can help
streamline and implement risk-
mitigation solutions to the production IT infrastructure?
16. What is the purpose of a risk register?
17. How does risk response impact change control management
and vulnerability management?
Copyright © by Jones & Bartlett Learning, LLC, an Ascend
Learning Company - All Rights Reserved.
Assessment Worksheet
Defining the Scope and Structure for an IT Risk Management
Plan
Course Name and Number:
_____________________________________________________
Student Name:
_____________________________________________________
___________
Instructor Name:
_____________________________________________________
_________
Lab Due Date:
_____________________________________________________
___________
Overview
In this lab, you defined the purpose of an IT risk management
plan, you defined the scope for an
IT risk management plan that encompasses the seven domains of
a typical IT infrastructure, you
related the risks, threats, and vulnerabilities to the plan, and
you created an IT risk management
plan outline that incorporates the five major parts of an IT risk
management process.
Lab Assessment Questions & Answers
1. What is the goal or objective of an IT risk management plan?
2. What are the five fundamental components of an IT risk
management plan?
3. Define what risk planning is.
4. What is the first step in performing risk management?
5. What is the exercise called when you are trying to gauge how
significant a risk is?
25
Copyright © 2015 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
6. What practice helps address a risk?
7. What ongoing practice helps track risk in real time?
8. True or False: Once a company completes all risk
management steps (identification, assessment,
response, and monitoring), the task is done.
9. Given that an IT risk management plan can be large in scope,
why is it a good idea to develop a
risk management plan team?
10. In the seven domains of a typical IT infrastructure, which
domain is the most difficult to plan,
identify, assess, treat, and monitor?
11. Which compliance laws or standards does the health care
organization mentioned in the Hands-
On Steps have to comply with (consider these: Health Insurance
Portability and Accountability
Act [HIPAA], Gramm-Leach-Bliley Act [GLBA], and Family
Educational Rights and Privacy Act
[FERPA])? How does this impact the scope and boundary of its
IT risk management plan?
12. How did the risk identification and risk assessment of the
identified risks, threats, and
vulnerabilities contribute to your IT risk management plan
outline?
13. What risks, threats, and vulnerabilities did you identify and
assess that require immediate risk
mitigation given the criticality of the threat or vulnerability?
14. For risk monitoring, what are some techniques or tools you
can implement in each of the seven
domains of a typical IT infrastructure to help mitigate risk?
15. For risk mitigation, what processes and procedures can help
streamline and implement risk-
mitigation solutions to the production IT infrastructure?
16. What is the purpose of a risk register?
17. How does risk response impact change control management
and vulnerability management?
Course Name and Number: Student Name: Instructor Name: Lab
Due Date: Text23: Text24: Text25: Text26: Text27: Text28:
Text29: Text30: Text31: Text32: Text33: Text34: Text35:
Text36: Text37: Text38: Text39:
10
Introduction
Ask any IT manager about the challenges in conveying IT risks
in terms of business risks, or
about translating business goals into IT goals. It’s a common
difficulty, as the worlds of business
and IT do not inherently align. This lack of alignment was
unresolved until ISACA developed a
framework called COBIT, first released in 1996. ISACA is an
IT professionals’ association
centered on auditing and IT governance. This lab will focus on
the COBIT framework. The lab
uses the latest two versions: COBIT 4.1, which is currently the
most implemented version, and
COBIT 5, which is the latest version released in June 2012.
Because COBIT 4.1 is freely available at the time of this
writing, the lab uses this version to
present handling of risk management. Presentation is done
making use of a set of COBIT control
objectives called P09. COBIT P09’s purpose is to guide the
scope of risk management for an IT
infrastructure. The COBIT P09 risk management controls help
organize the identified risks,
threats, and vulnerabilities, enabling you to manage and
remediate them. This lab will also
present how COBIT shifts from the term “control objectives” to
a set of principles and enablers
in version 5.
In this lab, you will define COBIT P09, you will describe
COBIT P09’s six control objectives,
you will explain how the threats and vulnerabilities align to the
definition for the assessment and
management of risks, and you will use COBIT P09 to determine
the scope of risk management
for an IT infrastructure.
Learning Objectives
Upon completing this lab, you will be able to:
• Define what COBIT (Control Objectives for Information and
related Technology) P09
risk management is for an IT infrastructure.
• Describe COBIT P09’s six control objectives that are used as
benchmarks for IT risk
assessment and risk management.
• Explain how threats and vulnerabilities align to the COBIT
P09 risk management
definition for the assessment and management of IT risks.
• Use the COBIT P09 controls as a guide to define the scope of
risk management for an IT
infrastructure.
• Apply the COBIT P09 controls to help organize the identified
IT risks, threats, and
vulnerabilities.
Lab #2 Aligning Risks, Threats, and Vulnerabilities to
COBIT P09 Risk Management Controls
© Jones & Bartlett Learning, LLC. NOT FOR SALE OR
DISTRIBUTION.
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
11
Copyright © 2015 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
Deliverables
Upon completion of this lab, you are required to provide the
following deliverables to your
instructor:
1. Lab Report file;
2. Lab Assessments file.
© Jones & Bartlett Learning, LLC. NOT FOR SALE OR
DISTRIBUTION.
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
12 | LAB #2 Aligning Risks, Threats, and Vulnerabilities to
COBIT P09 Risk
Management Controls
Hands-On Steps
This is a paper-based lab. To successfully complete the
deliverables for this lab, you will need access to Microsoft®
Word or another compatible word processor. For some labs, you
may also need access to a graphics line drawing
application, such as Visio or PowerPoint. Refer to the Preface
of this manual for information on creating the lab
deliverable files.
1. On your local computer, create the lab deliverable files.
2. Review the Lab Assessment Worksheet. You will find
answers to these questions as you
proceed through the lab steps.
3. Review the seven domains of a typical IT infrastructure (see
Figure 1).
Figure 1 Seven domains of a typical IT infrastructure
4. On your local computer, open a new Internet browser
window.
5. In the address box of your Internet browser, type the URL
http://www.isaca.org/Knowledge-Center/cobit/Pages/FAQ.aspx
and press Enter to open the
Web site.
6. Review the information on the COBIT FAQs page.
© Jones & Bartlett Learning, LLC. NOT FOR SALE OR
DISTRIBUTION.
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
13
Copyright © 2015 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
ISACA—45 Years Serving Auditors and Business
ISACA is a global organization that defines the roles of
information systems governance, security, auditing, and
assurance professionals worldwide. ISACA standardizes a level
of understanding of these areas through two well-
known certifications, the Certified Information Systems Auditor
(CISA) and Certified Information Security Manager
(CISM). In recent years, ISACA has expanded its certification
offerings to include two other certifications around risk
and IT governance.
ISACA was previously an acronym expanding to Information
Systems Audit and Control Association, but today is
known by the name ISACA alone to better serve its wider
audience.
Similarly, COBIT was originally an acronym for Control
Objectives for Information and related Technology. Now,
ISACA refers to the framework as just COBIT, in part because
the concept of “control objectives” ends with COBIT
version 4.1. COBIT 5 focuses on business-centric concepts and
definitions, distinguishes between governance and
management, and includes a product family of “enabler guides”
and “practice guides.” The recent release of COBIT
version 5 is a complete break from COBIT 4. In addition,
COBIT 5 also incorporates other ISACA products, including
Val IT and Risk IT.
7. In your Lab Report file, describe the primary goal of the
COBIT v4.1 Framework. Define
COBIT.
8. On the left side of the COBIT Web site, click the COBIT 4.1
Controls Collaboration link.
9. At the top of the page, read about the COBIT Controls area
within ISACA’s Knowledge
Center.
10. In your Lab Report file, describe the major objective of the
Controls area.
11. Scroll down the Web page to the COBIT Domains and
Control Objectives section.
12. Click the Text View tab.
13. In your Lab Report file, list each of the types of control
objectives and briefly describe
them based on the descriptions on the Web site. Include the
following:
• Plan and Organize
• Acquire and Implement
• Monitor and Evaluate
• Delivery and Support
• Process Controls
• Application Controls
14. On the Web site, under the Plan and Organize Control
Objective description, click the
View all the PO Control Objectives link.
© Jones & Bartlett Learning, LLC. NOT FOR SALE OR
DISTRIBUTION.
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
14 | LAB #2 Aligning Risks, Threats, and Vulnerabilities to
COBIT P09 Risk
Management Controls
15. Scroll down and find the P09 Control Objectives, which are
labeled Assess and Manage
IT Risks.
COBIT 5 is not an evolutionary but a revolutionary change.
Naturally, risk management is covered, but it is done in a
holistic, end-to-end business approach, rather than in an IT-
centered approach.
16. Click the P09.1, IT Risk Management Framework link.
17. Scroll down to about the middle of the page to read about
the IT Risk Management
Framework.
18. Expand the View value and Risk Drivers and View Control
Practices links to learn more.
19. In your Lab Report file, describe what this objective covers.
20. Click the other P09 Control Objectives by first clicking the
back button to return to the
COBIT Domains and Control Objectives section of the COBIT
4.1 Controls
Collaboration page.
21. Click the Text View tab.
22. Click the View all the PO Control Objectives link.
23. Scroll down to the P09 Control Objectives.
24. Finally, click the P09.2, Establishment of Risk Context link.
25. Repeat this set of instructions for each of the other P09
listings.
26. Read about each of these.
27. In your Lab Report file, explain how you use the P09
Control Objectives to organize
identified IT risks, threats, and vulnerabilities so you can then
manage and remediate the
risks, threats, and vulnerabilities in a typical IT infrastructure.
This completes the lab. Close the Web browser, if you have not
already done so.
© Jones & Bartlett Learning, LLC. NOT FOR SALE OR
DISTRIBUTION.
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
15
Copyright © 2015 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
Evaluation Criteria and Rubrics
The following are the evaluation criteria for this lab that
students must perform:
1. Define what COBIT (Control Objectives for Information and
related Technology) P09
risk management is for an IT infrastructure. – [20%]
2. Describe COBIT P09’s six control objectives that are used as
benchmarks for IT risk
assessment and risk management. – [20%]
3. Explain how threats and vulnerabilities align to the COBIT
P09 risk management
definition for the assessment and management of IT risks. –
[20%]
4. Use the COBIT P09 controls as a guide to define the scope of
risk management for an IT
infrastructure. – [20%]
5. Apply the COBIT P09 controls to help organize the identified
IT risks, threats, and
vulnerabilities. – [20%]
© Jones & Bartlett Learning, LLC. NOT FOR SALE OR
DISTRIBUTION.
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION
© Jones & Bartlett Learning, LLC
NOT FOR SALE OR DISTRIBUTION

More Related Content

Similar to Assessment Worksheet Aligning Risks, Threats, and Vuln.docx

Managing Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docxManaging Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docxjessiehampson
 
CST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comCST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comchrysanthemu49
 
CST 630 RANK Achievement Education--cst630rank.com
CST 630 RANK Achievement Education--cst630rank.comCST 630 RANK Achievement Education--cst630rank.com
CST 630 RANK Achievement Education--cst630rank.comkopiko147
 
CIS 558 Focus Dreams/newtonhelp.com
CIS 558 Focus Dreams/newtonhelp.comCIS 558 Focus Dreams/newtonhelp.com
CIS 558 Focus Dreams/newtonhelp.combellflower91
 
CIS 558 Life of the Mind/newtonhelp.com   
CIS 558 Life of the Mind/newtonhelp.com   CIS 558 Life of the Mind/newtonhelp.com   
CIS 558 Life of the Mind/newtonhelp.com   bellflower9
 
CIS 558 Imagine Your Future/newtonhelp.com   
CIS 558 Imagine Your Future/newtonhelp.com   CIS 558 Imagine Your Future/newtonhelp.com   
CIS 558 Imagine Your Future/newtonhelp.com   bellflower51
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comMcdonaldRyan39
 
10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docx10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docxaulasnilda
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comrobertleses9
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comdonaldzs56
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.comjhonklinz11
 
Creating a Use Case
Creating a Use Case                                               Creating a Use Case
Creating a Use Case CruzIbarra161
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comrobertlesew96
 
CST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.comCST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.comclaric241
 
CST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.comCST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.comagathachristie266
 
CST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.comCST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.comVSNaipaul15
 
CST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.comCST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.comKeatonJennings104
 
CST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comCST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comagathachristie113
 

Similar to Assessment Worksheet Aligning Risks, Threats, and Vuln.docx (20)

Managing Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docxManaging Riskin InformationSystemsPowered by vLab Solu.docx
Managing Riskin InformationSystemsPowered by vLab Solu.docx
 
CST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comCST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.com
 
Sample report
Sample reportSample report
Sample report
 
CST 630 RANK Achievement Education--cst630rank.com
CST 630 RANK Achievement Education--cst630rank.comCST 630 RANK Achievement Education--cst630rank.com
CST 630 RANK Achievement Education--cst630rank.com
 
CIS 558 Focus Dreams/newtonhelp.com
CIS 558 Focus Dreams/newtonhelp.comCIS 558 Focus Dreams/newtonhelp.com
CIS 558 Focus Dreams/newtonhelp.com
 
CIS 558 Life of the Mind/newtonhelp.com   
CIS 558 Life of the Mind/newtonhelp.com   CIS 558 Life of the Mind/newtonhelp.com   
CIS 558 Life of the Mind/newtonhelp.com   
 
CIS 558 Imagine Your Future/newtonhelp.com   
CIS 558 Imagine Your Future/newtonhelp.com   CIS 558 Imagine Your Future/newtonhelp.com   
CIS 558 Imagine Your Future/newtonhelp.com   
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.com
 
10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docx10 Introduction Ask any IT manager about the chall.docx
10 Introduction Ask any IT manager about the chall.docx
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.com
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.com
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.com
 
Creating a Use Case
Creating a Use Case                                               Creating a Use Case
Creating a Use Case
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
 
CST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.comCST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.com
 
CST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.comCST 630 RANK Introduction Education--cst630rank.com
CST 630 RANK Introduction Education--cst630rank.com
 
CST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.comCST 630 RANK Educational Specialist--cst630rank.com
CST 630 RANK Educational Specialist--cst630rank.com
 
CST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.comCST 630 RANK Inspiring Innovation--cst630rank.com
CST 630 RANK Inspiring Innovation--cst630rank.com
 
CST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.comCST 630 RANK Become Exceptional--cst630rank.com
CST 630 RANK Become Exceptional--cst630rank.com
 
Syylabus
SyylabusSyylabus
Syylabus
 

More from davezstarr61655

you must read two articles which are from the field of Human Resou.docx
you must read two articles which are from the field of Human Resou.docxyou must read two articles which are from the field of Human Resou.docx
you must read two articles which are from the field of Human Resou.docxdavezstarr61655
 
You must produce a minimum of a 5 pages paper. You must use a minimu.docx
You must produce a minimum of a 5 pages paper. You must use a minimu.docxYou must produce a minimum of a 5 pages paper. You must use a minimu.docx
You must produce a minimum of a 5 pages paper. You must use a minimu.docxdavezstarr61655
 
You must provide a references for entire posting. Please use APA for.docx
You must provide a references for entire posting. Please use APA for.docxYou must provide a references for entire posting. Please use APA for.docx
You must provide a references for entire posting. Please use APA for.docxdavezstarr61655
 
you must present your findings to the IT supervisor before the s.docx
you must present your findings to the IT supervisor before the s.docxyou must present your findings to the IT supervisor before the s.docx
you must present your findings to the IT supervisor before the s.docxdavezstarr61655
 
You must produce a minimum of a 10 pages paper. You must use a m.docx
You must produce a minimum of a 10 pages paper. You must use a m.docxYou must produce a minimum of a 10 pages paper. You must use a m.docx
You must produce a minimum of a 10 pages paper. You must use a m.docxdavezstarr61655
 
You must produce a minimum of a 10 pages paper. You must use a minim.docx
You must produce a minimum of a 10 pages paper. You must use a minim.docxYou must produce a minimum of a 10 pages paper. You must use a minim.docx
You must produce a minimum of a 10 pages paper. You must use a minim.docxdavezstarr61655
 
You must include the resources you used if any.. THese papers are op.docx
You must include the resources you used if any.. THese papers are op.docxYou must include the resources you used if any.. THese papers are op.docx
You must include the resources you used if any.. THese papers are op.docxdavezstarr61655
 
You must include the Textbook definition and a picture f.docx
You must include the Textbook definition and a picture f.docxYou must include the Textbook definition and a picture f.docx
You must include the Textbook definition and a picture f.docxdavezstarr61655
 
You must include 6 references, two that must come peer-reviewed .docx
You must include 6 references, two that must come peer-reviewed .docxYou must include 6 references, two that must come peer-reviewed .docx
You must include 6 references, two that must come peer-reviewed .docxdavezstarr61655
 
You must have the Project Libre to create this! Develop a chart .docx
You must have the Project Libre to create this! Develop a chart .docxYou must have the Project Libre to create this! Develop a chart .docx
You must have the Project Libre to create this! Develop a chart .docxdavezstarr61655
 
You must have experience doing PhD proposal , so the topic of th.docx
You must have experience doing PhD proposal , so the topic of th.docxYou must have experience doing PhD proposal , so the topic of th.docx
You must have experience doing PhD proposal , so the topic of th.docxdavezstarr61655
 
You must have at least 3 sources. Sources should be cited within you.docx
You must have at least 3 sources. Sources should be cited within you.docxYou must have at least 3 sources. Sources should be cited within you.docx
You must have at least 3 sources. Sources should be cited within you.docxdavezstarr61655
 
You must have access to the book needed for the Case Study part. I w.docx
You must have access to the book needed for the Case Study part. I w.docxYou must have access to the book needed for the Case Study part. I w.docx
You must have access to the book needed for the Case Study part. I w.docxdavezstarr61655
 
You must give the Source(s) of your answers (textbook - WITH SPECIFI.docx
You must give the Source(s) of your answers (textbook - WITH SPECIFI.docxYou must give the Source(s) of your answers (textbook - WITH SPECIFI.docx
You must give the Source(s) of your answers (textbook - WITH SPECIFI.docxdavezstarr61655
 
You must create a court system for the newly created state of Puerto.docx
You must create a court system for the newly created state of Puerto.docxYou must create a court system for the newly created state of Puerto.docx
You must create a court system for the newly created state of Puerto.docxdavezstarr61655
 
You must conduct an informational interview as part of this course. .docx
You must conduct an informational interview as part of this course. .docxYou must conduct an informational interview as part of this course. .docx
You must conduct an informational interview as part of this course. .docxdavezstarr61655
 
You must complete an Electronic Presentation on Black Culture.docx
You must complete an Electronic Presentation on Black Culture.docxYou must complete an Electronic Presentation on Black Culture.docx
You must complete an Electronic Presentation on Black Culture.docxdavezstarr61655
 
You must complete an Electronic Presentation on Black Cu.docx
You must complete an Electronic Presentation on Black Cu.docxYou must complete an Electronic Presentation on Black Cu.docx
You must complete an Electronic Presentation on Black Cu.docxdavezstarr61655
 
You must choose from the approved list below1. Angels .docx
You must choose from the approved list below1. Angels .docxYou must choose from the approved list below1. Angels .docx
You must choose from the approved list below1. Angels .docxdavezstarr61655
 
You must be proficient in all MS office. I am looking for someon.docx
You must be proficient in all MS office. I am looking for someon.docxYou must be proficient in all MS office. I am looking for someon.docx
You must be proficient in all MS office. I am looking for someon.docxdavezstarr61655
 

More from davezstarr61655 (20)

you must read two articles which are from the field of Human Resou.docx
you must read two articles which are from the field of Human Resou.docxyou must read two articles which are from the field of Human Resou.docx
you must read two articles which are from the field of Human Resou.docx
 
You must produce a minimum of a 5 pages paper. You must use a minimu.docx
You must produce a minimum of a 5 pages paper. You must use a minimu.docxYou must produce a minimum of a 5 pages paper. You must use a minimu.docx
You must produce a minimum of a 5 pages paper. You must use a minimu.docx
 
You must provide a references for entire posting. Please use APA for.docx
You must provide a references for entire posting. Please use APA for.docxYou must provide a references for entire posting. Please use APA for.docx
You must provide a references for entire posting. Please use APA for.docx
 
you must present your findings to the IT supervisor before the s.docx
you must present your findings to the IT supervisor before the s.docxyou must present your findings to the IT supervisor before the s.docx
you must present your findings to the IT supervisor before the s.docx
 
You must produce a minimum of a 10 pages paper. You must use a m.docx
You must produce a minimum of a 10 pages paper. You must use a m.docxYou must produce a minimum of a 10 pages paper. You must use a m.docx
You must produce a minimum of a 10 pages paper. You must use a m.docx
 
You must produce a minimum of a 10 pages paper. You must use a minim.docx
You must produce a minimum of a 10 pages paper. You must use a minim.docxYou must produce a minimum of a 10 pages paper. You must use a minim.docx
You must produce a minimum of a 10 pages paper. You must use a minim.docx
 
You must include the resources you used if any.. THese papers are op.docx
You must include the resources you used if any.. THese papers are op.docxYou must include the resources you used if any.. THese papers are op.docx
You must include the resources you used if any.. THese papers are op.docx
 
You must include the Textbook definition and a picture f.docx
You must include the Textbook definition and a picture f.docxYou must include the Textbook definition and a picture f.docx
You must include the Textbook definition and a picture f.docx
 
You must include 6 references, two that must come peer-reviewed .docx
You must include 6 references, two that must come peer-reviewed .docxYou must include 6 references, two that must come peer-reviewed .docx
You must include 6 references, two that must come peer-reviewed .docx
 
You must have the Project Libre to create this! Develop a chart .docx
You must have the Project Libre to create this! Develop a chart .docxYou must have the Project Libre to create this! Develop a chart .docx
You must have the Project Libre to create this! Develop a chart .docx
 
You must have experience doing PhD proposal , so the topic of th.docx
You must have experience doing PhD proposal , so the topic of th.docxYou must have experience doing PhD proposal , so the topic of th.docx
You must have experience doing PhD proposal , so the topic of th.docx
 
You must have at least 3 sources. Sources should be cited within you.docx
You must have at least 3 sources. Sources should be cited within you.docxYou must have at least 3 sources. Sources should be cited within you.docx
You must have at least 3 sources. Sources should be cited within you.docx
 
You must have access to the book needed for the Case Study part. I w.docx
You must have access to the book needed for the Case Study part. I w.docxYou must have access to the book needed for the Case Study part. I w.docx
You must have access to the book needed for the Case Study part. I w.docx
 
You must give the Source(s) of your answers (textbook - WITH SPECIFI.docx
You must give the Source(s) of your answers (textbook - WITH SPECIFI.docxYou must give the Source(s) of your answers (textbook - WITH SPECIFI.docx
You must give the Source(s) of your answers (textbook - WITH SPECIFI.docx
 
You must create a court system for the newly created state of Puerto.docx
You must create a court system for the newly created state of Puerto.docxYou must create a court system for the newly created state of Puerto.docx
You must create a court system for the newly created state of Puerto.docx
 
You must conduct an informational interview as part of this course. .docx
You must conduct an informational interview as part of this course. .docxYou must conduct an informational interview as part of this course. .docx
You must conduct an informational interview as part of this course. .docx
 
You must complete an Electronic Presentation on Black Culture.docx
You must complete an Electronic Presentation on Black Culture.docxYou must complete an Electronic Presentation on Black Culture.docx
You must complete an Electronic Presentation on Black Culture.docx
 
You must complete an Electronic Presentation on Black Cu.docx
You must complete an Electronic Presentation on Black Cu.docxYou must complete an Electronic Presentation on Black Cu.docx
You must complete an Electronic Presentation on Black Cu.docx
 
You must choose from the approved list below1. Angels .docx
You must choose from the approved list below1. Angels .docxYou must choose from the approved list below1. Angels .docx
You must choose from the approved list below1. Angels .docx
 
You must be proficient in all MS office. I am looking for someon.docx
You must be proficient in all MS office. I am looking for someon.docxYou must be proficient in all MS office. I am looking for someon.docx
You must be proficient in all MS office. I am looking for someon.docx
 

Recently uploaded

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfchloefrazer622
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991RKavithamani
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 

Recently uploaded (20)

POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Arihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdfArihant handbook biology for class 11 .pdf
Arihant handbook biology for class 11 .pdf
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
Industrial Policy - 1948, 1956, 1973, 1977, 1980, 1991
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 

Assessment Worksheet Aligning Risks, Threats, and Vuln.docx

  • 1. Assessment Worksheet Aligning Risks, Threats, and Vulnerabilities to COBIT P09 Risk Management Controls Course Name and Number: _____________________________________________________ Student Name: _____________________________________________________ ___________ Instructor Name: _____________________________________________________ _________ Lab Due Date: _____________________________________________________ ___________ Overview In this lab, you defined COBIT P09, you described COBIT P09’s six control objectives, you explained how the threats and vulnerabilities align to the definition for the assessment and management of risks, and you used COBIT P09 to determine the scope of risk management for an IT infrastructure.
  • 2. Lab Assessment Questions & Answers 1. What is COBIT P09’s purpose? 2. Name three of COBIT’s six control objectives. 3. For each of the threats and vulnerabilities from the Identifying Threats and Vulnerabilities in an IT Infrastructure lab in this lab manual (list at least three and no more than five) that you have remediated, what must you assess as part of your overall COBIT P09 risk management approach for your IT infrastructure? 4. True or false: COBIT P09 risk management control objectives focus on assessment and management of IT risk. 17 Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual
  • 3. 5. What is the name of the organization that defined the COBIT P09 Risk Management Framework? 6. Describe three of the COBIT P09 control objectives. 7. Describe three of the COBIT P09.1 IT Risk Management Framework control objectives. Course Name and Number: Student Name: Instructor Name: Lab Due Date: Text16: Text17: Text18: Text19: Text20: Text21: Text22: 18 Introduction Every company needs to take risks to thrive, but not too much risk which could be catastrophic. Finding the balanced amount of risk requires identifying what opportunities (or threats) are present, understanding how significant each of them is, recognizing what action to take to
  • 4. smartly handle both opportunities and risks, and lastly, monitoring all of the above, including discovering more prospects and threats. All told, this is called risk management. Specific to the seven domains of the IT infrastructure, this lab will cover IT risk management. In this lab, you will define the purpose of an IT risk management plan, you will define the scope for an IT risk management plan that encompasses the seven domains of a typical IT infrastructure, you will relate the risks, threats, and vulnerabilities to the plan, and you will create an IT risk management plan outline that incorporates the five major parts of an IT risk management process. Learning Objectives Upon completing this lab, you will be able to: Define the purpose and objectives of an IT risk management plan. Define the scope and boundary for an IT risk management plan to encompass the seven domains of a typical IT infrastructure. Relate identified risks, threats, and vulnerabilities to an IT risk
  • 5. management plan and risk areas. Incorporate the five major parts of an IT risk management process into a risk management plan’s outline. Craft an outline for an IT risk management plan, which includes the seven domains of a typical IT infrastructure and the five major parts of risk management and risk areas. Lab #3 Defining the Scope and Structure for an IT Risk Management Plan Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved. 19 Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual Deliverables Upon completion of this lab, you are required to provide the
  • 6. following deliverables to your instructor: 1. Lab Report file; 2. Lab Assessments file. Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved. 20 | LAB #3 Defining the Scope and Structure for an IT Risk Management Plan Hands-On Steps This is a paper-based lab. To successfully complete the deliverables for this lab, you will need access to Microsoft® Word or another compatible word processor. For some labs, you may also need access to a graphics line drawing application, such as Visio or PowerPoint. Refer to the Preface of this manual for information on creating the lab deliverable files. 1. On your local computer, create the lab deliverable files. 2. Review the Lab Assessment Worksheet. You will find answers to these questions as you proceed through the lab steps. 3. On your local computer, open a new Internet browser
  • 7. window. 4. Using your favorite search engine, search for information on the IT risk management process. 5. Briefly review at least five of the first page results. 6. In the address box of your Internet browser, type the URL http://www.uvm.edu/~erm/RiskAssessmentGuide.pdf and press Enter to open the Web site. 7. Review the PDF titled “Guide to Risk Assessment & Response.” Take special note of the University of Vermont’s “Guide to Risk Assessment & Response” document and the insightful sections titled “Things to Keep in Mind” and “Steps to Follow” for each of the assessment steps. 8. In the address box of your Internet browser, type the URL https://web.archive.org/web/20130418005540/http://www.educa tion.nt.gov.au/__data/ass ets/pdf_file/0011/4106/risk_management_process.pdf and press Enter to open the Web site. 9. Review the PowerPoint slide deck titled “The Risk Management Process.” 10. In your Lab Report file, describe in what ways the risk management process in both IT and non-IT environments are similar. Briefly describe in your own words the five major
  • 8. steps of risk management: plan, identify, assess, respond, and monitor. 11. In your Lab Report file, describe the plan. 12. Review the seven domains of a typical IT infrastructure (see Figure 1). Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved. https://web.archive.org/web/20130418005540/http:/www.educat ion.nt.gov.au/__data/assets/pdf_file/0011/4106/risk_managemen t_process.pdf https://web.archive.org/web/20130418005540/http:/www.educat ion.nt.gov.au/__data/assets/pdf_file/0011/4106/risk_managemen t_process.pdf 21 Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual Figure 1 Seven domains of a typical IT infrastructure 13. Using the following table of risks, threats, and vulnerabilities that were found in a health care IT infrastructure servicing patients with life-threatening conditions, review the risks
  • 9. in the following table. Consider how you might manage each risk and which of the seven domains each one affects: Risks, Threats, and Vulnerabilities Unauthorized access from public Internet Hacker penetrates IT infrastructure Communication circuit outages Workstations Workstation operating system (OS) has a known software vulnerability Denial of service attack on organization’s e-mail Remote communications from home office Workstation browser has software vulnerability Weak ingress/egress traffic-filtering degrades performance Wireless Local Area Network (WLAN) access points are needed for Local Area Network (LAN) connectivity within a warehouse Need to prevent rogue users from unauthorized WLAN access User destroys data in application, deletes all files, and gains access to internal network Fire destroys primary data center Intraoffice employee romance gone bad
  • 10. Loss of production data server Unauthorized access to organization-owned workstations LAN server OS has a known software vulnerability User downloads an unknown e-mail attachment Service provider has a major network outage Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved. 22 | LAB #3 Defining the Scope and Structure for an IT Risk Management Plan User inserts CDs and USB hard drives with personal photos, music, and videos on organization- owned computers Virtual Private Network (VPN) tunneling between the remote computer and ingress/egress router 14. In your Lab Report file, for each of the domains, create an outline in the scope of your risk management plan. Include the following topics—the five major parts of an IT risk management process—for each domain:
  • 11. This completes the lab. Close the Web browser, if you have not already done so. Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved. 23 Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual Evaluation Criteria and Rubrics The following are the evaluation criteria for this lab that students must perform:
  • 12. 1. Define the purpose and objectives of an IT risk management plan. – [20%] 2. Define the scope and boundary for an IT risk management plan to encompass the seven domains of a typical IT infrastructure. – [20%] 3. Relate identified risks, threats, and vulnerabilities to an IT risk management plan and risk areas. – [20%] 4. Incorporate the five major parts of an IT risk management process into a risk management plan’s outline. – [20%] 5. Craft an outline for an IT risk management plan, which includes the seven domains of a typical IT infrastructure and the five major parts of risk management and risk areas. – [20%] Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved. 24 | LAB #3 Defining the Scope and Structure for an IT Risk Management Plan Lab #3 - Assessment Worksheet Defining the Scope and Structure for an IT Risk Management Plan
  • 13. Course Name and Number: _____________________________________________________ Student Name: _____________________________________________________ ___________ Instructor Name: _____________________________________________________ _________ Lab Due Date: _____________________________________________________ ___________ Overview In this lab, you defined the purpose of an IT risk management plan, you defined the scope for an IT risk management plan that encompasses the seven domains of a typical IT infrastructure, you related the risks, threats, and vulnerabilities to the plan, and you created an IT risk management plan outline that incorporates the five major parts of an IT risk management process. Lab Assessment Questions & Answers 1. What is the goal or objective of an IT risk management plan?
  • 14. 2. What are the five fundamental components of an IT risk management plan? 3. Define what risk planning is. 4. What is the first step in performing risk management? 5. What is the exercise called when you are trying to gauge how significant a risk is? Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved. 25 Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual 6. What practice helps address a risk?
  • 15. 7. What ongoing practice helps track risk in real time? 8. True or False: Once a company completes all risk management steps (identification, assessment, response, and monitoring), the task is done. 9. Given that an IT risk management plan can be large in scope, why is it a good idea to develop a risk management plan team? 10. In the seven domains of a typical IT infrastructure, which domain is the most difficult to plan, identify, assess, treat, and monitor? 11. Which compliance laws or standards does the health care organization mentioned in the Hands- On Steps have to comply with (consider these: Health Insurance Portability and Accountability Act [HIPAA], Gramm-Leach-Bliley Act [GLBA], and Family Educational Rights and Privacy Act [FERPA])? How does this impact the scope and boundary of its IT risk management plan?
  • 16. 12. How did the risk identification and risk assessment of the identified risks, threats, and vulnerabilities contribute to your IT risk management plan outline? 13. What risks, threats, and vulnerabilities did you identify and assess that require immediate risk mitigation given the criticality of the threat or vulnerability? 14. For risk monitoring, what are some techniques or tools you can implement in each of the seven domains of a typical IT infrastructure to help mitigate risk? Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved. 26 | LAB #3 Defining the Scope and Structure for an IT Risk Management Plan 15. For risk mitigation, what processes and procedures can help streamline and implement risk- mitigation solutions to the production IT infrastructure? 16. What is the purpose of a risk register?
  • 17. 17. How does risk response impact change control management and vulnerability management? Copyright © by Jones & Bartlett Learning, LLC, an Ascend Learning Company - All Rights Reserved. Assessment Worksheet Defining the Scope and Structure for an IT Risk Management Plan Course Name and Number: _____________________________________________________ Student Name: _____________________________________________________ ___________ Instructor Name: _____________________________________________________ _________ Lab Due Date: _____________________________________________________
  • 18. ___________ Overview In this lab, you defined the purpose of an IT risk management plan, you defined the scope for an IT risk management plan that encompasses the seven domains of a typical IT infrastructure, you related the risks, threats, and vulnerabilities to the plan, and you created an IT risk management plan outline that incorporates the five major parts of an IT risk management process. Lab Assessment Questions & Answers 1. What is the goal or objective of an IT risk management plan? 2. What are the five fundamental components of an IT risk management plan? 3. Define what risk planning is. 4. What is the first step in performing risk management? 5. What is the exercise called when you are trying to gauge how significant a risk is?
  • 19. 25 Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual 6. What practice helps address a risk? 7. What ongoing practice helps track risk in real time? 8. True or False: Once a company completes all risk management steps (identification, assessment, response, and monitoring), the task is done. 9. Given that an IT risk management plan can be large in scope, why is it a good idea to develop a risk management plan team? 10. In the seven domains of a typical IT infrastructure, which domain is the most difficult to plan, identify, assess, treat, and monitor?
  • 20. 11. Which compliance laws or standards does the health care organization mentioned in the Hands- On Steps have to comply with (consider these: Health Insurance Portability and Accountability Act [HIPAA], Gramm-Leach-Bliley Act [GLBA], and Family Educational Rights and Privacy Act [FERPA])? How does this impact the scope and boundary of its IT risk management plan? 12. How did the risk identification and risk assessment of the identified risks, threats, and vulnerabilities contribute to your IT risk management plan outline? 13. What risks, threats, and vulnerabilities did you identify and assess that require immediate risk mitigation given the criticality of the threat or vulnerability? 14. For risk monitoring, what are some techniques or tools you can implement in each of the seven domains of a typical IT infrastructure to help mitigate risk? 15. For risk mitigation, what processes and procedures can help streamline and implement risk- mitigation solutions to the production IT infrastructure?
  • 21. 16. What is the purpose of a risk register? 17. How does risk response impact change control management and vulnerability management? Course Name and Number: Student Name: Instructor Name: Lab Due Date: Text23: Text24: Text25: Text26: Text27: Text28: Text29: Text30: Text31: Text32: Text33: Text34: Text35: Text36: Text37: Text38: Text39: 10 Introduction Ask any IT manager about the challenges in conveying IT risks in terms of business risks, or about translating business goals into IT goals. It’s a common difficulty, as the worlds of business and IT do not inherently align. This lack of alignment was unresolved until ISACA developed a framework called COBIT, first released in 1996. ISACA is an IT professionals’ association centered on auditing and IT governance. This lab will focus on the COBIT framework. The lab uses the latest two versions: COBIT 4.1, which is currently the
  • 22. most implemented version, and COBIT 5, which is the latest version released in June 2012. Because COBIT 4.1 is freely available at the time of this writing, the lab uses this version to present handling of risk management. Presentation is done making use of a set of COBIT control objectives called P09. COBIT P09’s purpose is to guide the scope of risk management for an IT infrastructure. The COBIT P09 risk management controls help organize the identified risks, threats, and vulnerabilities, enabling you to manage and remediate them. This lab will also present how COBIT shifts from the term “control objectives” to a set of principles and enablers in version 5. In this lab, you will define COBIT P09, you will describe COBIT P09’s six control objectives, you will explain how the threats and vulnerabilities align to the definition for the assessment and management of risks, and you will use COBIT P09 to determine the scope of risk management for an IT infrastructure. Learning Objectives Upon completing this lab, you will be able to: • Define what COBIT (Control Objectives for Information and related Technology) P09 risk management is for an IT infrastructure. • Describe COBIT P09’s six control objectives that are used as benchmarks for IT risk assessment and risk management.
  • 23. • Explain how threats and vulnerabilities align to the COBIT P09 risk management definition for the assessment and management of IT risks. • Use the COBIT P09 controls as a guide to define the scope of risk management for an IT infrastructure. • Apply the COBIT P09 controls to help organize the identified IT risks, threats, and vulnerabilities. Lab #2 Aligning Risks, Threats, and Vulnerabilities to COBIT P09 Risk Management Controls © Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION. © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION
  • 24. © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION
  • 25. © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION 11 Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual Deliverables Upon completion of this lab, you are required to provide the following deliverables to your instructor: 1. Lab Report file; 2. Lab Assessments file. © Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION. © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION
  • 26. © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION
  • 27. © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION 12 | LAB #2 Aligning Risks, Threats, and Vulnerabilities to COBIT P09 Risk Management Controls Hands-On Steps This is a paper-based lab. To successfully complete the deliverables for this lab, you will need access to Microsoft® Word or another compatible word processor. For some labs, you may also need access to a graphics line drawing application, such as Visio or PowerPoint. Refer to the Preface of this manual for information on creating the lab deliverable files. 1. On your local computer, create the lab deliverable files.
  • 28. 2. Review the Lab Assessment Worksheet. You will find answers to these questions as you proceed through the lab steps. 3. Review the seven domains of a typical IT infrastructure (see Figure 1). Figure 1 Seven domains of a typical IT infrastructure 4. On your local computer, open a new Internet browser window. 5. In the address box of your Internet browser, type the URL http://www.isaca.org/Knowledge-Center/cobit/Pages/FAQ.aspx and press Enter to open the Web site. 6. Review the information on the COBIT FAQs page. © Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION. © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION
  • 29. © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION
  • 30. © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION 13 Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual ISACA—45 Years Serving Auditors and Business ISACA is a global organization that defines the roles of information systems governance, security, auditing, and assurance professionals worldwide. ISACA standardizes a level of understanding of these areas through two well- known certifications, the Certified Information Systems Auditor (CISA) and Certified Information Security Manager (CISM). In recent years, ISACA has expanded its certification offerings to include two other certifications around risk and IT governance. ISACA was previously an acronym expanding to Information Systems Audit and Control Association, but today is
  • 31. known by the name ISACA alone to better serve its wider audience. Similarly, COBIT was originally an acronym for Control Objectives for Information and related Technology. Now, ISACA refers to the framework as just COBIT, in part because the concept of “control objectives” ends with COBIT version 4.1. COBIT 5 focuses on business-centric concepts and definitions, distinguishes between governance and management, and includes a product family of “enabler guides” and “practice guides.” The recent release of COBIT version 5 is a complete break from COBIT 4. In addition, COBIT 5 also incorporates other ISACA products, including Val IT and Risk IT. 7. In your Lab Report file, describe the primary goal of the COBIT v4.1 Framework. Define COBIT. 8. On the left side of the COBIT Web site, click the COBIT 4.1 Controls Collaboration link. 9. At the top of the page, read about the COBIT Controls area within ISACA’s Knowledge Center. 10. In your Lab Report file, describe the major objective of the Controls area. 11. Scroll down the Web page to the COBIT Domains and Control Objectives section. 12. Click the Text View tab.
  • 32. 13. In your Lab Report file, list each of the types of control objectives and briefly describe them based on the descriptions on the Web site. Include the following: • Plan and Organize • Acquire and Implement • Monitor and Evaluate • Delivery and Support • Process Controls • Application Controls 14. On the Web site, under the Plan and Organize Control Objective description, click the View all the PO Control Objectives link. © Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION. © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION
  • 33. © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION
  • 34. © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION 14 | LAB #2 Aligning Risks, Threats, and Vulnerabilities to COBIT P09 Risk Management Controls 15. Scroll down and find the P09 Control Objectives, which are labeled Assess and Manage IT Risks. COBIT 5 is not an evolutionary but a revolutionary change. Naturally, risk management is covered, but it is done in a holistic, end-to-end business approach, rather than in an IT- centered approach. 16. Click the P09.1, IT Risk Management Framework link. 17. Scroll down to about the middle of the page to read about the IT Risk Management Framework. 18. Expand the View value and Risk Drivers and View Control Practices links to learn more. 19. In your Lab Report file, describe what this objective covers.
  • 35. 20. Click the other P09 Control Objectives by first clicking the back button to return to the COBIT Domains and Control Objectives section of the COBIT 4.1 Controls Collaboration page. 21. Click the Text View tab. 22. Click the View all the PO Control Objectives link. 23. Scroll down to the P09 Control Objectives. 24. Finally, click the P09.2, Establishment of Risk Context link. 25. Repeat this set of instructions for each of the other P09 listings. 26. Read about each of these. 27. In your Lab Report file, explain how you use the P09 Control Objectives to organize identified IT risks, threats, and vulnerabilities so you can then manage and remediate the risks, threats, and vulnerabilities in a typical IT infrastructure. This completes the lab. Close the Web browser, if you have not already done so. © Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION. © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION
  • 36. © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION
  • 37. © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION 15 Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual Evaluation Criteria and Rubrics The following are the evaluation criteria for this lab that students must perform:
  • 38. 1. Define what COBIT (Control Objectives for Information and related Technology) P09 risk management is for an IT infrastructure. – [20%] 2. Describe COBIT P09’s six control objectives that are used as benchmarks for IT risk assessment and risk management. – [20%] 3. Explain how threats and vulnerabilities align to the COBIT P09 risk management definition for the assessment and management of IT risks. – [20%] 4. Use the COBIT P09 controls as a guide to define the scope of risk management for an IT infrastructure. – [20%] 5. Apply the COBIT P09 controls to help organize the identified IT risks, threats, and vulnerabilities. – [20%] © Jones & Bartlett Learning, LLC. NOT FOR SALE OR DISTRIBUTION. © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION
  • 39. © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION
  • 40. © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION