SlideShare a Scribd company logo
1 of 12
Assessment Worksheet
Aligning Risks, Threats, and Vulnerabilities to COBIT P09 Risk
Management Controls
Course Name and Number:
_____________________________________________________
Student Name:
_____________________________________________________
___________
Instructor Name:
_____________________________________________________
_________
Lab Due Date:
_____________________________________________________
___________
Overview
In this lab, you defined COBIT P09, you described COBIT
P09’s six control objectives, you
explained how the threats and vulnerabilities align to the
definition for the assessment and
management of risks, and you used COBIT P09 to determine the
scope of risk management for
an IT infrastructure.
Lab Assessment Questions & Answers
1. What is COBIT P09’s purpose?
2. Name three of COBIT’s six control objectives.
3. For each of the threats and vulnerabilities from the
Identifying Threats and Vulnerabilities in an
IT Infrastructure lab in this lab manual (list at least three and no
more than five) that you have
remediated, what must you assess as part of your overall COBIT
P09 risk management approach
for your IT infrastructure?
4. True or false: COBIT P09 risk management control objectives
focus on assessment and
management of IT risk.
17
Copyright © 2015 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
5. What is the name of the organization that defined the COBIT
P09 Risk Management Framework?
6. Describe three of the COBIT P09 control objectives.
7. Describe three of the COBIT P09.1 IT Risk Management
Framework control objectives.
Course Name and Number: Student Name: Instructor Name: Lab
Due Date: Text16: Text17: Text18: Text19: Text20: Text21:
Text22:
Econ Data Analysis Project 1
My Name
Course
Instructor
Date
Is the percentage of homeless people same across all states?
Data Source: http://www.nareb.com/site-
files/uploads/2018/09/NAREB_Shiba2018_Web.pdf
Percentage of homeless population per state
Percentage of total population New york Chicago Philadelphia
Detroit Houston Mephis Baltimore Los Angeles
Washington D.C Dallas 24 31 43 80 23 64
63 9 48 25
City
Percent
Did Residential Segregation Indexes for Blacks or African
Americans change between 1980 and 2000?
Source: https://www2.census.gov/programs-
surveys/demo/tables/housing-patterns/time-series/housing-
patterns-tables/tab5-1.xlsx
Descriptive Statistics for Residential Segregation Indexes for
Blacks or African Americans: 1980, 1990, 2000 for all
metropolitan areas
1980
1990
2000
0.72699999999999998 0.67800000000000005 0.64
Research question: Is there a relationship between age and
poverty?
Source: https://www2.census.gov/programs-
surveys/cps/tables/pov-30/2019/pov30_200_1.xls
Distribution of People below 200% Poverty Status
.Under 16 years .16 to 24 years ..16 to 17 years ..18 to
21 years ..22 to 24 years .25 to 54 years .55 years and
over 64398 37970 8886 16155 12929 126935
94543
Age
Total number
How does prevalence of Invasive Melanoma vary across races?
RaceNumberAll Races77,698White73,395White,
Hispanic1,591White, non-Hispanic71,801Black372American
Indian/Alaska Native190Asian/Pacific
Islander239Hispanic1,725Total227,011
Source: https://www.cdc.gov/cancer/uscs/about/data-briefs/no9-
melanoma-incidence-mortality-UnitedStates-2012-2016.htm
Did Two-Adult-Two-Child Poverty Thresholds increase from
2017 to 2018?
Source: https://www2.census.gov/programs-
surveys/demo/tables/p60/268/table3.xls
Two-Adult-Two-Child Poverty Thresholds: 2017 and 2018
2017 ..Owners with mortgages ..Owners without mortgages
..Renters 27085 23261 27005 2018 ..Owners
with mortgages ..Owners without mortgages ..Renters 28342
24173 28166
Status
Number
Data Analysis Project 1
For this project each student will learn and demonstrate
competency in researching economics; that is, creatively
designing a research question, locating pertinent and credible
data to support an answer, and presenting results in a
professional and articulate manner. The skill set practiced in
this project is highly valued in business and government
occupations. Follow these steps to complete the project:
1. Using the data covered in the Demography and Housing
slides, generate five research questions to study (e.g. “Have
home prices in the U.S. increased since 2010?”, “What is the
racial composition of U.S. males?”). You are to create two
research questions from Demography, two from Housing, and
one from either category. You are to use at least 3 different data
sources (e.g. census, CDC, NAR, etc.) in the overall project.
2. Excel File: For each research question create an Excel sheet
with your data set and one graph. You are to use each of the
following graphs once in the overall project:
· Bar chart(horizontal or vertical)
· Pie chart
· Histogram
· Frequency table,
· Scatterplot (lined or unlined).
3. PowerPoint Presentation: For each question, create a
PowerPoint slide containing one graph, up to three bullet points
(optional), and hyperlinks to your data source website (make
sure the links work and ). The PowerPoint should also contain
an introduction slide (e.g. name, project #, and class).
4. Submission: Upload the Excel and PowerPoint file into the
link provided in Blackboard by the due date (no e-mailed
copies).
5. Grading: Project grade is weighted 50/50 for
Excel/PowerPoint; however, both must be submitted to receive a
score. Excel graphs must be derived from the data input in
Excel. The PowerPoint is graded subjectively as a presentation
to your fellow classmates so cosmetics, spelling, character size,
color, creativity all matter.
6. Academic Integrity: Do not copy graphs from websites nor
replicate another student’s work.
7
Copyright © 2015 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
Assessment Worksheet
Identifying Threats and Vulnerabilities in an IT Infrastructure
Course Name and Number:
_____________________________________________________
Student Name:
_____________________________________________________
___________
Instructor Name:
_____________________________________________________
_________
Lab Due Date:
_____________________________________________________
___________
Overview
In this lab, you identified known risks, threats, and
vulnerabilities, and you organized them.
Finally, you mapped these risks to the domain that was
impacted from a risk management
perspective.
Lab Assessment Questions & Answers
1. Health care organizations must strictly comply with the
Health Insurance Portability and
Accountability Act (HIPAA) Privacy and Security rules that
require organizations to have proper
security controls for handling personal information referred to
as “protected health information,”
or PHI. This includes security controls for the IT infrastructure
handling PHI. Which of the listed
risks, threats, or vulnerabilities can violate HIPAA privacy and
security requirements? List one
and justify your answer in one or two sentences.
2. How many threats and vulnerabilities did you find that
impacted risk in each of the seven
domains of a typical IT infrastructure?
3. Which domain(s) had the greatest number of risks, threats,
and vulnerabilities?
4. What is the risk impact or risk factor (critical, major, and
minor) that you would qualitatively
assign to the risks, threats, and vulnerabilities you identified for
the LAN-to-WAN Domain for
the health care and HIPAA compliance scenario?
5. Of the three System/Application Domain risks, threats, and
vulnerabilities identified, which one
requires a disaster recovery plan and business continuity plan to
maintain continued operations
during a catastrophic outage?
6. Which domain represents the greatest risk and uncertainty to
an organization?
7. Which domain requires stringent access controls and
encryption for connectivity to corporate
resources from home?
8. Which domain requires annual security awareness training
and employee background checks for
sensitive positions to help mitigate risks from employee
sabotage?
9. Which domains need software vulnerability assessments to
mitigate risk from software
vulnerabilities?
10. Which domain requires acceptable use policies (AUPs) to
minimize unnecessary user-initiated
Internet traffic and can be monitored and controlled by Web
content filters?
11. In which domain do you implement Web content filters?
12. If you implement a Wireless LAN (WLAN) to support
connectivity for laptops in the
Workstation Domain, which domain does WLAN fall within?
13. Under the Gramm-Leach-Bliley-Act (GLBA), banks must
protect customer privacy. A given
bank has just implemented its online banking solution that
allows customers to access their
accounts and perform transactions via their computers or
personal digital assistant (PDA) devices.
Online banking servers and their public Internet hosting would
fall within which domains of
security responsibility?
9
Copyright © 2015 by Jones & Bartlett Learning, LLC, an
Ascend Learning Company. All rights reserved.
www.jblearning.com Student Lab Manual
14. True or false: Customers who conduct online banking on
their laptops or personal computers
must use Hypertext Transfer Protocol Secure (HTTPS), the
secure and encrypted version of
Hypertext Transfer Protocol (HTTP) browser communications.
HTTPS encrypts Web page data
inputs and data through the public Internet and decrypts that
Web page and data on the user’s PC
or device.
15. Explain how a layered security strategy throughout the
seven domains of a typical IT
infrastructure can help mitigate risk exposure for loss of privacy
data or confidential data from
the System/Application Domain.
Course Name and Number: Student Name: Instructor Name: Lab
Due Date: Text1: Text2: Text3: Text4: Text5: Text6: Text7:
Text8: Text9: Text10: Text11: Text12: Text13: Text14: Text15:
Assessment Worksheet Aligning Risks, Threats, and Vuln.docx

More Related Content

Similar to Assessment Worksheet Aligning Risks, Threats, and Vuln.docx

CSEC 610 Effective Communication/tutorialrank.com
 CSEC 610 Effective Communication/tutorialrank.com CSEC 610 Effective Communication/tutorialrank.com
CSEC 610 Effective Communication/tutorialrank.comjonhson198
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.comjonhson199
 
Csec 610 Enhance teaching / snaptutorial.com
Csec 610  Enhance teaching / snaptutorial.comCsec 610  Enhance teaching / snaptutorial.com
Csec 610 Enhance teaching / snaptutorial.comBaileyabv
 
Project Risk Management PlanPurposeThis project provides
Project Risk Management PlanPurposeThis project provides Project Risk Management PlanPurposeThis project provides
Project Risk Management PlanPurposeThis project provides davieec5f
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comjonhson198
 
First paragraph will Executive summary about our company 100 w.docx
First  paragraph will  Executive summary about our company 100 w.docxFirst  paragraph will  Executive summary about our company 100 w.docx
First paragraph will Executive summary about our company 100 w.docxernestc3
 
Cst 610 Enhance teaching / snaptutorial.com
Cst 610  Enhance teaching / snaptutorial.comCst 610  Enhance teaching / snaptutorial.com
Cst 610 Enhance teaching / snaptutorial.comBaileyabw
 
CST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comCST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comkopiko146
 
CST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comCST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comclaric240
 
Csec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comCsec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comrobertlesew5
 
CSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.comCSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.comdonaldzs7
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.comBaileyaby
 
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comMcdonaldRyan78
 
CST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.comCST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.comVSNaipaul15
 
CST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comCST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comagathachristie112
 
CST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comCST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comKeatonJennings104
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comchrysanthemu49
 
MATH233 Unit 3 This assignment features an exponential functio.docx
MATH233 Unit 3 This assignment features an exponential functio.docxMATH233 Unit 3 This assignment features an exponential functio.docx
MATH233 Unit 3 This assignment features an exponential functio.docxandreecapon
 
Child Labour Essay In English Very Simple - YouTube
Child Labour Essay In English Very Simple - YouTubeChild Labour Essay In English Very Simple - YouTube
Child Labour Essay In English Very Simple - YouTubeAaron Anyaakuu
 

Similar to Assessment Worksheet Aligning Risks, Threats, and Vuln.docx (20)

CSEC 610 Effective Communication/tutorialrank.com
 CSEC 610 Effective Communication/tutorialrank.com CSEC 610 Effective Communication/tutorialrank.com
CSEC 610 Effective Communication/tutorialrank.com
 
CYB 610 Effective Communication/tutorialrank.com
 CYB 610 Effective Communication/tutorialrank.com CYB 610 Effective Communication/tutorialrank.com
CYB 610 Effective Communication/tutorialrank.com
 
Csec 610 Enhance teaching / snaptutorial.com
Csec 610  Enhance teaching / snaptutorial.comCsec 610  Enhance teaching / snaptutorial.com
Csec 610 Enhance teaching / snaptutorial.com
 
Project Risk Management PlanPurposeThis project provides
Project Risk Management PlanPurposeThis project provides Project Risk Management PlanPurposeThis project provides
Project Risk Management PlanPurposeThis project provides
 
CST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.comCST 610 Effective Communication/tutorialrank.com
CST 610 Effective Communication/tutorialrank.com
 
Bshs 375 entire course
Bshs 375 entire courseBshs 375 entire course
Bshs 375 entire course
 
First paragraph will Executive summary about our company 100 w.docx
First  paragraph will  Executive summary about our company 100 w.docxFirst  paragraph will  Executive summary about our company 100 w.docx
First paragraph will Executive summary about our company 100 w.docx
 
Cst 610 Enhance teaching / snaptutorial.com
Cst 610  Enhance teaching / snaptutorial.comCst 610  Enhance teaching / snaptutorial.com
Cst 610 Enhance teaching / snaptutorial.com
 
CST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.comCST 610 RANK Achievement Education--cst610rank.com
CST 610 RANK Achievement Education--cst610rank.com
 
CST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.comCST 610 RANK Redefined Education--cst610rank.com
CST 610 RANK Redefined Education--cst610rank.com
 
Csec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.comCsec 610 Education Organization-snaptutorial.com
Csec 610 Education Organization-snaptutorial.com
 
CSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.comCSEC 610 Effective Communication - snaptutorial.com
CSEC 610 Effective Communication - snaptutorial.com
 
Cyb 610 Enhance teaching / snaptutorial.com
Cyb 610   Enhance teaching / snaptutorial.comCyb 610   Enhance teaching / snaptutorial.com
Cyb 610 Enhance teaching / snaptutorial.com
 
CSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.comCSEC 610 Education Specialist / snaptutorial.com
CSEC 610 Education Specialist / snaptutorial.com
 
CST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.comCST 610 RANK Educational Specialist--cst610rank.com
CST 610 RANK Educational Specialist--cst610rank.com
 
CST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.comCST 610 RANK Become Exceptional--cst610rank.com
CST 610 RANK Become Exceptional--cst610rank.com
 
CST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.comCST 610 RANK Inspiring Innovation--cst610rank.com
CST 610 RANK Inspiring Innovation--cst610rank.com
 
CST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.comCST 610 RANK Remember Education--cst610rank.com
CST 610 RANK Remember Education--cst610rank.com
 
MATH233 Unit 3 This assignment features an exponential functio.docx
MATH233 Unit 3 This assignment features an exponential functio.docxMATH233 Unit 3 This assignment features an exponential functio.docx
MATH233 Unit 3 This assignment features an exponential functio.docx
 
Child Labour Essay In English Very Simple - YouTube
Child Labour Essay In English Very Simple - YouTubeChild Labour Essay In English Very Simple - YouTube
Child Labour Essay In English Very Simple - YouTube
 

More from festockton

Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docxLearning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docxfestockton
 
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docxLeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docxfestockton
 
Leadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxLeadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxfestockton
 
Learning about Language by Observing and ListeningThe real.docx
Learning about Language by Observing and ListeningThe real.docxLearning about Language by Observing and ListeningThe real.docx
Learning about Language by Observing and ListeningThe real.docxfestockton
 
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docxLearning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docxfestockton
 
Learning about Language by Observing and ListeningThe real voy.docx
Learning about Language by Observing and ListeningThe real voy.docxLearning about Language by Observing and ListeningThe real voy.docx
Learning about Language by Observing and ListeningThe real voy.docxfestockton
 
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docxLEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docxfestockton
 
Leadership Style What do people do when they are leadingAssignme.docx
Leadership Style What do people do when they are leadingAssignme.docxLeadership Style What do people do when they are leadingAssignme.docx
Leadership Style What do people do when they are leadingAssignme.docxfestockton
 
Leadership Throughout HistoryHistory is filled with tales of leade.docx
Leadership Throughout HistoryHistory is filled with tales of leade.docxLeadership Throughout HistoryHistory is filled with tales of leade.docx
Leadership Throughout HistoryHistory is filled with tales of leade.docxfestockton
 
Lean Inventory Management1. Why do you think lean inventory manage.docx
Lean Inventory Management1. Why do you think lean inventory manage.docxLean Inventory Management1. Why do you think lean inventory manage.docx
Lean Inventory Management1. Why do you think lean inventory manage.docxfestockton
 
Leadership varies widely by culture and personality. An internationa.docx
Leadership varies widely by culture and personality. An internationa.docxLeadership varies widely by culture and personality. An internationa.docx
Leadership varies widely by culture and personality. An internationa.docxfestockton
 
Leadership is the ability to influence people toward the attainment .docx
Leadership is the ability to influence people toward the attainment .docxLeadership is the ability to influence people toward the attainment .docx
Leadership is the ability to influence people toward the attainment .docxfestockton
 
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docx
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docxLawday. Court of Brightwaltham holden on Monday next after Ascension.docx
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docxfestockton
 
law43665_fm_i-xx i 010719 1032 AMStakeholders, Eth.docx
law43665_fm_i-xx i 010719  1032 AMStakeholders, Eth.docxlaw43665_fm_i-xx i 010719  1032 AMStakeholders, Eth.docx
law43665_fm_i-xx i 010719 1032 AMStakeholders, Eth.docxfestockton
 
Leaders face many hurdles when leading in multiple countries. There .docx
Leaders face many hurdles when leading in multiple countries. There .docxLeaders face many hurdles when leading in multiple countries. There .docx
Leaders face many hurdles when leading in multiple countries. There .docxfestockton
 
Last year Angelina Jolie had a double mastectomy because of re.docx
Last year Angelina Jolie had a double mastectomy because of re.docxLast year Angelina Jolie had a double mastectomy because of re.docx
Last year Angelina Jolie had a double mastectomy because of re.docxfestockton
 
Leaders face many hurdles when leading in multiple countries. Ther.docx
Leaders face many hurdles when leading in multiple countries. Ther.docxLeaders face many hurdles when leading in multiple countries. Ther.docx
Leaders face many hurdles when leading in multiple countries. Ther.docxfestockton
 
Leaders today must be able to create a compelling vision for the org.docx
Leaders today must be able to create a compelling vision for the org.docxLeaders today must be able to create a compelling vision for the org.docx
Leaders today must be able to create a compelling vision for the org.docxfestockton
 
Law enforcement professionals and investigators use digital fore.docx
Law enforcement professionals and investigators use digital fore.docxLaw enforcement professionals and investigators use digital fore.docx
Law enforcement professionals and investigators use digital fore.docxfestockton
 
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docxLAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docxfestockton
 

More from festockton (20)

Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docxLearning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
Learning ResourcesRequired ReadingsToseland, R. W., & Ri.docx
 
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docxLeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
LeamosEscribamos Completa el párrafo con las formas correctas de lo.docx
 
Leadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docxLeadership via vision is necessary for success. Discuss in detail .docx
Leadership via vision is necessary for success. Discuss in detail .docx
 
Learning about Language by Observing and ListeningThe real.docx
Learning about Language by Observing and ListeningThe real.docxLearning about Language by Observing and ListeningThe real.docx
Learning about Language by Observing and ListeningThe real.docx
 
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docxLearning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
Learning Accomplishment Profile-Diagnostic Spanish Language Edit.docx
 
Learning about Language by Observing and ListeningThe real voy.docx
Learning about Language by Observing and ListeningThe real voy.docxLearning about Language by Observing and ListeningThe real voy.docx
Learning about Language by Observing and ListeningThe real voy.docx
 
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docxLEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
LEARNING OUTCOMES1. Have knowledge and understanding of the pri.docx
 
Leadership Style What do people do when they are leadingAssignme.docx
Leadership Style What do people do when they are leadingAssignme.docxLeadership Style What do people do when they are leadingAssignme.docx
Leadership Style What do people do when they are leadingAssignme.docx
 
Leadership Throughout HistoryHistory is filled with tales of leade.docx
Leadership Throughout HistoryHistory is filled with tales of leade.docxLeadership Throughout HistoryHistory is filled with tales of leade.docx
Leadership Throughout HistoryHistory is filled with tales of leade.docx
 
Lean Inventory Management1. Why do you think lean inventory manage.docx
Lean Inventory Management1. Why do you think lean inventory manage.docxLean Inventory Management1. Why do you think lean inventory manage.docx
Lean Inventory Management1. Why do you think lean inventory manage.docx
 
Leadership varies widely by culture and personality. An internationa.docx
Leadership varies widely by culture and personality. An internationa.docxLeadership varies widely by culture and personality. An internationa.docx
Leadership varies widely by culture and personality. An internationa.docx
 
Leadership is the ability to influence people toward the attainment .docx
Leadership is the ability to influence people toward the attainment .docxLeadership is the ability to influence people toward the attainment .docx
Leadership is the ability to influence people toward the attainment .docx
 
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docx
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docxLawday. Court of Brightwaltham holden on Monday next after Ascension.docx
Lawday. Court of Brightwaltham holden on Monday next after Ascension.docx
 
law43665_fm_i-xx i 010719 1032 AMStakeholders, Eth.docx
law43665_fm_i-xx i 010719  1032 AMStakeholders, Eth.docxlaw43665_fm_i-xx i 010719  1032 AMStakeholders, Eth.docx
law43665_fm_i-xx i 010719 1032 AMStakeholders, Eth.docx
 
Leaders face many hurdles when leading in multiple countries. There .docx
Leaders face many hurdles when leading in multiple countries. There .docxLeaders face many hurdles when leading in multiple countries. There .docx
Leaders face many hurdles when leading in multiple countries. There .docx
 
Last year Angelina Jolie had a double mastectomy because of re.docx
Last year Angelina Jolie had a double mastectomy because of re.docxLast year Angelina Jolie had a double mastectomy because of re.docx
Last year Angelina Jolie had a double mastectomy because of re.docx
 
Leaders face many hurdles when leading in multiple countries. Ther.docx
Leaders face many hurdles when leading in multiple countries. Ther.docxLeaders face many hurdles when leading in multiple countries. Ther.docx
Leaders face many hurdles when leading in multiple countries. Ther.docx
 
Leaders today must be able to create a compelling vision for the org.docx
Leaders today must be able to create a compelling vision for the org.docxLeaders today must be able to create a compelling vision for the org.docx
Leaders today must be able to create a compelling vision for the org.docx
 
Law enforcement professionals and investigators use digital fore.docx
Law enforcement professionals and investigators use digital fore.docxLaw enforcement professionals and investigators use digital fore.docx
Law enforcement professionals and investigators use digital fore.docx
 
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docxLAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
LAW and Economics 4 questionsLaw And EconomicsTextsCoote.docx
 

Recently uploaded

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxRaymartEstabillo3
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxsocialsciencegdgrohi
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 

Recently uploaded (20)

Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptxEPANDING THE CONTENT OF AN OUTLINE using notes.pptx
EPANDING THE CONTENT OF AN OUTLINE using notes.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptxHistory Class XII Ch. 3 Kinship, Caste and Class (1).pptx
History Class XII Ch. 3 Kinship, Caste and Class (1).pptx
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 

Assessment Worksheet Aligning Risks, Threats, and Vuln.docx

  • 1. Assessment Worksheet Aligning Risks, Threats, and Vulnerabilities to COBIT P09 Risk Management Controls Course Name and Number: _____________________________________________________ Student Name: _____________________________________________________ ___________ Instructor Name: _____________________________________________________ _________ Lab Due Date: _____________________________________________________ ___________ Overview In this lab, you defined COBIT P09, you described COBIT P09’s six control objectives, you explained how the threats and vulnerabilities align to the definition for the assessment and management of risks, and you used COBIT P09 to determine the scope of risk management for an IT infrastructure.
  • 2. Lab Assessment Questions & Answers 1. What is COBIT P09’s purpose? 2. Name three of COBIT’s six control objectives. 3. For each of the threats and vulnerabilities from the Identifying Threats and Vulnerabilities in an IT Infrastructure lab in this lab manual (list at least three and no more than five) that you have remediated, what must you assess as part of your overall COBIT P09 risk management approach for your IT infrastructure? 4. True or false: COBIT P09 risk management control objectives focus on assessment and management of IT risk. 17 Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual
  • 3. 5. What is the name of the organization that defined the COBIT P09 Risk Management Framework? 6. Describe three of the COBIT P09 control objectives. 7. Describe three of the COBIT P09.1 IT Risk Management Framework control objectives. Course Name and Number: Student Name: Instructor Name: Lab Due Date: Text16: Text17: Text18: Text19: Text20: Text21: Text22: Econ Data Analysis Project 1 My Name Course Instructor Date Is the percentage of homeless people same across all states? Data Source: http://www.nareb.com/site- files/uploads/2018/09/NAREB_Shiba2018_Web.pdf
  • 4. Percentage of homeless population per state Percentage of total population New york Chicago Philadelphia Detroit Houston Mephis Baltimore Los Angeles Washington D.C Dallas 24 31 43 80 23 64 63 9 48 25 City Percent Did Residential Segregation Indexes for Blacks or African Americans change between 1980 and 2000? Source: https://www2.census.gov/programs- surveys/demo/tables/housing-patterns/time-series/housing- patterns-tables/tab5-1.xlsx Descriptive Statistics for Residential Segregation Indexes for Blacks or African Americans: 1980, 1990, 2000 for all metropolitan areas 1980 1990 2000 0.72699999999999998 0.67800000000000005 0.64 Research question: Is there a relationship between age and poverty? Source: https://www2.census.gov/programs- surveys/cps/tables/pov-30/2019/pov30_200_1.xls
  • 5. Distribution of People below 200% Poverty Status .Under 16 years .16 to 24 years ..16 to 17 years ..18 to 21 years ..22 to 24 years .25 to 54 years .55 years and over 64398 37970 8886 16155 12929 126935 94543 Age Total number How does prevalence of Invasive Melanoma vary across races? RaceNumberAll Races77,698White73,395White, Hispanic1,591White, non-Hispanic71,801Black372American Indian/Alaska Native190Asian/Pacific Islander239Hispanic1,725Total227,011 Source: https://www.cdc.gov/cancer/uscs/about/data-briefs/no9- melanoma-incidence-mortality-UnitedStates-2012-2016.htm Did Two-Adult-Two-Child Poverty Thresholds increase from 2017 to 2018? Source: https://www2.census.gov/programs- surveys/demo/tables/p60/268/table3.xls Two-Adult-Two-Child Poverty Thresholds: 2017 and 2018 2017 ..Owners with mortgages ..Owners without mortgages ..Renters 27085 23261 27005 2018 ..Owners with mortgages ..Owners without mortgages ..Renters 28342 24173 28166
  • 6. Status Number Data Analysis Project 1 For this project each student will learn and demonstrate competency in researching economics; that is, creatively designing a research question, locating pertinent and credible data to support an answer, and presenting results in a professional and articulate manner. The skill set practiced in this project is highly valued in business and government occupations. Follow these steps to complete the project: 1. Using the data covered in the Demography and Housing slides, generate five research questions to study (e.g. “Have home prices in the U.S. increased since 2010?”, “What is the racial composition of U.S. males?”). You are to create two research questions from Demography, two from Housing, and one from either category. You are to use at least 3 different data sources (e.g. census, CDC, NAR, etc.) in the overall project. 2. Excel File: For each research question create an Excel sheet with your data set and one graph. You are to use each of the following graphs once in the overall project: · Bar chart(horizontal or vertical) · Pie chart · Histogram · Frequency table, · Scatterplot (lined or unlined). 3. PowerPoint Presentation: For each question, create a PowerPoint slide containing one graph, up to three bullet points (optional), and hyperlinks to your data source website (make sure the links work and ). The PowerPoint should also contain an introduction slide (e.g. name, project #, and class).
  • 7. 4. Submission: Upload the Excel and PowerPoint file into the link provided in Blackboard by the due date (no e-mailed copies). 5. Grading: Project grade is weighted 50/50 for Excel/PowerPoint; however, both must be submitted to receive a score. Excel graphs must be derived from the data input in Excel. The PowerPoint is graded subjectively as a presentation to your fellow classmates so cosmetics, spelling, character size, color, creativity all matter. 6. Academic Integrity: Do not copy graphs from websites nor replicate another student’s work. 7 Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual Assessment Worksheet Identifying Threats and Vulnerabilities in an IT Infrastructure Course Name and Number: _____________________________________________________ Student Name: _____________________________________________________
  • 8. ___________ Instructor Name: _____________________________________________________ _________ Lab Due Date: _____________________________________________________ ___________ Overview In this lab, you identified known risks, threats, and vulnerabilities, and you organized them. Finally, you mapped these risks to the domain that was impacted from a risk management perspective. Lab Assessment Questions & Answers 1. Health care organizations must strictly comply with the Health Insurance Portability and Accountability Act (HIPAA) Privacy and Security rules that require organizations to have proper security controls for handling personal information referred to as “protected health information,” or PHI. This includes security controls for the IT infrastructure handling PHI. Which of the listed risks, threats, or vulnerabilities can violate HIPAA privacy and security requirements? List one and justify your answer in one or two sentences. 2. How many threats and vulnerabilities did you find that impacted risk in each of the seven domains of a typical IT infrastructure?
  • 9. 3. Which domain(s) had the greatest number of risks, threats, and vulnerabilities? 4. What is the risk impact or risk factor (critical, major, and minor) that you would qualitatively assign to the risks, threats, and vulnerabilities you identified for the LAN-to-WAN Domain for the health care and HIPAA compliance scenario? 5. Of the three System/Application Domain risks, threats, and vulnerabilities identified, which one requires a disaster recovery plan and business continuity plan to maintain continued operations during a catastrophic outage? 6. Which domain represents the greatest risk and uncertainty to an organization? 7. Which domain requires stringent access controls and encryption for connectivity to corporate resources from home?
  • 10. 8. Which domain requires annual security awareness training and employee background checks for sensitive positions to help mitigate risks from employee sabotage? 9. Which domains need software vulnerability assessments to mitigate risk from software vulnerabilities? 10. Which domain requires acceptable use policies (AUPs) to minimize unnecessary user-initiated Internet traffic and can be monitored and controlled by Web content filters? 11. In which domain do you implement Web content filters? 12. If you implement a Wireless LAN (WLAN) to support connectivity for laptops in the Workstation Domain, which domain does WLAN fall within? 13. Under the Gramm-Leach-Bliley-Act (GLBA), banks must protect customer privacy. A given bank has just implemented its online banking solution that allows customers to access their accounts and perform transactions via their computers or personal digital assistant (PDA) devices. Online banking servers and their public Internet hosting would fall within which domains of security responsibility?
  • 11. 9 Copyright © 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved. www.jblearning.com Student Lab Manual 14. True or false: Customers who conduct online banking on their laptops or personal computers must use Hypertext Transfer Protocol Secure (HTTPS), the secure and encrypted version of Hypertext Transfer Protocol (HTTP) browser communications. HTTPS encrypts Web page data inputs and data through the public Internet and decrypts that Web page and data on the user’s PC or device. 15. Explain how a layered security strategy throughout the seven domains of a typical IT infrastructure can help mitigate risk exposure for loss of privacy data or confidential data from the System/Application Domain. Course Name and Number: Student Name: Instructor Name: Lab Due Date: Text1: Text2: Text3: Text4: Text5: Text6: Text7: Text8: Text9: Text10: Text11: Text12: Text13: Text14: Text15: